<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using Authentication Policy and GlobalProtect with AAD SAML to prompt MFA authentication for Admin access to resources in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/using-authentication-policy-and-globalprotect-with-aad-saml-to/m-p/410652#M92633</link>
    <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;We have new requirements to require MFA for administrative access to just about everything and have to put into place in very short order.&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;“In addition to remote access, multi-factor authentication is required for the following, including such access provided to 3rd party service providers:&lt;/P&gt;&lt;P&gt;1 All internal &amp;amp; remote admin access to directory services (active directory, LDAP, etc.).&lt;/P&gt;&lt;P&gt;2 All internal &amp;amp; remote admin access to network backup environments.&lt;/P&gt;&lt;P&gt;3 All internal &amp;amp; remote admin access to network infrastructure (firewalls, routers, switches, etc.).&lt;/P&gt;&lt;P&gt;4 All internal &amp;amp; remote admin access to the organization’s endpoints/servers."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I'm trying to do is described pretty well in the document linked below: try to access something, get prompted.&amp;nbsp; Trying to do this with Azure AD.&amp;nbsp; &amp;nbsp;From what I understand, browser based applications can be done with captive portal and non browser based can be done with GlobalProtect app.&amp;nbsp; Is that right?&amp;nbsp; Trying to leverage our existing Azure MFA.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/authentication/configure-globalprotect-to-facilitate-multi-factor-authentication-notifications.html" target="_blank"&gt;Configure GlobalProtect to Facilitate Multi-Factor Authenti... (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Chris&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 02 Jun 2021 17:24:56 GMT</pubDate>
    <dc:creator>Someonesomeone</dc:creator>
    <dc:date>2021-06-02T17:24:56Z</dc:date>
    <item>
      <title>Using Authentication Policy and GlobalProtect with AAD SAML to prompt MFA authentication for Admin access to resources</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-authentication-policy-and-globalprotect-with-aad-saml-to/m-p/410652#M92633</link>
      <description>&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;We have new requirements to require MFA for administrative access to just about everything and have to put into place in very short order.&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;&amp;nbsp;&lt;/P&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;“In addition to remote access, multi-factor authentication is required for the following, including such access provided to 3rd party service providers:&lt;/P&gt;&lt;P&gt;1 All internal &amp;amp; remote admin access to directory services (active directory, LDAP, etc.).&lt;/P&gt;&lt;P&gt;2 All internal &amp;amp; remote admin access to network backup environments.&lt;/P&gt;&lt;P&gt;3 All internal &amp;amp; remote admin access to network infrastructure (firewalls, routers, switches, etc.).&lt;/P&gt;&lt;P&gt;4 All internal &amp;amp; remote admin access to the organization’s endpoints/servers."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What I'm trying to do is described pretty well in the document linked below: try to access something, get prompted.&amp;nbsp; Trying to do this with Azure AD.&amp;nbsp; &amp;nbsp;From what I understand, browser based applications can be done with captive portal and non browser based can be done with GlobalProtect app.&amp;nbsp; Is that right?&amp;nbsp; Trying to leverage our existing Azure MFA.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/authentication/configure-globalprotect-to-facilitate-multi-factor-authentication-notifications.html" target="_blank"&gt;Configure GlobalProtect to Facilitate Multi-Factor Authenti... (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;BR /&gt;Chris&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 02 Jun 2021 17:24:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-authentication-policy-and-globalprotect-with-aad-saml-to/m-p/410652#M92633</guid>
      <dc:creator>Someonesomeone</dc:creator>
      <dc:date>2021-06-02T17:24:56Z</dc:date>
    </item>
    <item>
      <title>Re: Using Authentication Policy and GlobalProtect with AAD SAML to prompt MFA authentication for Admin access to resources</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-authentication-policy-and-globalprotect-with-aad-saml-to/m-p/411460#M92734</link>
      <description>&lt;P&gt;Correct&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Looking at this info:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV class="p"&gt;
&lt;DIV style="display: inline;"&gt;If a user session matches the Authentication policy, the type of application or service determines the user experience for notifications about the authentication challenge:&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;DIV style="display: inline;"&gt;
&lt;UL&gt;
&lt;LI class="li"&gt;
&lt;DIV style="display: inline;"&gt;
&lt;DIV class="p"&gt;
&lt;DIV style="display: inline;"&gt;(
&lt;DIV style="display: inline;"&gt;Windows or macOS endpoints only&lt;/DIV&gt;
)
&lt;DIV style="display: inline;"&gt;Non-browser-based applications&lt;/DIV&gt;
—To facilitate MFA notifications for non-HTTP applications (such as Perforce) on Windows or macOS endpoints, a GlobalProtect app is required. When a session matches an Authentication policy rule, the firewall sends a UDP notification to the GlobalProtect app with an embedded URL link to the Authentication Portal page. The GlobalProtect app then displays this message as a pop up notification to the user.&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 06 Jun 2021 18:01:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-authentication-policy-and-globalprotect-with-aad-saml-to/m-p/411460#M92734</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2021-06-06T18:01:45Z</dc:date>
    </item>
    <item>
      <title>Re: Using Authentication Policy and GlobalProtect with AAD SAML to prompt MFA authentication for Admin access to resources</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/using-authentication-policy-and-globalprotect-with-aad-saml-to/m-p/413328#M92953</link>
      <description>&lt;P&gt;Thank you for your reply, Steve!&amp;nbsp; Stood up a GlobalProtect gateway.&amp;nbsp; Got MFA auth for establishing GP connection, but still trying to get challenged for authentication based on authentication policy.&amp;nbsp; &amp;nbsp;Initially thought http and https was captive/authentication portal, but after read reading documents and in particular the passage you mentioned it referred to the authentication portal, which I'm now trying to stand up.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Should captive/authentication portal go on internal interface?&amp;nbsp; I was planning on putting Internal GP gateway and thought that was going to go on internal interface, but maybe I need loopbacks or something so there is no conflict.&amp;nbsp; Looking for best practices.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I get Captive/Authentication Portal configured, i'll use whatever IP or dns address configure there and pair it up with the instructions here:&amp;nbsp;&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/saas-apps/paloaltonetworks-captiveportal-tutorial" target="_blank"&gt;Tutorial: Azure Active Directory integration with Palo Alto Networks Captive Portal | Microsoft Docs&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hopefully I'm on the right track.&amp;nbsp; Thoughts?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Chris&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jun 2021 17:48:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/using-authentication-policy-and-globalprotect-with-aad-saml-to/m-p/413328#M92953</guid>
      <dc:creator>Someonesomeone</dc:creator>
      <dc:date>2021-06-15T17:48:43Z</dc:date>
    </item>
  </channel>
</rss>

