<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Captive Portal w/2FA in Azure in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406636#M92134</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/155683"&gt;@RobertShawver&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You use GP for CP when destination port is not 443.&lt;/P&gt;
&lt;P&gt;We use the CP for any traffic on port 3389.&lt;/P&gt;</description>
    <pubDate>Thu, 13 May 2021 20:58:10 GMT</pubDate>
    <dc:creator>MP18</dc:creator>
    <dc:date>2021-05-13T20:58:10Z</dc:date>
    <item>
      <title>Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406068#M92063</link>
      <description>&lt;P&gt;Hi All -&lt;/P&gt;&lt;P&gt;Hopefully I make this clear.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I'm looking to do is set up Captive Portal with a push notification in Azure AD.&amp;nbsp; I can't seem to find any documentation around this, can someone give me the general steps or point me to existing documentation?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 13:21:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406068#M92063</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2021-05-11T13:21:37Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406174#M92069</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/155683"&gt;@RobertShawver&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please read below document.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://azureadminblog.azurewebsites.net/index.php/2020/06/21/palo-alto-captive-portal-using-azure-ad/" target="_blank"&gt;https://azureadminblog.azurewebsites.net/index.php/2020/06/21/palo-alto-captive-portal-using-azure-ad/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 18:23:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406174#M92069</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-05-11T18:23:42Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406206#M92074</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&amp;nbsp;I found that one, but there are parts that don't make sense to me.&lt;/P&gt;&lt;P&gt;Like&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;Next lets create an authentication profile that will be used in our captive portal, navigate to Objects &amp;gt; Authentication and press “Add”:"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Set the following values and press ok:&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Name:&amp;nbsp;&lt;/STRONG&gt;Anything you like!&lt;BR /&gt;&lt;STRONG&gt;Authentication Method:&amp;nbsp;&lt;/STRONG&gt;Browser-challenge (doesn’t really matter here as the request will be redirected to Azure-AD anyway)&lt;BR /&gt;&lt;STRONG&gt;Authentication Profile:&amp;nbsp;&lt;/STRONG&gt;The Azure-AD authenticaiton profile we setup in the previous section&lt;BR /&gt;&lt;STRONG&gt;Message:&amp;nbsp;&lt;/STRONG&gt;Leave default- users will not see this anyway.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But then I don't see how that ties into anything???&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 19:26:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406206#M92074</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2021-05-11T19:26:06Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406244#M92076</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&amp;nbsp;It also says:&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;n our case we want to that to a FQDN that users using an internal DNS server will point to an internal interface on the firewall. For example&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://internal.azureadmin.co.uk:6082/SAML20/SP" target="_blank"&gt;https://internal.azureadmin.co.uk:6082/SAML20/SP&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN&gt;which would resolve to an internal interface on the firewall (such as 192.168.100.1). The port number here is the port the Palo Alto hosts its captive portal service when enabled.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Reply URL (Assertion Consumer Service URL):&lt;/STRONG&gt;&lt;BR /&gt;&lt;SPAN&gt;This is the URL that Azure will send the user back to after the SAML authentication processs completes, in our case we can use the same URL as the Identifier- for example-&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;&lt;A href="https://internal.azureadmin.co.uk:6082/SAML20/SP" target="_blank"&gt;https://internal.azureadmin.co.uk:6082/SAML20/SP&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Use the same reply URL? That doesn't seem right?&lt;/P&gt;</description>
      <pubDate>Tue, 11 May 2021 21:48:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406244#M92076</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2021-05-11T21:48:26Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406583#M92125</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;One thing to remember with Captive portal is that its used only for matching a user to and IP address for mapping. If a use is already known, the portal will not be presented to the user.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/user-id/user-id-concepts/user-mapping/captive-portal" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-admin/user-id/user-id-concepts/user-mapping/captive-portal&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Hope that makes sense.&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 17:51:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406583#M92125</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-05-13T17:51:04Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406609#M92127</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/155683"&gt;@RobertShawver&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For CP you export the cert from the Azure to PA.&lt;/P&gt;
&lt;P&gt;Yes URL for&amp;nbsp;&lt;SPAN&gt;Identity Provider SSO URL it is same as in Azure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Regards&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 18:55:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406609#M92127</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-05-13T18:55:28Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406628#M92129</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/75039"&gt;@MP18&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is what I'm hoping will happen.&amp;nbsp; User crosses from zone to another and is presented with the CP.&amp;nbsp; User puts in username and password and then gets a push notification to there phone via Microsoft Authenticator.&amp;nbsp; User clicks "approve" and the CP process completes.&amp;nbsp; All internal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Currently, I have CP set up so that&amp;nbsp;User crosses from zone to another&amp;nbsp;and is presented with the CP.&amp;nbsp;User puts in username and password&amp;nbsp;and the CP process completes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is what I'm hoping for possible?&amp;nbsp; Am I explaining it correctly?&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 20:21:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406628#M92129</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2021-05-13T20:21:00Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406629#M92130</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/155683"&gt;@RobertShawver&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yes you are sharing correctly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 20:25:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406629#M92130</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-05-13T20:25:14Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406631#M92131</link>
      <description>&lt;P&gt;Now the question is how &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 20:26:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406631#M92131</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2021-05-13T20:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406632#M92132</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/155683"&gt;@RobertShawver&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you have not done any CP config then you can also check with your SE How to do it?&lt;/P&gt;
&lt;P&gt;Are you the one who will do configuration in Azure?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Also see this&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/paloaltonetworks-captiveportal-tutorial" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/paloaltonetworks-captiveportal-tutorial&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 20:32:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406632#M92132</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-05-13T20:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406635#M92133</link>
      <description>&lt;P&gt;So the Azure guy set it up, but then made me the owner so I can edit as needed.&amp;nbsp; I think the part that isn't clicking in my head is right now I have the CP running through GlobalProtect.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I click on Test in Azure, I get the push notification on my phone, I click approve and then browser opens a new tab with the Palo logo on the tab and it says 502 Bad gateway and the URL is https://website:6082/SAML20/SP/ACS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The link listed in&amp;nbsp;&lt;SPAN&gt;Network &amp;gt; GlobalProtect &amp;gt; Portals &amp;gt; MY_Portal &amp;gt; Agent is https://website:6082&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I think this is doable, I just haven't found any good instructions on how to do this.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;FYI, I really appreciate your time in speaking with me.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 20:46:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406635#M92133</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2021-05-13T20:46:03Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406636#M92134</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/155683"&gt;@RobertShawver&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You use GP for CP when destination port is not 443.&lt;/P&gt;
&lt;P&gt;We use the CP for any traffic on port 3389.&lt;/P&gt;</description>
      <pubDate>Thu, 13 May 2021 20:58:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406636#M92134</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2021-05-13T20:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406721#M92148</link>
      <description>&lt;P&gt;Apologies, but I don't know how that helps me.&lt;/P&gt;</description>
      <pubDate>Fri, 14 May 2021 08:41:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406721#M92148</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2021-05-14T08:41:41Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406807#M92160</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;While i do not know if this is possible, I do find it intriguing. I know the captive portal page can be modified, not sure if to the extent of what you are looking for however. Perhaps an SSO or SAML solution would work if you already have one?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Just throwing out ideas.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 14 May 2021 17:04:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/406807#M92160</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2021-05-14T17:04:29Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/413973#M93031</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/155683"&gt;@RobertShawver&lt;/a&gt;&amp;nbsp;Did you ever get success with this?&amp;nbsp; I am trying to set this up as well.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Jun 2021 18:56:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/413973#M93031</guid>
      <dc:creator>Someonesomeone</dc:creator>
      <dc:date>2021-06-17T18:56:21Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/414304#M93102</link>
      <description>&lt;P&gt;This should get you pretty close:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Set up GlobalProtect&lt;/STRONG&gt;&lt;BR /&gt;Add the new captive portal to the portal agent configuration - Network &amp;gt; GlobalProtect &amp;gt; Portals &amp;gt; GP_Portal &amp;gt; Agent&lt;BR /&gt;Alias to point to VLAN 961 Example: server.mfa.company.com 10.10.10.10&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Set up Azure&lt;/STRONG&gt;&lt;BR /&gt;Basic SAML Configuration&lt;/P&gt;&lt;P&gt;Example&lt;BR /&gt;Identifier (Entity ID) &lt;A href="https://server.mfa.company.com:6082/SAML20/SP" target="_blank"&gt;https://server.mfa.company.com:6082/SAML20/SP&lt;/A&gt;&lt;BR /&gt;Reply URL (Assertion Consumer Service URL) &lt;A href="https://server.mfa.company.com:6082/SAML20/SP/ACS" target="_blank"&gt;https://server.mfa.company.com:6082/SAML20/SP/ACS&lt;/A&gt;&lt;BR /&gt;Federation Metadata XML Download&lt;BR /&gt;&lt;BR /&gt;&lt;STRONG&gt;Set up Palo Alto&lt;/STRONG&gt;:&lt;BR /&gt;SAML Identity Provider&lt;BR /&gt;Device &amp;gt; Server Profiles &amp;gt; SAML Identity Provider &amp;gt; Import&lt;BR /&gt;Authentication Profile&lt;BR /&gt;Device &amp;gt; Authentication Profile &amp;gt; Add&lt;BR /&gt;Type = SAML&lt;BR /&gt;IDP Server Profile = SAML Identity Provider created above&lt;BR /&gt;Username Attribute = username&lt;BR /&gt;Advanced Tab &amp;gt; Allow List = all&lt;BR /&gt;Authentication&lt;BR /&gt;Objects &amp;gt; Authentication &amp;gt; Add&lt;BR /&gt;Authentication Method = web-form&lt;BR /&gt;Authentication Profile = Authentication Profile created above&lt;BR /&gt;Policy&lt;BR /&gt;Policies &amp;gt; Authentication &amp;gt; Pre Rules &amp;gt; Add&lt;BR /&gt;Action Tab &amp;gt; Authentication Enforcement &amp;gt; Authentication Object created above&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know if you have any questions.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jun 2021 11:13:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/414304#M93102</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2021-06-21T11:13:29Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/414318#M93105</link>
      <description>&lt;P&gt;Thank you RobertShawver!&amp;nbsp; I appreciate the help.&amp;nbsp; When you mentioned adding new captive portal to portal agent configuration, where do i put that?&amp;nbsp; Is that under the App tab of the portal agent configuration?&amp;nbsp; My guess is under trusted MFA Gateways as described in Step 6, item 3,&amp;nbsp; from the following document:&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/authentication/configure-globalprotect-to-facilitate-multi-factor-authentication-notifications.html" target="_blank"&gt;Configure GlobalProtect to Facilitate Multi-Factor Authenti... (paloaltonetworks.com)&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; Piecing things from different places.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another question:&amp;nbsp; &amp;nbsp; &amp;nbsp;server.mfa.company.com, does that have to externally resolve?&amp;nbsp; The azureadminblog post seemed to indicate you only need internal, but someone told me it needs to be external for azure to talk to it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jun 2021 13:44:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/414318#M93105</guid>
      <dc:creator>Someonesomeone</dc:creator>
      <dc:date>2021-06-21T13:44:24Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/414353#M93107</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;Is that under the App tab of the portal agent configuration?" - You got it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"server.mfa.company.com, does that have to externally resolve? " - Mine does not, but your mileage may vary.&amp;nbsp; I'd say try it internal first.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jun 2021 18:44:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/414353#M93107</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2021-06-21T18:44:34Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/414579#M93150</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/155683"&gt;@RobertShawver&lt;/a&gt;&amp;nbsp;getting close, but not there yet.&amp;nbsp; Browser based applications I get redirected over http to azure, but after trying to authenticate i get AADSTS700016 Application with identifier '&lt;A href="https://cp.domain.com:6082/saml20/sp" target="_blank"&gt;https://cp.domain.com:6082/saml20/sp&lt;/A&gt;' was not found in the directory...&amp;nbsp; &amp;nbsp;Also, not getting the notification from GlobalProtect when attempting non-browser based.&amp;nbsp; &amp;nbsp;Appreciate any help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&amp;nbsp; Chris&lt;/P&gt;</description>
      <pubDate>Tue, 22 Jun 2021 20:00:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/414579#M93150</guid>
      <dc:creator>Someonesomeone</dc:creator>
      <dc:date>2021-06-22T20:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: Captive Portal w/2FA in Azure</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/414686#M93165</link>
      <description>&lt;P&gt;Hey Chris -&lt;/P&gt;&lt;P&gt;I'll admit that troubleshooting without seeing your setup is a bit of a challenge.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/authentication/configure-multi-factor-authentication.html" target="_blank"&gt;Configure Multi-Factor Authentication (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;What I did was follow these instructions but with these caveats:&lt;/P&gt;&lt;P&gt;Step 2: Add a SAML IDP&lt;/P&gt;&lt;P&gt;Step 3: Skip this step (this is why it took me so long to get this going, it took me awhile to figure out that I needed to skip step 3.)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I suspect you may have the same issue as I seem to remember that error you spoke about.&lt;/P&gt;</description>
      <pubDate>Wed, 23 Jun 2021 11:10:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-w-2fa-in-azure/m-p/414686#M93165</guid>
      <dc:creator>RobertShawver</dc:creator>
      <dc:date>2021-06-23T11:10:19Z</dc:date>
    </item>
  </channel>
</rss>

