<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Two factor issues after upgrading to GlobalProtect 3.x in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-issues-after-upgrading-to-globalprotect-3-x/m-p/76470#M42327</link>
    <description>&lt;P&gt;I do belive I have found how to resolve this issue in our case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The autentication profile for RADIUS used a username modifier, which used to be&amp;nbsp;%USERINPUT%@%USERDOMAIN%, and which was working just fine in GlobalProtect 2.3.4.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For GlobalProtect 3.0.1 %USERDOMAIN%\%USERINPUT% and using the NetBIOS name of our domain in the user domain field &amp;nbsp;seems to be the correct modifier in our case.&lt;/P&gt;</description>
    <pubDate>Fri, 15 Apr 2016 11:44:45 GMT</pubDate>
    <dc:creator>arvesynd</dc:creator>
    <dc:date>2016-04-15T11:44:45Z</dc:date>
    <item>
      <title>Two factor issues after upgrading to GlobalProtect 3.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-issues-after-upgrading-to-globalprotect-3-x/m-p/76466#M42324</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After doing an upgrade from GlobalProtect 2.3.4 to 3.0.1 we're having issues with users not being able to do two factor authentication in combination with SSO.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The software we're running is SecurEnvoy, which has been working fine up to the client update.&lt;/P&gt;
&lt;P&gt;Firewalls are running PAN-OS 7.0.5-h2.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;SecurEnvoy responds as it should, and sends the code to the user's phone, but from there the client times out and reverts to the automatic gateway.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have anyone else encountered issues with the latest GlobalProtect? Are the new GlobalProtect client dependant on PAN-OS 7.1?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Agent log:&lt;/STRONG&gt;&lt;BR /&gt;(T6200) 04/15/16 10:23:18:305 Info (2468): PanWinhttpCallback(dwInternetStatus=WINHTTP_CALLBACK_STATUS_RECEIVING_RESPONSE, this=0000000002340100)&lt;BR /&gt;(T6200) 04/15/16 10:23:18:305 Info (2468): PanWinhttpCallback(dwInternetStatus=WINHTTP_CALLBACK_STATUS_REQUEST_ERROR, this=0000000002340100)&lt;BR /&gt;(T6200) 04/15/16 10:23:18:305 Debug(2549): WINHTTP_CALLBACK_STATUS_REQUEST_ERROR, error=12152, result=1, dwCertificateError=0&lt;BR /&gt;(T6200) 04/15/16 10:23:18:414 Info (1573): get WINHTTP_CALLBACK_STATUS_REQUEST_ERROR while waitting for header, error=12152, ERROR_WINHTTP_INVALID_SERVER_RESPONSE!&lt;BR /&gt;(T6200) 04/15/16 10:23:18:414 Error(3595): winhttpObj, error! ipaddress REMOVED&lt;BR /&gt;bRetryWithoutCert is 0, bClientCertNeeded=0 &lt;BR /&gt;(T6200) 04/15/16 10:23:18:414 Info (2468): PanWinhttpCallback(dwInternetStatus=WINHTTP_CALLBACK_STATUS_HANDLE_CLOSING, this=0000000002340100)&lt;BR /&gt;(T6200) 04/15/16 10:23:18:414 Debug(2567): handle 0057c060 closed&lt;BR /&gt;(T6200) 04/15/16 10:23:18:414 Debug(2571): REUSE, request closed&lt;BR /&gt;(T6200) 04/15/16 10:23:18:414 Info ( 561): wait for closing callback success!&lt;BR /&gt;(T1396) 04/15/16 10:23:18:414 Debug( 516): Command = &amp;lt;request&amp;gt;&amp;lt;type&amp;gt;https_request&amp;lt;/type&amp;gt;&amp;lt;result&amp;gt;NULL&amp;lt;/result&amp;gt;&amp;lt;/request&amp;gt;&lt;BR /&gt;(T1396) 04/15/16 10:23:18:414 Debug( 62): OnReceive error=0&lt;BR /&gt;(T1396) 04/15/16 10:23:18:414 Debug( 62): OnReceive error=0&lt;BR /&gt;(T1396) 04/15/16 10:23:18:414 Debug( 950): status message received from the service:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Service log:&lt;/STRONG&gt;&lt;BR /&gt;(T12176) 04/15/16 10:22:54:792 Debug( 319): PanGpHipMp.exe exit for checking misssing patches.&lt;BR /&gt;(T12176) 04/15/16 10:22:54:792 Debug( 387): CheckHipMissingPatchInOtherProcess(): exits.&lt;BR /&gt;(T12176) 04/15/16 10:22:54:792 Debug( 467): Hip missing patch checking duration is 34&lt;BR /&gt;(T10600) 04/15/16 10:22:58:134 Debug(2401): receive pan_msg_ping, 3&lt;BR /&gt;(T10600) 04/15/16 10:23:08:191 Debug(2401): receive pan_msg_ping, 3&lt;BR /&gt;(T10600) 04/15/16 10:23:18:258 Debug(2401): receive pan_msg_ping, 3&lt;BR /&gt;(T10600) 04/15/16 10:23:18:414 Debug(2559): HTTP_RPC, len=0, result is &lt;BR /&gt;(NULL)...&lt;BR /&gt;(T10600) 04/15/16 10:23:18:414 Error(2785): pszXmlConfig is NULL. 4278&lt;BR /&gt;(T10600) 04/15/16 10:23:18:414 Debug(2857): pszXmlConfig is NULL, m_bInvalidUserCredential is false.&lt;BR /&gt;(T10600) 04/15/16 10:23:18:414 Error(1650): Failed to retrieve info for gateway REMOVED&lt;BR /&gt;(T10600) 04/15/16 10:23:18:414 Debug(1803): close WinHttp close handle.&lt;BR /&gt;(T10600) 04/15/16 10:23:18:414 Debug(1657): tunnel to REMOVED is not created.&lt;BR /&gt;(T10600) 04/15/16 10:23:18:414 Debug(3721): Set state to Disconnected&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2016 09:10:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-issues-after-upgrading-to-globalprotect-3-x/m-p/76466#M42324</guid>
      <dc:creator>arvesynd</dc:creator>
      <dc:date>2016-04-15T09:10:48Z</dc:date>
    </item>
    <item>
      <title>Re: Two factor issues after upgrading to GlobalProtect 3.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-issues-after-upgrading-to-globalprotect-3-x/m-p/76469#M42326</link>
      <description>&lt;P&gt;The temporary workaround&amp;nbsp;is to have the users enter their username and password in the GlobalProtect agent, which seems to make everything work as it used to.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2016 10:49:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-issues-after-upgrading-to-globalprotect-3-x/m-p/76469#M42326</guid>
      <dc:creator>arvesynd</dc:creator>
      <dc:date>2016-04-15T10:49:15Z</dc:date>
    </item>
    <item>
      <title>Re: Two factor issues after upgrading to GlobalProtect 3.x</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-issues-after-upgrading-to-globalprotect-3-x/m-p/76470#M42327</link>
      <description>&lt;P&gt;I do belive I have found how to resolve this issue in our case.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The autentication profile for RADIUS used a username modifier, which used to be&amp;nbsp;%USERINPUT%@%USERDOMAIN%, and which was working just fine in GlobalProtect 2.3.4.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For GlobalProtect 3.0.1 %USERDOMAIN%\%USERINPUT% and using the NetBIOS name of our domain in the user domain field &amp;nbsp;seems to be the correct modifier in our case.&lt;/P&gt;</description>
      <pubDate>Fri, 15 Apr 2016 11:44:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-issues-after-upgrading-to-globalprotect-3-x/m-p/76470#M42327</guid>
      <dc:creator>arvesynd</dc:creator>
      <dc:date>2016-04-15T11:44:45Z</dc:date>
    </item>
  </channel>
</rss>

