<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect Pre-Authentication with public SSL cert in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29545#M21574</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;hshah wrote:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi Darrent&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you are not interested in "Certificate based" Authentication than, following document is useless.&lt;/P&gt;
&lt;P&gt;&lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="5229" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-5229"&gt;https://live.paloaltonetworks.com/docs/DOC-5229&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;In your update it seems you are looking for AD based authentication, than configuration is much simpler. You just need following change in existing GP &lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;configuration&lt;/SPAN&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;IMG alt="pre-login.png" class="image-0 jive-image" height="521" src="https://live.paloaltonetworks.com/legacyfs/online/15542_pre-login.png" style="height: 428px; width: 620px;" width="754" /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;Let me know if this helps you.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;Hardik Shah&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt; &lt;/SPAN&gt; &lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hardik.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this all I have to change? Is there any requirement for modification on the remote end of the VPN client?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To clarify - if I do this, does this mean that the PC will pre-logon to the VPN prior to the user entering credentials into the Windows 7 login screen and run domain scripts etc?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry if I'm not being clear enough - I can't believe this could be that simple. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 15 Sep 2014 00:21:21 GMT</pubDate>
    <dc:creator>darren_g</dc:creator>
    <dc:date>2014-09-15T00:21:21Z</dc:date>
    <item>
      <title>Global Protect Pre-Authentication with public SSL cert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29540#M21569</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Folks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My boss wants me to implement "pre-authentication" for my Global protect clients, so that they authenticate against AD before logging on to their laptops when on VPN, and ergo run login scripts, group policies etc.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-5229"&gt;https://live.paloaltonetworks.com/docs/DOC-5229&lt;/A&gt; and read through it, and it describes setting up using self-signed certificates.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've actually got valid, official CA issues certificates on my Palo Alto's for Global protect (vpn.organisation.org format, from Verisign).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a similar procedure I can use to get pre-authentication working using these real certificates rather than self-signed ones?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Sep 2014 01:37:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29540#M21569</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2014-09-11T01:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Pre-Authentication with public SSL cert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29541#M21570</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Darrent &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are not interested in "Certificate based" Authentication than, following document is useless.&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="5229" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-5229" style="font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; color: #006595;"&gt;https://live.paloaltonetworks.com/docs/DOC-5229&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;In your update it seems you are looking for AD based authentication, than configuration is much simpler. You just need following change in existing GP &lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;configuration&lt;/SPAN&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;IMG alt="pre-login.png" class="image-0 jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/15441_pre-login.png" style="height: 428px; width: 620px;" /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;Let me know if this helps you.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;Hardik Shah&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Sep 2014 12:55:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29541#M21570</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-11T12:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Pre-Authentication with public SSL cert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29542#M21571</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;"Server certificate" can be an official one, no problem with that. Go for it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Sep 2014 17:26:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29542#M21571</guid>
      <dc:creator>cpainchaud</dc:creator>
      <dc:date>2014-09-11T17:26:36Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Pre-Authentication with public SSL cert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29543#M21572</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let us know for additional queries.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 12 Sep 2014 11:37:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29543#M21572</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-12T11:37:35Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Pre-Authentication with public SSL cert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29544#M21573</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This pre-logon certificate is about having a specific client computer based certificate installed not the CA based certificate you have for your global connect portal.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In this scenario you have your internal CA in Active Directory issue computer certificates to your domain computers (which can be done automatically via GPO). Then you install the CA certificate on the PA so it can recognize and authenticate those certificates.&amp;nbsp; Now you know at login that the computer connecting is a trusted domain asset.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If a domain computer is stolen you then revoke that computers certificate in your Active Directory CA and they can no longer connect.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 14 Sep 2014 16:12:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29544#M21573</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2014-09-14T16:12:09Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Pre-Authentication with public SSL cert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29545#M21574</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;
&lt;P&gt;hshah wrote:&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Hi Darrent&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;If you are not interested in "Certificate based" Authentication than, following document is useless.&lt;/P&gt;
&lt;P&gt;&lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="5229" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-5229"&gt;https://live.paloaltonetworks.com/docs/DOC-5229&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;In your update it seems you are looking for AD based authentication, than configuration is much simpler. You just need following change in existing GP &lt;/SPAN&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;configuration&lt;/SPAN&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="line-height: 1.5em; color: #3b3b3b; font-size: 10pt; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;&lt;IMG alt="pre-login.png" class="image-0 jive-image" height="521" src="https://live.paloaltonetworks.com/legacyfs/online/15542_pre-login.png" style="height: 428px; width: 620px;" width="754" /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;Let me know if this helps you.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt;Hardik Shah&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="min-height: 8pt; height: 8pt; padding: 0px;"&gt;&lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif; font-size: 10pt; line-height: 1.5em;"&gt; &lt;/SPAN&gt; &lt;/P&gt;
&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hardik.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this all I have to change? Is there any requirement for modification on the remote end of the VPN client?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To clarify - if I do this, does this mean that the PC will pre-logon to the VPN prior to the user entering credentials into the Windows 7 login screen and run domain scripts etc?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry if I'm not being clear enough - I can't believe this could be that simple. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 00:21:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29545#M21574</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2014-09-15T00:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Pre-Authentication with public SSL cert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29546#M21575</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello &lt;SPAN style="color: #3b3b3b; font-family: 'Helvetica Neue', Helvetica, Arial, 'Lucida Grande', sans-serif;"&gt;Darrent,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The GlobalProtect pre-logon connect method is a feature that enables GlobalProtect to authenticate the agent and establish the VPN tunnel to the GlobalProtect gateway using a pre-installed machine certificate before the user has logged in. Because the tunnel is already established, domain scripts can be executed when the user logs in instead of using cached credentials.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With pre-logon, when an agent connects to the portal for the first time, the end user must authenticate (either via an authentication profile or a certificate profile configured to validate a client certificate containing a username). After authentication succeeds, the portal &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;ushes&lt;/SPAN&gt; the client configuration to the agent along with a cookie that will be used for portal authentication to receive a configuration refresh. Then, when a client system &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;attempts to connect in&lt;/SPAN&gt; pre-logon mode, it will use &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;cookie&lt;/SPAN&gt; to authenticate to the portal and receive its pre-logon &lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;client&lt;/SPAN&gt; configuration. Then, it will connect to the gateway specified in the configuration and authenticate using its machine certificate (as specified in a certificate profile configured &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;on&lt;/SPAN&gt; the gateway) and establish the VPN tunnel. When the end user subsequently logs in to the machine, if single sign-on (SSO) is enabled in the user-logon client configuration, the username will immediately be reported to the gateway so that the tunnel can be renamed and user- and group-based policy can be enforced.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;FYI.. &lt;SPAN class="GINGER_SOFTWARE_mark"&gt;a&lt;/SPAN&gt; reference DOC for more detail information: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-2020"&gt;GlobalProtect Configuration Tech Note&lt;/A&gt;&amp;nbsp;&amp;nbsp; --- page no 50&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 03:20:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29546#M21575</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-09-15T03:20:46Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Pre-Authentication with public SSL cert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29547#M21576</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hulk.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;OK, after reading that, it looks like I can deploy this using the same process I use to get Lync certificates to work - but the document indicates that if I enable pre-login, Global protect will reject login from devices which aren't configured with a certificate?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this the case - so if I enable pre-login, users can't connect to the VPN without having a valid machine certificate issued by the internal CA? Even if they have a valid Global Protect access?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Just looking to confirm this one way or another - we have some Mac users who use our VPN where I can't issue certificates (because they're not in the domain, for starters).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 03:39:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29547#M21576</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2014-09-15T03:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Pre-Authentication with public SSL cert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29548#M21577</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you are correct. Pre-logon is a feature which will authenticate the user and connect the PC to global protect with pre-installed user certificate before he logs into his machine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="GINGER_SOFTWARE_mark"&gt;Few&lt;/SPAN&gt; related discussion threads for your reference:&lt;/P&gt;&lt;P&gt; &lt;A href="https://live.paloaltonetworks.com/message/20893"&gt;Pre-Logon Global Protect&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/message/26561"&gt;GlobalProtect&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/message/21628"&gt;Re: Pre-Logon Global Protect&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 06:23:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29548#M21577</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-09-15T06:23:12Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Pre-Authentication with public SSL cert</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29549#M21578</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Darren,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;GP configuration is that simple, you do not need to do any changes on cilent end.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, you need a valid certificate in order for it too work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Hardik Shah&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 15 Sep 2014 11:58:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-pre-authentication-with-public-ssl-cert/m-p/29549#M21578</guid>
      <dc:creator>hshah</dc:creator>
      <dc:date>2014-09-15T11:58:23Z</dc:date>
    </item>
  </channel>
</rss>

