<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect Pre-Logon VPN WITHOUT using Machine Certificate for Authentication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394007#M91068</link>
    <description>&lt;P&gt;Thats not true either. You have to login with the user before you logout to cache the cookie, so saying anyone is not accurate. Anyone who has connected previously with an authentication cookie, sure.&lt;/P&gt;</description>
    <pubDate>Thu, 25 Mar 2021 16:56:15 GMT</pubDate>
    <dc:creator>MartyMcFly</dc:creator>
    <dc:date>2021-03-25T16:56:15Z</dc:date>
    <item>
      <title>GlobalProtect Pre-Logon VPN WITHOUT using Machine Certificate for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/393908#M91062</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I currently have my lab PA-220 where its configured for prelogon and then on demand for the VPN, and it works just fine with saving cookies for the authentication and authenticates at the windows login screen without any issues.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Move to our production PA-220 and we cannot seem to get the pre-logon to connect, and I have mirrored the same settings as the lab environment. When I opened a ticket with Palo Alto, they state that a Machine Certificate is required for Pre-Logon authentication, but I have a hard time believing this as I have it working in my lab. Anyone else have pre-logon working WITHOUT a client certificate? I can't be the only one.....&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 15:28:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/393908#M91062</guid>
      <dc:creator>MartyMcFly</dc:creator>
      <dc:date>2021-03-25T15:28:33Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Pre-Logon VPN WITHOUT using Machine Certificate for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394006#M91067</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/149835"&gt;@MartyMcFly&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Assume that you manage to finish the setup without a certificate. This would allow &lt;STRONG&gt;anyone&lt;/STRONG&gt; to connect to to your environment (using whatever is granted for user pre-logon). I don't think is is a good idea.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 16:54:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394006#M91067</guid>
      <dc:creator>JoergSchuetter</dc:creator>
      <dc:date>2021-03-25T16:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Pre-Logon VPN WITHOUT using Machine Certificate for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394007#M91068</link>
      <description>&lt;P&gt;Thats not true either. You have to login with the user before you logout to cache the cookie, so saying anyone is not accurate. Anyone who has connected previously with an authentication cookie, sure.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 16:56:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394007#M91068</guid>
      <dc:creator>MartyMcFly</dc:creator>
      <dc:date>2021-03-25T16:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Pre-Logon VPN WITHOUT using Machine Certificate for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394008#M91069</link>
      <description>&lt;P&gt;From what I've seen with deployments of GP in combination with pre-logon, mostly in combination with AD/SCCM/Azure managed endpoints, a machine certificate is the easiest method on the Portal and Gateway if you have a freshly spun-in devices (Also easier in deployment with less user complaints).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As the portal needs some form of authentication at first, unless you specify that anyone can connect, in practice you either deploy a machine certificate in the image of the device to identify it and have a certificate profile to verify the authenticity.&lt;/P&gt;&lt;P&gt;The other option is to have a user connect manually at first (With a local or external account) after which authentication cookies are generated and placed on the machine locally. The cookie is valid for your selected period (Due mind the Portal and Gateway both have their own settings where the certificate for encrypting/decrypting needs to match and you can have different timers for each).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When the machine boots up, if the user has logged in before, it connects to the portal due to the settings it received previously, and connects to the gateway presenting the cookie it has locally. The gateway inspects the cookie and connects the device if the cookie is still valid and assuming you don't set the authentication to also force a certificate check or additional MFA.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 17:04:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394008#M91069</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2021-03-25T17:04:13Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Pre-Logon VPN WITHOUT using Machine Certificate for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394050#M91072</link>
      <description>&lt;P&gt;Is the only reason you don't want to use machine certificates is that you don't have an internal root CA?&amp;nbsp; I have spent an extensive amount of time configuring machine-based certificate pre-login along with SSO + SAML Authentication integration and the config is quite intricate.&amp;nbsp; In my experience there are so many scenarios in which tokens can be invalidated (new application installs, configuration changes, IP changes, etc.) for either the portal or gateway I just can't see this working consistently.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would also agree that not using a machine certificate could create a pretty big security hole especially if you are creating and relying on tokens with long lifetimes.&amp;nbsp; If you don't have a internal root CA you could consider using self signed certificate(s) if your deployment is not large as they could be deployed easily through a GPO.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Edit:&amp;nbsp; This is a very comprehensive explanation on configuring pre-login and interactive logins for GlobalProtect:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/blogs/globalprotect-overview/ba-p/322170" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/blogs/globalprotect-overview/ba-p/322170&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;- Good luck&lt;/P&gt;</description>
      <pubDate>Thu, 25 Mar 2021 19:40:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394050#M91072</guid>
      <dc:creator>mlinsemier</dc:creator>
      <dc:date>2021-03-25T19:40:41Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Pre-Logon VPN WITHOUT using Machine Certificate for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394287#M91094</link>
      <description>&lt;P&gt;As a workaround you can use "Enforce GlobalProtect for Network Access", so that the user will need to start the VPN if they want any network connection also block them for disabling./deleting the VPN app (it works best when there is Mcrosoft AD environment ).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/10-0/globalprotect-admin/globalprotect-quick-configs/captive-portal-and-enforce-globalprotect-for-network-access.html" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/10-0/globalprotect-admin/globalprotect-quick-configs/captive-portal-and-enforce-globalprotect-for-network-access.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/8-1/globalprotect-admin/globalprotect-portals/define-the-globalprotect-client-authentication-configurations/customize-the-globalprotect-app" target="_blank"&gt;https://docs.paloaltonetworks.com/globalprotect/8-1/globalprotect-admin/globalprotect-portals/define-the-globalprotect-client-authentication-configurations/customize-the-globalprotect-app&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Mar 2021 12:18:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-pre-logon-vpn-without-using-machine-certificate/m-p/394287#M91094</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2021-03-26T12:18:03Z</dc:date>
    </item>
  </channel>
</rss>

