<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect with MFA Dual Authentication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-mfa-dual-authentication/m-p/239116#M68490</link>
    <description>&lt;P&gt;We have a Security policy in place that allows all known GP users access to the vpn_private zone (any/any). We have a no decrypt policy in place for skype traffic all other traffic is decrypted. Finally we have specific authentication policies in place for specific corporate resources based on port/ destination IP&lt;/P&gt;</description>
    <pubDate>Thu, 08 Nov 2018 18:41:13 GMT</pubDate>
    <dc:creator>mwagnerbi1</dc:creator>
    <dc:date>2018-11-08T18:41:13Z</dc:date>
    <item>
      <title>GlobalProtect with MFA Dual Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-mfa-dual-authentication/m-p/238949#M68447</link>
      <description>&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;We have set up a GP slit tunnel we allow SSO using LDAP and Certificate based authentication this allows access to everything in the corporate network. However for applications we have specifically listed by service and destination we have created additional authentication rules that force the user to authenticate using a MFA (Entrust) method through the captive portal. We are having issues narrowing down the DFS file share traffic to create a specific authentication rule. Our goal is to only allow corporate network file share access from a Windows 10 client after the additional MFA authentication has been successful. At the moment the traffic is accessible without the additional MFA (ENTRUST) authentication – HELP! &lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2018 20:00:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-mfa-dual-authentication/m-p/238949#M68447</guid>
      <dc:creator>mwagnerbi1</dc:creator>
      <dc:date>2018-11-07T20:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect with MFA Dual Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-mfa-dual-authentication/m-p/239007#M68459</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/61531"&gt;@mwagnerbi1&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Can you share how you have your current policy setup.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 02:07:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-mfa-dual-authentication/m-p/239007#M68459</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-11-08T02:07:36Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect with MFA Dual Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-mfa-dual-authentication/m-p/239116#M68490</link>
      <description>&lt;P&gt;We have a Security policy in place that allows all known GP users access to the vpn_private zone (any/any). We have a no decrypt policy in place for skype traffic all other traffic is decrypted. Finally we have specific authentication policies in place for specific corporate resources based on port/ destination IP&lt;/P&gt;</description>
      <pubDate>Thu, 08 Nov 2018 18:41:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-with-mfa-dual-authentication/m-p/239116#M68490</guid>
      <dc:creator>mwagnerbi1</dc:creator>
      <dc:date>2018-11-08T18:41:13Z</dc:date>
    </item>
  </channel>
</rss>

