<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic 2 Step RADIUS Auth Reliability in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/209061#M61139</link>
    <description>&lt;P&gt;We are trying to get 2FA RADIUS based authentication working with our Palo's and are seeing unreliable results. After much hunting and teeth gnashing we think we may have found the issue, but not the cause.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below is a debug dump from the RADIUS server (RSA AccessID) using Panorama GUI logon as the test case.&amp;nbsp; The first shows a good 2FA auth and the second a failing one; it looks as if the Palo is not correctly replacing the username attribute in the 2FA RADIUS request (assuming it's not a processing issue on the RADIUS server) so the request is being rejected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would anyone know anything about this?&amp;nbsp; We're particularily confused as it is not consistent - if it always failed I could chalk it up to a bug but it sometimes works and sometimes doesn't...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will be opening a TAC case but always like to get others users experiences in first!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;===========&lt;BR /&gt;GOOD AUTH&lt;BR /&gt;===========&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT color="#0000ff"&gt;First factor authentication (LDAP AD username\password) is successful&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2018-04-06/17:30:15.568/UTC [AuditEntryProcessor] INFO&amp;nbsp; RADIUSAUDIT[81] -&lt;BR /&gt;----------START_RADIUS_USER_LDAP_AUTHENTICATION----------&lt;BR /&gt;EVENTID=RADIUS_USER_LDAP_AUTHENTICATION&lt;BR /&gt;DATETIME=Fri Apr 06 17:30:15 UTC 2018&lt;BR /&gt;IN_RESPONSE_TO=ed53938a-4193-4a8e-83fe-901b39d3f4ef&lt;BR /&gt;DESCRIPTION=RADIUS â€“ LDAP authentication succeeded.&lt;BR /&gt;NAS-IP-ADDRESS=&amp;lt;snip&amp;gt;&lt;BR /&gt;USER_NAME=jbloggs&lt;BR /&gt;CLIENT_ID=RADIUS: Panorama&lt;BR /&gt;RADIUS_RESPONSE_TYPE=Access-Challenge&lt;BR /&gt;STATUS=SUCCESS&lt;BR /&gt;REQUEST_ID=ed53938a-4193-4a8e-83fe-901b39d3f4ef&lt;BR /&gt;POLICY_ID=Global Protect Employee VPN&lt;BR /&gt;TENANT_ID=&amp;lt;snip&amp;gt;&lt;BR /&gt;----------END_RADIUS_USER_LDAP_AUTHENTICATION----------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;FONT color="#0000ff"&gt;Second factor authentication (mobile push) is successful - &lt;U&gt;and the username has been replaced with the 2FA method&lt;/U&gt;&lt;/FONT&gt;&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2018-04-06/17:30:27.973/UTC [AuditEntryProcessor] INFO&amp;nbsp; RADIUSAUDIT[81] -&lt;BR /&gt;----------START_RADIUS_USER_APPROVE_AUTHENTICATION----------&lt;BR /&gt;EVENTID=RADIUS_USER_APPROVE_AUTHENTICATION&lt;BR /&gt;DATETIME=Fri Apr 06 17:30:27 UTC 2018&lt;BR /&gt;IN_RESPONSE_TO=f6f3c7df-0ae1-4c36-bb62-0e4df22db374&lt;BR /&gt;DESCRIPTION=RADIUS â€“ Approve method authentication succeeded.&lt;BR /&gt;NAS-IP-ADDRESS=&amp;lt;snip&amp;gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;&lt;STRONG&gt;USER_NAME=&lt;U&gt;MOBILE_METHOD_REFERENCE_ID&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;CLIENT_ID=RADIUS: Panorama&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#0000ff"&gt;RADIUS_RESPONSE_TYPE=Access-Accept&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;STATUS=SUCCESS&lt;BR /&gt;REQUEST_ID=f6f3c7df-0ae1-4c36-bb62-0e4df22db374&lt;BR /&gt;POLICY_ID=Global Protect Employee VPN&lt;BR /&gt;TENANT_ID=&amp;lt;snip&amp;gt;&lt;BR /&gt;----------END_RADIUS_USER_APPROVE_AUTHENTICATION----------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;=========&lt;BR /&gt;BAD AUTH&lt;BR /&gt;=========&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;&lt;I&gt;First factor authentication (LDAP AD username\password) is successful&lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2018-04-06/17:30:59.015/UTC [AuditEntryProcessor] INFO&amp;nbsp; RADIUSAUDIT[81] -&lt;BR /&gt;----------START_RADIUS_USER_LDAP_AUTHENTICATION----------&lt;BR /&gt;EVENTID=RADIUS_USER_LDAP_AUTHENTICATION&lt;BR /&gt;DATETIME=Fri Apr 06 17:30:59 UTC 2018&lt;BR /&gt;IN_RESPONSE_TO=3e86e627-7498-4663-8fb1-59c6a00707da&lt;BR /&gt;DESCRIPTION=RADIUS â€“ LDAP authentication succeeded.&lt;BR /&gt;NAS-IP-ADDRESS=&amp;lt;snip&amp;gt;&lt;BR /&gt;USER_NAME=jbloggs&lt;BR /&gt;CLIENT_ID=RADIUS: Panorama&lt;BR /&gt;RADIUS_RESPONSE_TYPE=Access-Challenge&lt;BR /&gt;STATUS=SUCCESS&lt;BR /&gt;REQUEST_ID=3e86e627-7498-4663-8fb1-59c6a00707da&lt;BR /&gt;POLICY_ID=Global Protect Employee VPN&lt;BR /&gt;TENANT_ID=&amp;lt;snip&amp;gt;&lt;BR /&gt;----------END_RADIUS_USER_LDAP_AUTHENTICATION----------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;FONT color="#ff0000"&gt;Second factor authentication&amp;nbsp;fails - and the username has not been replaced.&lt;/FONT&gt;&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2018-04-06/17:31:04.017/UTC [AuditEntryProcessor] INFO&amp;nbsp; RADIUSAUDIT[81] -&lt;BR /&gt;----------START_RADIUS_USER_APPROVE_AUTHENTICATION----------&lt;BR /&gt;EVENTID=RADIUS_USER_APPROVE_AUTHENTICATION&lt;BR /&gt;DATETIME=Fri Apr 06 17:31:04 UTC 2018&lt;BR /&gt;IN_RESPONSE_TO=cfd1f7ae-13d4-494a-9d4d-6cd1584f4475&lt;BR /&gt;DESCRIPTION=RADIUS â€“ Approve method authentication failed.&lt;BR /&gt;NAS-IP-ADDRESS=&amp;lt;snip&amp;gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#ff0000"&gt;USER_NAME=jbloggs&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;CLIENT_ID=RADIUS: Panorama&lt;BR /&gt;&lt;FONT color="#ff0000"&gt;&lt;STRONG&gt;RADIUS_RESPONSE_TYPE=Access-Reject&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;STATUS=FAIL&lt;BR /&gt;REQUEST_ID=cfd1f7ae-13d4-494a-9d4d-6cd1584f4475&lt;BR /&gt;POLICY_ID=Global Protect Employee VPN&lt;BR /&gt;TENANT_ID=&amp;lt;snip&amp;gt;&lt;BR /&gt;----------END_RADIUS_USER_APPROVE_AUTHENTICATION----------&lt;/P&gt;</description>
    <pubDate>Fri, 06 Apr 2018 18:05:03 GMT</pubDate>
    <dc:creator>apackard</dc:creator>
    <dc:date>2018-04-06T18:05:03Z</dc:date>
    <item>
      <title>2 Step RADIUS Auth Reliability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/209061#M61139</link>
      <description>&lt;P&gt;We are trying to get 2FA RADIUS based authentication working with our Palo's and are seeing unreliable results. After much hunting and teeth gnashing we think we may have found the issue, but not the cause.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The below is a debug dump from the RADIUS server (RSA AccessID) using Panorama GUI logon as the test case.&amp;nbsp; The first shows a good 2FA auth and the second a failing one; it looks as if the Palo is not correctly replacing the username attribute in the 2FA RADIUS request (assuming it's not a processing issue on the RADIUS server) so the request is being rejected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would anyone know anything about this?&amp;nbsp; We're particularily confused as it is not consistent - if it always failed I could chalk it up to a bug but it sometimes works and sometimes doesn't...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will be opening a TAC case but always like to get others users experiences in first!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;===========&lt;BR /&gt;GOOD AUTH&lt;BR /&gt;===========&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;FONT color="#0000ff"&gt;First factor authentication (LDAP AD username\password) is successful&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;2018-04-06/17:30:15.568/UTC [AuditEntryProcessor] INFO&amp;nbsp; RADIUSAUDIT[81] -&lt;BR /&gt;----------START_RADIUS_USER_LDAP_AUTHENTICATION----------&lt;BR /&gt;EVENTID=RADIUS_USER_LDAP_AUTHENTICATION&lt;BR /&gt;DATETIME=Fri Apr 06 17:30:15 UTC 2018&lt;BR /&gt;IN_RESPONSE_TO=ed53938a-4193-4a8e-83fe-901b39d3f4ef&lt;BR /&gt;DESCRIPTION=RADIUS â€“ LDAP authentication succeeded.&lt;BR /&gt;NAS-IP-ADDRESS=&amp;lt;snip&amp;gt;&lt;BR /&gt;USER_NAME=jbloggs&lt;BR /&gt;CLIENT_ID=RADIUS: Panorama&lt;BR /&gt;RADIUS_RESPONSE_TYPE=Access-Challenge&lt;BR /&gt;STATUS=SUCCESS&lt;BR /&gt;REQUEST_ID=ed53938a-4193-4a8e-83fe-901b39d3f4ef&lt;BR /&gt;POLICY_ID=Global Protect Employee VPN&lt;BR /&gt;TENANT_ID=&amp;lt;snip&amp;gt;&lt;BR /&gt;----------END_RADIUS_USER_LDAP_AUTHENTICATION----------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;FONT color="#0000ff"&gt;Second factor authentication (mobile push) is successful - &lt;U&gt;and the username has been replaced with the 2FA method&lt;/U&gt;&lt;/FONT&gt;&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2018-04-06/17:30:27.973/UTC [AuditEntryProcessor] INFO&amp;nbsp; RADIUSAUDIT[81] -&lt;BR /&gt;----------START_RADIUS_USER_APPROVE_AUTHENTICATION----------&lt;BR /&gt;EVENTID=RADIUS_USER_APPROVE_AUTHENTICATION&lt;BR /&gt;DATETIME=Fri Apr 06 17:30:27 UTC 2018&lt;BR /&gt;IN_RESPONSE_TO=f6f3c7df-0ae1-4c36-bb62-0e4df22db374&lt;BR /&gt;DESCRIPTION=RADIUS â€“ Approve method authentication succeeded.&lt;BR /&gt;NAS-IP-ADDRESS=&amp;lt;snip&amp;gt;&lt;BR /&gt;&lt;FONT color="#0000ff"&gt;&lt;STRONG&gt;USER_NAME=&lt;U&gt;MOBILE_METHOD_REFERENCE_ID&lt;/U&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;CLIENT_ID=RADIUS: Panorama&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#0000ff"&gt;RADIUS_RESPONSE_TYPE=Access-Accept&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;STATUS=SUCCESS&lt;BR /&gt;REQUEST_ID=f6f3c7df-0ae1-4c36-bb62-0e4df22db374&lt;BR /&gt;POLICY_ID=Global Protect Employee VPN&lt;BR /&gt;TENANT_ID=&amp;lt;snip&amp;gt;&lt;BR /&gt;----------END_RADIUS_USER_APPROVE_AUTHENTICATION----------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;=========&lt;BR /&gt;BAD AUTH&lt;BR /&gt;=========&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#ff0000"&gt;&lt;I&gt;First factor authentication (LDAP AD username\password) is successful&lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2018-04-06/17:30:59.015/UTC [AuditEntryProcessor] INFO&amp;nbsp; RADIUSAUDIT[81] -&lt;BR /&gt;----------START_RADIUS_USER_LDAP_AUTHENTICATION----------&lt;BR /&gt;EVENTID=RADIUS_USER_LDAP_AUTHENTICATION&lt;BR /&gt;DATETIME=Fri Apr 06 17:30:59 UTC 2018&lt;BR /&gt;IN_RESPONSE_TO=3e86e627-7498-4663-8fb1-59c6a00707da&lt;BR /&gt;DESCRIPTION=RADIUS â€“ LDAP authentication succeeded.&lt;BR /&gt;NAS-IP-ADDRESS=&amp;lt;snip&amp;gt;&lt;BR /&gt;USER_NAME=jbloggs&lt;BR /&gt;CLIENT_ID=RADIUS: Panorama&lt;BR /&gt;RADIUS_RESPONSE_TYPE=Access-Challenge&lt;BR /&gt;STATUS=SUCCESS&lt;BR /&gt;REQUEST_ID=3e86e627-7498-4663-8fb1-59c6a00707da&lt;BR /&gt;POLICY_ID=Global Protect Employee VPN&lt;BR /&gt;TENANT_ID=&amp;lt;snip&amp;gt;&lt;BR /&gt;----------END_RADIUS_USER_LDAP_AUTHENTICATION----------&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;I&gt;&lt;FONT color="#ff0000"&gt;Second factor authentication&amp;nbsp;fails - and the username has not been replaced.&lt;/FONT&gt;&lt;/I&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2018-04-06/17:31:04.017/UTC [AuditEntryProcessor] INFO&amp;nbsp; RADIUSAUDIT[81] -&lt;BR /&gt;----------START_RADIUS_USER_APPROVE_AUTHENTICATION----------&lt;BR /&gt;EVENTID=RADIUS_USER_APPROVE_AUTHENTICATION&lt;BR /&gt;DATETIME=Fri Apr 06 17:31:04 UTC 2018&lt;BR /&gt;IN_RESPONSE_TO=cfd1f7ae-13d4-494a-9d4d-6cd1584f4475&lt;BR /&gt;DESCRIPTION=RADIUS â€“ Approve method authentication failed.&lt;BR /&gt;NAS-IP-ADDRESS=&amp;lt;snip&amp;gt;&lt;BR /&gt;&lt;STRONG&gt;&lt;FONT color="#ff0000"&gt;USER_NAME=jbloggs&lt;/FONT&gt;&lt;/STRONG&gt;&lt;BR /&gt;CLIENT_ID=RADIUS: Panorama&lt;BR /&gt;&lt;FONT color="#ff0000"&gt;&lt;STRONG&gt;RADIUS_RESPONSE_TYPE=Access-Reject&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;STATUS=FAIL&lt;BR /&gt;REQUEST_ID=cfd1f7ae-13d4-494a-9d4d-6cd1584f4475&lt;BR /&gt;POLICY_ID=Global Protect Employee VPN&lt;BR /&gt;TENANT_ID=&amp;lt;snip&amp;gt;&lt;BR /&gt;----------END_RADIUS_USER_APPROVE_AUTHENTICATION----------&lt;/P&gt;</description>
      <pubDate>Fri, 06 Apr 2018 18:05:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/209061#M61139</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2018-04-06T18:05:03Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Step RADIUS Auth Reliability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/209080#M61141</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I would look to see how the second radius server is looking the username format. I have seen it as domain\username before and it has caught me out. Also make sure that the radius traffic is allowed by firewall policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 06 Apr 2018 18:28:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/209080#M61141</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2018-04-06T18:28:21Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Step RADIUS Auth Reliability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/209106#M61145</link>
      <description>&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've also seen the format sensitivty (it is especially annoying as a failed transparent auth presents a pop-up to enter username\password and it seems to automatically populate the username in domain\name format so we're going to have to educate users to delete the domain portion!).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To be concise however, the second RADIUS auth request is going to the same server (no load balancing etc).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've done some packet captures of good (left hand) and failing (right hand) sequences.&amp;nbsp; In both cases everything looks good in terms of expected flows (request -&amp;gt; challenge -&amp;gt; request -&amp;gt; result, challenge 'state token' presented at step 2 and re-presented at step 3, MFA option passed in the password field of step 3) but when it fails it does so in &amp;lt;1ms.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is too short (as far as we can tell) for it to try and check the '1' as a password.&amp;nbsp; We're leaning more towards the RSA RADIUS server having the issue as that seems to be where the actual error is triggered, but cannot discount there is something off with the request that causes it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="radius-captures.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14663i2F2DD4965733B367/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="radius-captures.png" alt="radius-captures.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 07 Apr 2018 00:05:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/209106#M61145</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2018-04-07T00:05:12Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Step RADIUS Auth Reliability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/209107#M61146</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/6173"&gt;@apackard&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It actually looked more like a RADIUS server issue to me since the first post in this topic, mainly because the LDAP verification works in both cases and the "error" then happens somehow with the second factor.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What you could do for further troubleshooting is try to reproduce the issue with a tool like this one here:&amp;nbsp;&lt;A href="https://www.novell.com/coolsolutions/tools/14377.html" target="_blank"&gt;https://www.novell.com/coolsolutions/tools/14377.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(Already old but still good)&lt;/P&gt;&lt;P&gt;Maybe this way you are able to find the thing that leads to the access-reject on your radius.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;</description>
      <pubDate>Sat, 07 Apr 2018 07:26:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/209107#M61146</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-04-07T07:26:51Z</dc:date>
    </item>
    <item>
      <title>Re: 2 Step RADIUS Auth Reliability</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/214018#M62217</link>
      <description>&lt;P&gt;Update to close this one down.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It was an issue with the 2FA provider - the intermediate RADIUS server was randomly rejecting the 2nd factor auth before it had even been attempted!&lt;/P&gt;</description>
      <pubDate>Fri, 11 May 2018 12:47:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/2-step-radius-auth-reliability/m-p/214018#M62217</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2018-05-11T12:47:15Z</dc:date>
    </item>
  </channel>
</rss>

