<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: About PinSafe OTP for SSLVPN of PA in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/about-pinsafe-otp-for-sslvpn-of-pa/m-p/50027#M36820</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We currently do not have any additional documentation on this solution. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 26 Mar 2011 03:19:00 GMT</pubDate>
    <dc:creator>gsamuels</dc:creator>
    <dc:date>2011-03-26T03:19:00Z</dc:date>
    <item>
      <title>About PinSafe OTP for SSLVPN of PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-pinsafe-otp-for-sslvpn-of-pa/m-p/50026#M36819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Our customer who want to PinSafe OTP for SSLVPN of PA like a Nordic-Edge.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I found that PA with OTP solution from community that only provided info of Nordic-Edge, RSA Secure-ID.so I want to know or get a guideline of PINSAFE OTP solution to use SSLVPN of PA.&lt;BR /&gt;&lt;SPAN&gt;I noticed the Nordic-Edge OTP solution that check a user-id, password and OTP string. Customer want to 2 times user validation check like a Nordic-Edge SSLVPN solution.(&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://nordicedge.se/palo-alto"&gt;http://nordicedge.se/palo-alto&lt;/A&gt;&lt;SPAN&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please give me a info for PinSafe OTP solution if you are having some info about this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Roh.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 Mar 2011 08:27:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-pinsafe-otp-for-sslvpn-of-pa/m-p/50026#M36819</guid>
      <dc:creator>ttongfly</dc:creator>
      <dc:date>2011-03-25T08:27:02Z</dc:date>
    </item>
    <item>
      <title>Re: About PinSafe OTP for SSLVPN of PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-pinsafe-otp-for-sslvpn-of-pa/m-p/50027#M36820</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We currently do not have any additional documentation on this solution. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Mar 2011 03:19:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-pinsafe-otp-for-sslvpn-of-pa/m-p/50027#M36820</guid>
      <dc:creator>gsamuels</dc:creator>
      <dc:date>2011-03-26T03:19:00Z</dc:date>
    </item>
    <item>
      <title>Re: About PinSafe OTP for SSLVPN of PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-pinsafe-otp-for-sslvpn-of-pa/m-p/50028#M36821</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PAN SSL VPN supports RADIUS Authentication and pinsafe OTP can be configed as RADIUS Server.&lt;/P&gt;&lt;P&gt;I also find a document about pinsafe OTP integrated with ASA in the url below.&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://kb.swivelsecure.com/wiki/index.php/Cisco_ASA_Integration#Configuring_the_RADIUS_server"&gt;http://kb.swivelsecure.com/wiki/index.php/Cisco_ASA_Integration#Configuring_the_RADIUS_server&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(&lt;A href="http://kb.swivelsecure.com/wiki/index.php/Cisco_ASA_Integration#PINsafe_Configuration"&gt;5 PINsafe Configuration&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;Also, there should be 16 characters limitation on PAN.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 23 Apr 2011 14:18:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-pinsafe-otp-for-sslvpn-of-pa/m-p/50028#M36821</guid>
      <dc:creator>bobby549049</dc:creator>
      <dc:date>2011-04-23T14:18:00Z</dc:date>
    </item>
    <item>
      <title>Re: About PinSafe OTP for SSLVPN of PA</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/about-pinsafe-otp-for-sslvpn-of-pa/m-p/50029#M36822</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi guys.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I experienced PAN SSLVPN with Pinsafe OTP that support PaloAlto SSLVPN.&lt;/P&gt;&lt;P&gt;PAN SSLVPN configured authentication profile using radius protocol to communicate Pinsafe OTP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;NordicEdge OTP could support 2 factor authentication. When user try to connect SSLVPN of PAN, SSL VPN portal asked AD login id and password authentication and then asked OTP passcode authentication.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PinSafe OTP also could support above function, 2 factor authentication,&amp;nbsp; and I was done successfully integrated PAN SSLVPN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Regards.&lt;/P&gt;&lt;P&gt;Roh.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 26 Mar 2012 14:48:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/about-pinsafe-otp-for-sslvpn-of-pa/m-p/50029#M36822</guid>
      <dc:creator>ttongfly</dc:creator>
      <dc:date>2012-03-26T14:48:49Z</dc:date>
    </item>
  </channel>
</rss>

