GlobalProtect Authentication failed Error code -1 after PAN-OS update

Showing results for 
Show  only  | Search instead for 
Did you mean: 

GlobalProtect Authentication failed Error code -1 after PAN-OS update

L1 Bithead

We are on PAN-OS 8.0.6 and have GlobalProtect and SAML w/ Okta setup. It has worked fine as far as I can recall.   

However when we went to upgrade to 8.0.19 and any later version (after trying that one first), our VPN stopped working.   

The client would just loop through Okta sending MFA prompts.

On the web client, we got this error: "Authentication failed Error code -1" with "/SAML20/SP/ACS" appended to the URL of the VPN site (after successfully authenticating with Okta. 


When I downgrade PAN-OS back to 8.0.6, everything goes back to working just fine. No changes are made by us during the upgrade/downgrade at all. 

Any advice/suggestions on what to do here?


Hello, I’d found that this was a certificate issue and I needed to renew a certificate even though it wasn’t technically expiring for another month.  

when you get this error, what does the system log say? It should be a very recent entry after you get the error. 

I am getting the following error, I re-posted because I should have taken some of the URLs out. It is strange it is not showing a user name.


Client '' received out-of-band SAML message: <?xml version="1.0" encoding="UTF-8"?><saml2p:Response Destination="" ID="idxxx" IssueInstant="2020-02-19T15:13:57.156Z" Version="2.0" xmlns:saml2p="urn:oasis:names:tc:SAML:2.0:protocol"><saml2:Issuer Format="urn:oasis:names:tc:SAML:2.0:nameid-format:entity" xmlns:saml2="urn:oasis:names:tc:SAML:2.0:assertion"></saml2:Issuer><ds:Signature xmlns:ds="http://www.w3

02/19 08:13:57


SAML SSO authentication failed for user ''. Reason: SAML web single-sign-on failed. reply message 'Reason: SAML web single-sign-on failed.'

Did you find the issue with the client <username> being empty @David_Worley ?

L1 Bithead

I am also facing the same issue with Panorama -> Prisma -> 10.0.4 version as well. Using the Prisma App provided in Okta portal. Any guidance or direction would be appreciated. Thanks!



I had same issue on my firewall. resolved after re configuring ntp (time settings ). this was because of time difference between SAML authentication URLs and your firewall.  default maximum deference is 60s

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!