<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prisma Access - CIE multi profile  - breaks SSO in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/1224106#M1122</link>
    <description>&lt;P&gt;Not at the moment as far as I am aware.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My experience is in using Global Protect with Entra as the IDP .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PRISMA will only support one &amp;nbsp;Entra IDP . &amp;nbsp;You can mess about with it a little bit and have different authentication types for different Entra directories but can only enforce for an OS . For example , &amp;nbsp;macOs has one policy which uses and authentication for a different IDP etc . Bit rubbish and won't work .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The recommendation at the time &amp;nbsp;was to use CIE and &amp;nbsp;create a Multi Auth profile which points at two separate IDP via CIE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Problem is , to make auth work you have to &amp;nbsp;input the user and domain &amp;nbsp;when GP loads . This is not SSO , in fact it breaks all the principles of SSO .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While you are waiting for input on the login , teams ,slack and any other app is failing to load on the desktop . Causes a nightmare if you use Conditional Access.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gcollins5_0-1742312875129.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66695i58D96821836BAD3A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gcollins5_0-1742312875129.png" alt="gcollins5_0-1742312875129.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My request was to tie a Portal or Gateway policy to a CIE authentication policy , that way you don't need &amp;nbsp;to input the user as it is tied to the right policy .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looks like that fix never happened.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would have to set it up in a lab to test to see if things have changed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo use Multi Auth CIE profiles and use autofill to fill int he user request field.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 Mar 2025 15:49:18 GMT</pubDate>
    <dc:creator>gcollins5</dc:creator>
    <dc:date>2025-03-18T15:49:18Z</dc:date>
    <item>
      <title>Prisma Access - CIE multi profile  - breaks SSO</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/571455#M648</link>
      <description>&lt;P&gt;Hello all .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Seem to be casting into an empty pool here but will try anyway.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My issue is with Multi Auth profiles using Global Protect &amp;amp; Prisma Access.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you use more than one IDP you can only match against one profile , hence you can't use multi profile.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So recommended is CIE multi Auth .&lt;/P&gt;
&lt;P&gt;You setup your IDPs in here , easy peasy&amp;nbsp; and it works.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Only problem is when&amp;nbsp; you authenticate against&amp;nbsp; the CIE multi Auth .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You get a new PAlo Alto landing page which requires you to enter your user ID so CIE can work out which IDP to point you towards.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This breaks SSO completely . SO , if like me you allow Windows authentication FIRST&amp;nbsp; before GP starts , CIE does not use the already granted token because it does not know which directory to point it at , hence you have to enter a users name,, it then is able to see the token is valid and&amp;nbsp; authentication is satisfied and we move on .&lt;/P&gt;
&lt;P&gt;Pretty dumb as is completely break SSO . The only option is to move from a working fully integrated IDP to one where users have to enter their user ID.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TAC tells me this is expected behaviour . I can't believe this is actually true as it makes no sense at all to break SSO .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As usual there is no documentation (or I cant find it) on how to configure Mutli Auth profiles to cater for this limitation.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There might be some Kung Fu in global protect thats allows it ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Anyone else seen this ?????&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;HELP !!!&lt;/P&gt;</description>
      <pubDate>Tue, 02 Jan 2024 14:45:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/571455#M648</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2024-01-02T14:45:52Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - CIE multi profile  - breaks SSO</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/571549#M649</link>
      <description>&lt;P&gt;BUMP !!!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jan 2024 09:28:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/571549#M649</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2024-01-03T09:28:50Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - CIE multi profile  - breaks SSO</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/572526#M662</link>
      <description>&lt;P&gt;Hello Elizabeth32.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Finally got some traction on it . My SE Rob has been excellent.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is expected behaviour. Ergo &amp;nbsp;SSO gets broken on purpose.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The reasoning on this seem to be that CIE cannot interpret the token . So the defined method is to add a proxy type layer where the users inserts their username into a &amp;nbsp;landing page and CIE directs accordingly .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The workaround is to use the default browser on the endpoint and create a dummy record &amp;nbsp;in the password management &amp;nbsp;of the browser for the &amp;nbsp;CIE landing page, this automatically completes the users input but there is still a &amp;nbsp;submit button .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is a work around for now but it still breaks SSO .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My SE setup a meeting with the IAM guru for Europe and we went through the scenario , it is a &amp;nbsp;weaknesses which is well recognised by Palo .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Seems the best way is to be able to assign an authentication profile to the Global Protect policy which takes away the need to &amp;nbsp;have that proxy landing page &amp;nbsp;and does away with the multi profile CIE policy .&lt;/P&gt;
&lt;P&gt;They have actually put. a change request in for this or something similar.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Very positive input from Palo . Just a huge shame TAC were not aware of how this works and took ages to try and diagnose.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Jan 2024 09:46:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/572526#M662</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2024-01-10T09:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - CIE multi profile  - breaks SSO</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/587223#M761</link>
      <description>&lt;P&gt;This is the screen that I have seen, I have configured the group, else the multi profile wont work. I have also set default profile. The SSO is not seemless compared to pointing to Entra ID directly. Is this fixed?&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/223777"&gt;@gcollins5&lt;/a&gt;&amp;nbsp;, may I know what's the "&lt;SPAN&gt;change request&lt;/SPAN&gt;" ID, so I can reference it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KengSeng_0-1716170964692.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59860i35361448E78BF363/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="KengSeng_0-1716170964692.png" alt="KengSeng_0-1716170964692.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 03:26:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/587223#M761</guid>
      <dc:creator>KengSeng</dc:creator>
      <dc:date>2024-05-20T03:26:37Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - CIE multi profile  - breaks SSO</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/593738#M829</link>
      <description>&lt;P&gt;My bad didn't answer this . I will &amp;nbsp;reach out to my SE to find it .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Aug 2024 07:48:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/593738#M829</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2024-08-01T07:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - CIE multi profile  - breaks SSO</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/1222742#M1110</link>
      <description>&lt;P&gt;hi kengseng,&lt;BR /&gt;Can you now direct to entra without logging into single sign on palo?&lt;/P&gt;</description>
      <pubDate>Wed, 05 Mar 2025 09:22:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/1222742#M1110</guid>
      <dc:creator>DickyAnggara</dc:creator>
      <dc:date>2025-03-05T09:22:23Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - CIE multi profile  - breaks SSO</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/1224106#M1122</link>
      <description>&lt;P&gt;Not at the moment as far as I am aware.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My experience is in using Global Protect with Entra as the IDP .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PRISMA will only support one &amp;nbsp;Entra IDP . &amp;nbsp;You can mess about with it a little bit and have different authentication types for different Entra directories but can only enforce for an OS . For example , &amp;nbsp;macOs has one policy which uses and authentication for a different IDP etc . Bit rubbish and won't work .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The recommendation at the time &amp;nbsp;was to use CIE and &amp;nbsp;create a Multi Auth profile which points at two separate IDP via CIE.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Problem is , to make auth work you have to &amp;nbsp;input the user and domain &amp;nbsp;when GP loads . This is not SSO , in fact it breaks all the principles of SSO .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;While you are waiting for input on the login , teams ,slack and any other app is failing to load on the desktop . Causes a nightmare if you use Conditional Access.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="gcollins5_0-1742312875129.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66695i58D96821836BAD3A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="gcollins5_0-1742312875129.png" alt="gcollins5_0-1742312875129.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My request was to tie a Portal or Gateway policy to a CIE authentication policy , that way you don't need &amp;nbsp;to input the user as it is tied to the right policy .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looks like that fix never happened.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would have to set it up in a lab to test to see if things have changed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo use Multi Auth CIE profiles and use autofill to fill int he user request field.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Mar 2025 15:49:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/1224106#M1122</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2025-03-18T15:49:18Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - CIE multi profile  - breaks SSO</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/1227850#M1144</link>
      <description>&lt;P&gt;Hello All - update&amp;nbsp; 6.3.3 release of GP !&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is here :&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Improvements for Multi Authentication CIE Experience When CIE (SAML) multi-authentication is configured for the GlobalProtect app as the authentication method, end users are no longer required to enter their single sign-on (SSO) credentials when they try to authenticate to the app. You can now predeploy the registry key CASSKIPHUBPAGE (path: \HKEY_LOCAL_MACHINE \SOFTWARE\Palo Alto Networks\GlobalProtect\Settings) on the Windows endpoints to enable this feature. After you enable this feature, end users are not prompted to enter their SAML credentials while authenticating to the app using the embedded browser or the default browser. This feature is supported only on Windows platforms .&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's a kiss from your auntie but a kiss all the same. Now if only macOS could deal with it !&lt;/P&gt;</description>
      <pubDate>Thu, 01 May 2025 08:14:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/1227850#M1144</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2025-05-01T08:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - CIE multi profile  - breaks SSO</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/1229465#M1153</link>
      <description>&lt;P&gt;This username prompt can be skipped with Windows GP client 6.3.1+&lt;/P&gt;
&lt;P&gt;The registry key is&amp;nbsp;&lt;SPAN&gt;'cas-skip-hub-page'=yes&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;or&amp;nbsp;&amp;nbsp;msiexec.exe /i globalprotect64.msi CASSKIPHUBPAGE=yes&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/whats-new/new-features/september-2024/improvements-for-multi-authentication-cie-experience-gp-6-3-1" target="_blank"&gt;https://docs.paloaltonetworks.com/whats-new/new-features/september-2024/improvements-for-multi-authentication-cie-experience-gp-6-3-1&lt;/A&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 May 2025 00:22:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/m-p/1229465#M1153</guid>
      <dc:creator>DBaldock1</dc:creator>
      <dc:date>2025-05-20T00:22:48Z</dc:date>
    </item>
  </channel>
</rss>

