<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Configure VPN GP wit Microsoft Authenticator in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/configure-vpn-gp-wit-microsoft-authenticator/m-p/1248091#M125994</link>
    <description>&lt;DIV class="qwen-markdown-paragraph"&gt;&lt;SPAN class="qwen-markdown-text" data-spm-anchor-id="a2ty_o01.29997173.0.i4.62a951717Ws8bs"&gt;The Microsoft Learn article you referenced—&lt;/SPAN&gt;&lt;A class="qwen-markdown-link" href="https://learn.microsoft.com/en-us/entra/identity/saas-apps/palo-alto-networks-globalprotect-tutorial" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN class="qwen-markdown-text"&gt;“Tutorial: Azure AD integration with Palo Alto Networks GlobalProtect”&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="qwen-markdown-text"&gt;—is specifically designed for &lt;/SPAN&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;cloud-only or hybrid identity environments using Microsoft Entra ID (formerly Azure Active Directory)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt; as the identity provider (IdP) for SAML-based authentication to GlobalProtect.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="qwen-markdown-space"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="qwen-markdown-paragraph"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Since you mentioned that your organization uses &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;on-premises Active Directory (AD)&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; and did not indicate a cloud-based Entra ID setup (e.g., no synchronization via Azure AD Connect or cloud-only users), this guide may &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;not be directly applicable&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; unless you have already configured federation between your on-premises AD and Entra ID (e.g., using AD FS or another SAML IdP integrated with Entra ID).&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;H3 class="qwen-markdown-heading"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Key Considerations:&lt;/SPAN&gt;&lt;/H3&gt;
&lt;OL class="qwen-markdown-list" dir="auto" start="1"&gt;
&lt;LI&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Authentication Architecture&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt;:&lt;/SPAN&gt;
&lt;UL class="qwen-markdown-list" dir="auto"&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;If your VPN (e.g., Palo Alto Global Protect) authenticates users &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;directly against on-premises AD&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; (via LDAP, RADIUS, or Kerberos), then &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Microsoft Authenticator (or Authenticator)&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; would typically not be involved unless you layer &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Multi-Factor Authentication (MFA)&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; on top.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;To use &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Microsoft Authenticator for MFA&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;, you generally need &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Microsoft Entra ID&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; (with P1/P2 licenses) or &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Azure MFA Server&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; (now deprecated). Since Azure MFA Server is retired, modern deployments rely on &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Entra ID-based MFA&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;On-Premises AD + MFA Options&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt;:&lt;/SPAN&gt;
&lt;UL class="qwen-markdown-list" dir="auto"&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;If you wish to keep authentication on premises but still use Microsoft Authenticator for MFA, you have two main paths:&lt;/SPAN&gt;
&lt;UL class="qwen-markdown-list" dir="auto"&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;Option A&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;: Deploy &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Active Directory Federation Services (AD FS)&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; on-premises and integrate it with &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Entra ID&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; (hybrid identity). Then configure GlobalProtect to use Entra ID (via SAML) as the IdP, which triggers MFA via Microsoft Authenticator.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;Option B&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;: Use &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; with &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Network Policy Server (NPS)&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; extended by the &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Azure MFA NPS extension&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;. This allows on-premises RADIUS clients (like firewalls) to trigger MFA challenges via Microsoft Authenticator through Entra ID, while primary authentication remains against on-prem AD.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Relevant Documentation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt;:&lt;/SPAN&gt;
&lt;UL class="qwen-markdown-list" dir="auto"&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;For &lt;/SPAN&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Option B (NPS Extension)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt;:&lt;/SPAN&gt;&lt;BR /&gt;&lt;A class="qwen-markdown-link" href="https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Azure Multi-Factor Authentication NPS extension&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;For &lt;/SPAN&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Option A (SAML + Entra ID)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt;:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="qwen-markdown-text"&gt;The GlobalProtect tutorial you linked is appropriate &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;only if&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; you route authentication through Entra ID.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3 class="qwen-markdown-heading"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Recommendation:&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL class="qwen-markdown-list" dir="auto"&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;If you &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;do not currently use Entra ID&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; and authenticate solely against on-prem AD, the linked tutorial is &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;not suitable&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; as-is.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;To leverage &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Microsoft Authenticator&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;, you will need to integrate your on-prem AD with &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Entra ID&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; (typically via &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Azure AD Connect&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;) and enable &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Entra ID MFA&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;Once that foundation is in place, you can choose either the &lt;/SPAN&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;SAML (cloud-first)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt; or &lt;/SPAN&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;RADIUS/NPS (on-prem-first)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt; approach based on your network architecture and security policies.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
    <pubDate>Fri, 13 Feb 2026 05:13:48 GMT</pubDate>
    <dc:creator>zeldabrady98</dc:creator>
    <dc:date>2026-02-13T05:13:48Z</dc:date>
    <item>
      <title>Configure VPN GP wit Microsoft Authenticator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configure-vpn-gp-wit-microsoft-authenticator/m-p/1247603#M125971</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;i would like to configure my VPN using MAuthenticator. Anyone has a guide for this?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i was checking this link but im not sure if this config should be used if you have EntraID AD in the cloud or not:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/saas-apps/palo-alto-networks-globalprotect-tutorial" target="_blank"&gt;https://learn.microsoft.com/en-us/entra/identity/saas-apps/palo-alto-networks-globalprotect-tutorial&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have AD in server onpremise.&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 09:45:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configure-vpn-gp-wit-microsoft-authenticator/m-p/1247603#M125971</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2026-02-06T09:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: Configure VPN GP wit Microsoft Authenticator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configure-vpn-gp-wit-microsoft-authenticator/m-p/1247648#M125974</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;So with on-premise AD without Entra setup at all you don't want to follow these instructions. You would want to setup GlobalProtect from the sounds of it with an TOTP capable app and what your instructions are trying to do is establish Entra as a SAML provider.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Unfortunately there's not a super straightforward way to accomplish this. I know that you&amp;nbsp;&lt;EM&gt;used&amp;nbsp;&lt;/EM&gt;to be able to do this for free with a combination of FreeRADIUS and it's PAM module and that it worked well. Whether that's still actively being supported and maintained or not I don't have any recent experience with.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://networkjutsu.com/freeradius-google-authenticator/" target="_blank"&gt;https://networkjutsu.com/freeradius-google-authenticator/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Feb 2026 22:49:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configure-vpn-gp-wit-microsoft-authenticator/m-p/1247648#M125974</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2026-02-06T22:49:22Z</dc:date>
    </item>
    <item>
      <title>Re: Configure VPN GP wit Microsoft Authenticator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configure-vpn-gp-wit-microsoft-authenticator/m-p/1247659#M125978</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have setup GP with Entra ID with MFA using those instructions.&amp;nbsp; I have also set it up for customers.&amp;nbsp; There is one error that needs to be corrected.&amp;nbsp; Two of the URLs need to have the :443 as identified in red in this document -&amp;gt;&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U48CAE" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U48CAE&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sun, 08 Feb 2026 00:41:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configure-vpn-gp-wit-microsoft-authenticator/m-p/1247659#M125978</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-02-08T00:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: Configure VPN GP wit Microsoft Authenticator</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/configure-vpn-gp-wit-microsoft-authenticator/m-p/1248091#M125994</link>
      <description>&lt;DIV class="qwen-markdown-paragraph"&gt;&lt;SPAN class="qwen-markdown-text" data-spm-anchor-id="a2ty_o01.29997173.0.i4.62a951717Ws8bs"&gt;The Microsoft Learn article you referenced—&lt;/SPAN&gt;&lt;A class="qwen-markdown-link" href="https://learn.microsoft.com/en-us/entra/identity/saas-apps/palo-alto-networks-globalprotect-tutorial" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN class="qwen-markdown-text"&gt;“Tutorial: Azure AD integration with Palo Alto Networks GlobalProtect”&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class="qwen-markdown-text"&gt;—is specifically designed for &lt;/SPAN&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;cloud-only or hybrid identity environments using Microsoft Entra ID (formerly Azure Active Directory)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt; as the identity provider (IdP) for SAML-based authentication to GlobalProtect.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV class="qwen-markdown-space"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV class="qwen-markdown-paragraph"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Since you mentioned that your organization uses &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;on-premises Active Directory (AD)&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; and did not indicate a cloud-based Entra ID setup (e.g., no synchronization via Azure AD Connect or cloud-only users), this guide may &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;not be directly applicable&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; unless you have already configured federation between your on-premises AD and Entra ID (e.g., using AD FS or another SAML IdP integrated with Entra ID).&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;H3 class="qwen-markdown-heading"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Key Considerations:&lt;/SPAN&gt;&lt;/H3&gt;
&lt;OL class="qwen-markdown-list" dir="auto" start="1"&gt;
&lt;LI&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Authentication Architecture&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt;:&lt;/SPAN&gt;
&lt;UL class="qwen-markdown-list" dir="auto"&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;If your VPN (e.g., Palo Alto Global Protect) authenticates users &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;directly against on-premises AD&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; (via LDAP, RADIUS, or Kerberos), then &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Microsoft Authenticator (or Authenticator)&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; would typically not be involved unless you layer &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Multi-Factor Authentication (MFA)&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; on top.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;To use &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Microsoft Authenticator for MFA&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;, you generally need &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Microsoft Entra ID&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; (with P1/P2 licenses) or &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Azure MFA Server&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; (now deprecated). Since Azure MFA Server is retired, modern deployments rely on &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Entra ID-based MFA&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;On-Premises AD + MFA Options&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt;:&lt;/SPAN&gt;
&lt;UL class="qwen-markdown-list" dir="auto"&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;If you wish to keep authentication on premises but still use Microsoft Authenticator for MFA, you have two main paths:&lt;/SPAN&gt;
&lt;UL class="qwen-markdown-list" dir="auto"&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;Option A&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;: Deploy &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Active Directory Federation Services (AD FS)&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; on-premises and integrate it with &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Entra ID&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; (hybrid identity). Then configure GlobalProtect to use Entra ID (via SAML) as the IdP, which triggers MFA via Microsoft Authenticator.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;Option B&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;: Use &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;RADIUS&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; with &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Network Policy Server (NPS)&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; extended by the &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Azure MFA NPS extension&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;. This allows on-premises RADIUS clients (like firewalls) to trigger MFA challenges via Microsoft Authenticator through Entra ID, while primary authentication remains against on-prem AD.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Relevant Documentation&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt;:&lt;/SPAN&gt;
&lt;UL class="qwen-markdown-list" dir="auto"&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;For &lt;/SPAN&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Option B (NPS Extension)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt;:&lt;/SPAN&gt;&lt;BR /&gt;&lt;A class="qwen-markdown-link" href="https://learn.microsoft.com/en-us/azure/active-directory/authentication/howto-mfa-nps-extension" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Azure Multi-Factor Authentication NPS extension&lt;/SPAN&gt;&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;For &lt;/SPAN&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Option A (SAML + Entra ID)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt;:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN class="qwen-markdown-text"&gt;The GlobalProtect tutorial you linked is appropriate &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;only if&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; you route authentication through Entra ID.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3 class="qwen-markdown-heading"&gt;&lt;SPAN class="qwen-markdown-text"&gt;Recommendation:&lt;/SPAN&gt;&lt;/H3&gt;
&lt;UL class="qwen-markdown-list" dir="auto"&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;If you &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;do not currently use Entra ID&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; and authenticate solely against on-prem AD, the linked tutorial is &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;not suitable&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; as-is.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;To leverage &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Microsoft Authenticator&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;, you will need to integrate your on-prem AD with &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Entra ID&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt; (typically via &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Azure AD Connect&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;) and enable &lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;Entra ID MFA&lt;/SPAN&gt;&lt;SPAN class="qwen-markdown-text"&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN class="qwen-markdown-text"&gt;Once that foundation is in place, you can choose either the &lt;/SPAN&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;SAML (cloud-first)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt; or &lt;/SPAN&gt;&lt;STRONG class="qwen-markdown-strong"&gt;&lt;SPAN class="qwen-markdown-text"&gt;RADIUS/NPS (on-prem-first)&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN class="qwen-markdown-text"&gt; approach based on your network architecture and security policies.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Fri, 13 Feb 2026 05:13:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/configure-vpn-gp-wit-microsoft-authenticator/m-p/1248091#M125994</guid>
      <dc:creator>zeldabrady98</dc:creator>
      <dc:date>2026-02-13T05:13:48Z</dc:date>
    </item>
  </channel>
</rss>

