<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Native Duo 2FA for GlobalProtect can't select Auth Profile or Auth Policy Zone in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/native-duo-2fa-for-globalprotect-can-t-select-auth-profile-or/m-p/302953#M78903</link>
    <description>&lt;P&gt;I'm moving to LDAP auth with Duo 2FA. We need a better answer than RADIUS as we've found Duo's Authentication Proxy functionally limited and crash-prone. Using &lt;A href="https://live.paloaltonetworks.com/t5/Blogs/Duo-Multi-Factor-Authentication-MFA/ba-p/153420" target="_blank" rel="noopener"&gt;Mitch Densley's video guide for PAN-OS 8.x&lt;/A&gt; as a starting point, I've gotten my Duo application set up, along with an authentication profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, when I try to create an Authentication Enforcement object, my Duoized authentication profile doesn't appear on the menu (only "None"). If I skip that step momentarily and try to create an authentication policy, I can't select the zone my captive portal interface is in. &amp;nbsp;Can't tell what I'm missing or how my environment differs from the how-to-- I'm using PAN-OS 9.0.4 in an HA cluster managed by Panorama.&lt;/P&gt;</description>
    <pubDate>Tue, 10 Dec 2019 16:40:07 GMT</pubDate>
    <dc:creator>Andrew.Vernon</dc:creator>
    <dc:date>2019-12-10T16:40:07Z</dc:date>
    <item>
      <title>Native Duo 2FA for GlobalProtect can't select Auth Profile or Auth Policy Zone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/native-duo-2fa-for-globalprotect-can-t-select-auth-profile-or/m-p/302953#M78903</link>
      <description>&lt;P&gt;I'm moving to LDAP auth with Duo 2FA. We need a better answer than RADIUS as we've found Duo's Authentication Proxy functionally limited and crash-prone. Using &lt;A href="https://live.paloaltonetworks.com/t5/Blogs/Duo-Multi-Factor-Authentication-MFA/ba-p/153420" target="_blank" rel="noopener"&gt;Mitch Densley's video guide for PAN-OS 8.x&lt;/A&gt; as a starting point, I've gotten my Duo application set up, along with an authentication profile.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, when I try to create an Authentication Enforcement object, my Duoized authentication profile doesn't appear on the menu (only "None"). If I skip that step momentarily and try to create an authentication policy, I can't select the zone my captive portal interface is in. &amp;nbsp;Can't tell what I'm missing or how my environment differs from the how-to-- I'm using PAN-OS 9.0.4 in an HA cluster managed by Panorama.&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2019 16:40:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/native-duo-2fa-for-globalprotect-can-t-select-auth-profile-or/m-p/302953#M78903</guid>
      <dc:creator>Andrew.Vernon</dc:creator>
      <dc:date>2019-12-10T16:40:07Z</dc:date>
    </item>
    <item>
      <title>Re: Native Duo 2FA for GlobalProtect can't select Auth Profile or Auth Policy Zone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/native-duo-2fa-for-globalprotect-can-t-select-auth-profile-or/m-p/303413#M78982</link>
      <description>&lt;P&gt;Did you create an object in vsys1 instead of 'shared' ?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 13:04:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/native-duo-2fa-for-globalprotect-can-t-select-auth-profile-or/m-p/303413#M78982</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2019-12-12T13:04:16Z</dc:date>
    </item>
    <item>
      <title>Re: Native Duo 2FA for GlobalProtect can't select Auth Profile or Auth Policy Zone</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/native-duo-2fa-for-globalprotect-can-t-select-auth-profile-or/m-p/303504#M79001</link>
      <description>&lt;P&gt;For the Authentication Enforcement Object (Objects &amp;gt; Authentication), I found creating a shared object (one used across all device groups) made the authentication profiles invisible. When I created the AEO in the device group covered by that particular template stack, the profiles were available to select. This occurred because I was using Panorama for device management. I'd have to walk back through the exercise on a stand-alone device to see if there's a similar distinction between the device level shared context and a specific vsys. (I only have single instances on my firewalls, so nothing really needs to be "shared.") It's not exactly as&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; suggested, but their suggestion took me to the right place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm skipping the authentication policy step since further reading suggests it may not be needed for GlobalProtect. May have to revisit it after some testing.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So short answer is: Just turn off the "Shared" checkbox when setting authentication enforcement.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 21:43:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/native-duo-2fa-for-globalprotect-can-t-select-auth-profile-or/m-p/303504#M79001</guid>
      <dc:creator>Andrew.Vernon</dc:creator>
      <dc:date>2019-12-12T21:43:19Z</dc:date>
    </item>
  </channel>
</rss>

