<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect Authentication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/178880#M55605</link>
    <description>Anyone else?</description>
    <pubDate>Wed, 27 Sep 2017 08:01:51 GMT</pubDate>
    <dc:creator>PerTenggren</dc:creator>
    <dc:date>2017-09-27T08:01:51Z</dc:date>
    <item>
      <title>Global Protect Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177508#M55346</link>
      <description>&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've a scenario where&amp;nbsp;the authentication methods needs to be different for some users connecting via Global Protect. Basically two options needs to be supported:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Certificate + username/password (LDAP) – Internal users&lt;/LI&gt;&lt;LI&gt;Username/password (LDAP) + 2FA (RADIUS) – External users (consultants etc.)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can this be setup with PAN?&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 07:02:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177508#M55346</guid>
      <dc:creator>PerTenggren</dc:creator>
      <dc:date>2017-09-19T07:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177515#M55347</link>
      <description>&lt;P&gt;just looking at this makes me think you will need seperate portals for internal users and external users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;purely because device/user certificate authentication is a global auth setting for the authentication tab in portal settings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if you include radius as an option then they will also require the same cert.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i assume you are talking about device certs and not user specific certs issued vi PKI.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;not sure about MFA on the portal but you can do secondary auth via policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also.. not sure why you would mix 2 factor radius with username password....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 07:54:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177515#M55347</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-09-19T07:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177523#M55350</link>
      <description>&lt;P&gt;Ok, is it possible to have multiple portals with the same IP but different FQDNs?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;also.. not sure why you would mix 2 factor radius with username password...."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;- I don't really understand this statement/question. PAN don't support native SecureID, that's why radius.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 08:44:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177523#M55350</guid>
      <dc:creator>PerTenggren</dc:creator>
      <dc:date>2017-09-19T08:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177525#M55351</link>
      <description>&lt;P&gt;no because the portal is based on the ip address of the interface.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;plus.. you can only have 1 certificate in your ssl/tls profile for that portal. (yes this can be a wildcard or SAN)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;you may be able to do something clever with a loopback address but well beyond my knowledge as this would require connecting on a different port via GP and I'm sure this is not possible unless anyone else can advise further.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for the same reason as&amp;nbsp;described earlier....&amp;nbsp;we have&amp;nbsp;different portals for laptop users, ipad users, 3rd party support and "loan laptops" as they all have a different mix of device certs, user certs via AD PKI, Radius and lDAP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 09:12:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177525#M55351</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-09-19T09:12:47Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177528#M55353</link>
      <description>&lt;P&gt;sorry..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;"also.. not sure why you would mix 2 factor radius with username password...."&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;- I don't really understand this statement/question. PAN don't support native SecureID, that's why radius.&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;yes I understand why you would use Radius but you stated an authentication process that used "username/password" &lt;STRONG&gt;and&amp;nbsp; &lt;/STRONG&gt;Radius.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;perhaps i missunderstood the statement..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Username/password (LDAP) + 2FA (RADIUS) – External users (consultants etc.)&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;i'm thinking Radius will include something you are, have and know, I have allways accepted this as acceptable for VPN auth.&lt;/P&gt;&lt;P&gt;but then, i don't work for you...&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 09:23:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177528#M55353</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-09-19T09:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177530#M55355</link>
      <description>&lt;P&gt;RADIUS will provide a&amp;nbsp;token from SecureID, othwise it's not a second factor compare to username/password.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 09:39:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177530#M55355</guid>
      <dc:creator>PerTenggren</dc:creator>
      <dc:date>2017-09-19T09:39:14Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177552#M55358</link>
      <description>&lt;P&gt;yes OK, been here before, difference between MF (multi Factor) = username and password, followed by radius.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;or 2F (two factor) =&amp;nbsp;username with a PIN and a passcode.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;how secure you make it is up to you.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for us we have similar but not via the portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;our 3rd paty support/contractors use 2F for VPN connection, the firewall policy lets them only go to specific addresses on specific ports, and then they use username and password to connect to the allowed device, usually RDP, FTP etc...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's up to you...&lt;/P&gt;</description>
      <pubDate>Tue, 19 Sep 2017 09:51:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/177552#M55358</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-09-19T09:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/178880#M55605</link>
      <description>Anyone else?</description>
      <pubDate>Wed, 27 Sep 2017 08:01:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication/m-p/178880#M55605</guid>
      <dc:creator>PerTenggren</dc:creator>
      <dc:date>2017-09-27T08:01:51Z</dc:date>
    </item>
  </channel>
</rss>

