<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: two factor authenticaton tokens with PAN firewalls... in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23192#M16898</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Something like this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://nordicedge.com/paloalto/" title="http://nordicedge.com/paloalto/"&gt; Strong authentication for Palo Alto Secure Access SSL VPN Solutions | Nordic Edge | The Provider of Secure Identity Solutions&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 10 Jul 2012 17:34:03 GMT</pubDate>
    <dc:creator>mikand</dc:creator>
    <dc:date>2012-07-10T17:34:03Z</dc:date>
    <item>
      <title>two factor authenticaton tokens with PAN firewalls...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23191#M16897</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am looking for a two factor authentiction solution for PAN firewalls (Global Protect).&amp;nbsp; particularly interested in a Mobile phone base app to provide security token or OTP to authenticate users via Global Protect.&amp;nbsp; Anybody have any good or bad experiences with these?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 16:49:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23191#M16897</guid>
      <dc:creator>sns.jon</dc:creator>
      <dc:date>2012-07-10T16:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: two factor authenticaton tokens with PAN firewalls...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23192#M16898</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Something like this?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://nordicedge.com/paloalto/" title="http://nordicedge.com/paloalto/"&gt; Strong authentication for Palo Alto Secure Access SSL VPN Solutions | Nordic Edge | The Provider of Secure Identity Solutions&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 17:34:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23192#M16898</guid>
      <dc:creator>mikand</dc:creator>
      <dc:date>2012-07-10T17:34:03Z</dc:date>
    </item>
    <item>
      <title>Re: two factor authenticaton tokens with PAN firewalls...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23193#M16899</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tested RSA via Radius for our vpn a few months back on 4.1.3-.4 and while I was able to get authentication working, it was not a very supportable setup.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The globalprotect client sends the same password for the portal and the gateway when connecting. This caused big issues since rsa passcodes are only good for one use. It was extremely easy to lock out a users account on the rsa server if you miskeyed a passcode more than once on a connect attempt.&amp;nbsp; Also the user had to log in once, then wait for the 2nd logon up to 59 seconds until the token cycled to the next code, before being able to connect.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The workaround for this was to use AD authentication for the portal and have the users first log in with the AD credentials, then when prompted for a 2nd logon for the gateway the user would use the RSA credentials.&amp;nbsp; Another workaround that was proposed by support was to make the portal unreachable via the internet to force the globalprotect client to use the last cached configuration and eliminate the portal logon piece of the process when connecting remotely.&amp;nbsp; Since I had to set up users that were 100% remote I went with the first workaround so they could get to the portal remotely.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After testing with some of my users we decided to stick with our existing vpn setup until the PA solution matures a bit more to avoid the headache of dealing with users constantly being confused about which password to enter.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The last I heard from PA support,&amp;nbsp; real one time password support was not expected to happen any time soon.&amp;nbsp; Seeing the link provided above, I wonder if something has changed recently.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 18:28:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23193#M16899</guid>
      <dc:creator>kcbrown</dc:creator>
      <dc:date>2012-07-10T18:28:09Z</dc:date>
    </item>
    <item>
      <title>Re: two factor authenticaton tokens with PAN firewalls...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23194#M16900</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thanks for the input. good info...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 10 Jul 2012 19:01:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23194#M16900</guid>
      <dc:creator>sns.jon</dc:creator>
      <dc:date>2012-07-10T19:01:24Z</dc:date>
    </item>
    <item>
      <title>Re: two factor authenticaton tokens with PAN firewalls...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23195#M16901</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;For better user experience, maybe we can use SSO for GP Portal and GP Gateway authentication (transparent for users) and use OTP on Captive Portal to go from "Grobal Protect" zone to the "protected ressources" zone.&lt;/P&gt;&lt;P&gt;By this way, we have only one visible authentication (for the user) : OTP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That's wrong or not?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Oct 2012 09:38:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23195#M16901</guid>
      <dc:creator>fverstraete</dc:creator>
      <dc:date>2012-10-25T09:38:21Z</dc:date>
    </item>
    <item>
      <title>Re: two factor authenticaton tokens with PAN firewalls...</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23196#M16902</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;the RSA/GP solution is not enterprise ready to say the least.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #000000; background-color: #ffffff;"&gt;My recommendation if you want to move with this LDPAP auth the portal, RSA the gateway its horrible technically but as close as you will get with out a certificate server&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 17 Jan 2013 23:47:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-authenticaton-tokens-with-pan-firewalls/m-p/23196#M16902</guid>
      <dc:creator>kkeeton</dc:creator>
      <dc:date>2013-01-17T23:47:08Z</dc:date>
    </item>
  </channel>
</rss>

