<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect and multiple AAD tenants in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545641#M111566</link>
    <description>&lt;P&gt;Mine is set to "No".&lt;/P&gt;
&lt;P&gt;PAN-OS&amp;nbsp;10.1.9-h3&lt;/P&gt;
&lt;P&gt;GlobalProtect App Version 6.0.5-30&lt;/P&gt;</description>
    <pubDate>Mon, 12 Jun 2023 16:34:50 GMT</pubDate>
    <dc:creator>RobertShawver</dc:creator>
    <dc:date>2023-06-12T16:34:50Z</dc:date>
    <item>
      <title>GlobalProtect and multiple AAD tenants</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545508#M111551</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello -&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;We've set up a GlobalProtect portal and gateway to connect third-party individuals to our VPN. We've configured it to use SAML for authentication, leveraging an Azure Active Directory Enterprise Application that we have configured per the Microsoft guide (&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/azure/active-directory/saas-apps/palo-alto-networks-globalprotect-tutorial" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/azure/active-directory/saas-apps/palo-alto-networks-globalprotect-tutorial&lt;/A&gt;&lt;SPAN&gt;). The third-party user is expected to connect to our VPN portal, be redirected to the SAML logon page, and then utilize our company credentials to log onto our VPN.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;The issue that we are running into is that these third-party users have their own AAD tenants and the logon prompt is attempting to use their tenant's logon information. Instead of prompting the user to enter their &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/296506"&gt;@Company&lt;/a&gt;.com&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;account and password, it is automatically attempting to log in using their @&lt;/SPAN&gt;&lt;A href="https://vendor.com/" target="_blank" rel="noopener"&gt;vendor.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;account.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;For web-based applications, we usually avoid this problem by opening up an incognito window and going through the logon process. However, GlobalProtect controls the browser pop-up and is using the default browser in non-incognito mode.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;How can we either (a) get GlobalProtect to open the logon prompt using an incognito window or (b) prevent the SAML authentication prompt from automatically using the @&lt;/SPAN&gt;&lt;A href="https://vendor.com/" target="_blank" rel="noopener"&gt;vendor.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;account?&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We have been using the workaround of having the vendor logout of their M365 on everything on their device, but this has been causing other issues and is not a viable workaround long-term.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Adding the @&lt;/SPAN&gt;&lt;A href="https://vendor.com/" target="_blank" rel="noopener"&gt;vendor.com&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;accounts as guests to our AAD tenant is not a viable process as these user's may only need one time access during a firefighter scenario, and adding the guest and then propagating groups will be too complicated. Likewise, whatever authentication mechanism we use must continue to support MFA via AAD.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 09 Jun 2023 19:09:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545508#M111551</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2023-06-09T19:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and multiple AAD tenants</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545604#M111558</link>
      <description>&lt;P&gt;Did you explicitly configure GP to launch the default browser? Try using the embedded one instead. In all my deployments, my users are being asked which of their accounts they want to use (Azure as IdP), I use the embedded browser&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 07:49:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545604#M111558</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-06-12T07:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and multiple AAD tenants</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545638#M111564</link>
      <description>&lt;P&gt;Thank you Sir, do you have instructions or can point me to instructions on how to do this? "&lt;SPAN&gt;Did you explicitly configure GP to launch the default browser?"&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 16:07:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545638#M111564</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2023-06-12T16:07:57Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and multiple AAD tenants</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545640#M111565</link>
      <description>&lt;P&gt;The configuration is within the Portal Agent section.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SteveCantwell_0-1686587211344.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/50831i473ABFE6691204A8/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SteveCantwell_0-1686587211344.png" alt="SteveCantwell_0-1686587211344.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 16:27:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545640#M111565</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2023-06-12T16:27:00Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and multiple AAD tenants</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545641#M111566</link>
      <description>&lt;P&gt;Mine is set to "No".&lt;/P&gt;
&lt;P&gt;PAN-OS&amp;nbsp;10.1.9-h3&lt;/P&gt;
&lt;P&gt;GlobalProtect App Version 6.0.5-30&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jun 2023 16:34:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-multiple-aad-tenants/m-p/545641#M111566</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2023-06-12T16:34:50Z</dc:date>
    </item>
  </channel>
</rss>

