<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Adding MFA to Pre-login GlobalProtect in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/adding-mfa-to-pre-login-globalprotect/m-p/213956#M62204</link>
    <description>&lt;P&gt;I think there is no real solution for you in this case, except that you disable pre-logon if there isn't enough security for you.&lt;/P&gt;&lt;P&gt;It's probably about the question: do you trust the loginscreens of windows and mac? If not, then change everything to user-logon and there will be no connection to your internal network until the uset is successfully authenticated.&lt;/P&gt;</description>
    <pubDate>Thu, 10 May 2018 17:58:16 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-05-10T17:58:16Z</dc:date>
    <item>
      <title>Adding MFA to Pre-login GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-mfa-to-pre-login-globalprotect/m-p/211501#M61699</link>
      <description>&lt;P&gt;&lt;FONT color="#003366"&gt;Global Protect VPN Solution is defined with Pre-login and always-on VPN features.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#003366"&gt;&lt;STRONG&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="GP.PNG" style="width: 628px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/14845i4C4BB5C985AE8936/image-dimensions/628x250/is-moderation-mode/true?v=v2" width="628" height="250" role="button" title="GP.PNG" alt="GP.PNG" /&gt;&lt;/span&gt;&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#003366"&gt;&lt;STRONG&gt;Workflow&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT color="#003366"&gt;Once machine is booted and before user login, Machine is authenticated based on certificate and identified in logs with (Pre-login) user&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#003366"&gt;Pre-login access is restricted to Mac Management solution and AD.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#003366"&gt;Once user is logged in, a new tunnel is initiated and authenticated by same certificate with ability to identitfy username in certificate to be added to user-ip mapping table&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#003366"&gt;User group Access rules is created to match only specific user group to access internal resources.&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT color="#993300"&gt;&lt;STRONG&gt;Required&lt;/STRONG&gt;: MFA integration With Pre-login&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;My main scope is to add more strong authentication mechanism, as with pre-logon,&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;Step1: machine are authentication and authorized once it boots up baed on First Authentication factor (&lt;STRONG&gt;Client-Certificate&lt;/STRONG&gt;) to access AD servers.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;Step2: adding to that Second factor Authentication Factor &lt;STRONG&gt;Credential logins&lt;/STRONG&gt; to be able to open the laptop itself.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;In case of Client-&lt;/FONT&gt;&lt;FONT color="#008000"&gt;Certificate is compromised then attacker can import it to its machine and do step1 then step2 (as device credentials is already know to attacker - already his machine-).&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;FONT color="#003366"&gt;&lt;STRONG&gt;Proposal A&lt;/STRONG&gt;:&lt;/FONT&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;FONT color="#003366"&gt;If we applied it with pre-login , I think it won’t be suitable as machine is already authenticated and any traffic is blocked except for specific Destinations as AD.&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT color="#003366"&gt;Once users log in , maybe here we can apply Authentication security policy declares for access to internal resource we need MFA.&lt;/FONT&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;So &lt;/FONT&gt;&lt;FONT color="#008000"&gt;with My proposal A , attacker can still connected through VPN. maybe he doesn`t have access to internal resources without Valid OTP but he stills can do DOS attack to bring down my service.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#008000"&gt;So hope it is a good challenge for you to think about &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; .... &lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2018 10:59:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-mfa-to-pre-login-globalprotect/m-p/211501#M61699</guid>
      <dc:creator>Ahmed_Eissa</dc:creator>
      <dc:date>2018-04-24T10:59:27Z</dc:date>
    </item>
    <item>
      <title>Re: Adding MFA to Pre-login GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-mfa-to-pre-login-globalprotect/m-p/211546#M61713</link>
      <description>&lt;P&gt;any recommendations?&lt;/P&gt;</description>
      <pubDate>Tue, 24 Apr 2018 15:58:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-mfa-to-pre-login-globalprotect/m-p/211546#M61713</guid>
      <dc:creator>Ahmed_Eissa</dc:creator>
      <dc:date>2018-04-24T15:58:03Z</dc:date>
    </item>
    <item>
      <title>Re: Adding MFA to Pre-login GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-mfa-to-pre-login-globalprotect/m-p/213956#M62204</link>
      <description>&lt;P&gt;I think there is no real solution for you in this case, except that you disable pre-logon if there isn't enough security for you.&lt;/P&gt;&lt;P&gt;It's probably about the question: do you trust the loginscreens of windows and mac? If not, then change everything to user-logon and there will be no connection to your internal network until the uset is successfully authenticated.&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 17:58:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-mfa-to-pre-login-globalprotect/m-p/213956#M62204</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-05-10T17:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: Adding MFA to Pre-login GlobalProtect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/adding-mfa-to-pre-login-globalprotect/m-p/213960#M62205</link>
      <description>&lt;P&gt;TLDR version of this exact question at my organization: Use 2FA on the windows login instead of GP if 2FA is desired in this configuration&lt;/P&gt;</description>
      <pubDate>Thu, 10 May 2018 19:05:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/adding-mfa-to-pre-login-globalprotect/m-p/213960#M62205</guid>
      <dc:creator>hshawn</dc:creator>
      <dc:date>2018-05-10T19:05:29Z</dc:date>
    </item>
  </channel>
</rss>

