Force user credentials at every login Azure AD SAML SSO

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Force user credentials at every login Azure AD SAML SSO

I have had GlobalProtect working for years with RADIUS based authentication and MFA.  We are now moving to SAML based SSO with Azure AD.  I have everything working, but, our environment requires that we provide login credentials every time we login to the VPN. So instead of using the credentials of the user that is logged into the machine by default, I want to force the user to enter their credentials, and supply MFA response, EVERY time they login to GP (even though the credentials in the end are the same as the user's Windows credentials)

 

I've changed all kinds of settings in the Portal - Agent - App settings, but nothing accomplishes what I need.    When we use Azure AD SAML auth programatically, we send the "ForceAuthn=true" attribute, but I've not found anywhere to add custom attributes, or set something like this, in GP settings. 

 

Anyone have suggestions?

 

 

 

 

Jason Hensley
Tavoca, Inc
Director of IT
6 REPLIES 6

Cyber Elite
Cyber Elite

Hello,

Do you have the configuration set to "No"?

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFbCAK

OtakarKlier_0-1712267555410.png

 

Setting to yes will try and use the windows creds.

 

Regards,

L3 Networker

As Otakar said.. also in my case this is set to yes.

also a good thing i found is to set 'IPv6 preferred' to 'no' in the app settings on the portal.

 

re forcing MFA..

I had a similar issue some time back.. in the end, the change (if i recall correctly) needed was on the Azure end.. if i recall the Azure engineers had to set a time limit on the MFA request.. by creating a new azure access policy that will request mfa authentication every 1 hour think the minimum was 1 hour it can be set to for the gp vpn user groups.

the thing with Azure MFA is, if a user is connected and they simply disconnect, then reconnect, the GP app will simply use the Azure's Realtime Refresh Tokens'  (RFT) (look it up.. a good read) to auto validate the MFA.. so the user won't get MFA response again if reconnecting within a certain amount of time. however if they go to the GP app settings, and sign out, then reconnect, then they will be prompted for MFA.

Just to clarify also, there are 2 options, disconnect and sign out (pending on how gp app is setup on palo side). if a user disconnects it preserves the user credentials, whereas if they 'sign out' it will clear the user credentials locally in the cache store. there is no way to force it to clear the credentials when user selects 'disconnect' that i am aware off.

i will try and find out from the Azure team what they did but might also have included some conditional access policies on the Azure end to be created.

unfortunately as I write this it is a Friday afternoon.. so the guys have long gone home and sipping on the good stuff by now. so will try and find out next week for more info and post an update.

have a great weekend!

Thank you.  I've experimented with that setting.  Neither setting accomplishes what I need unfortunately. 

 

Jason Hensley
Tavoca, Inc
Director of IT

Thank you.  I wondered if it was something I would have to do on the Azure side, but have hit dead ends going that route as well.  The RFT reference may be helpful, so I'll start reading :).

 

I will also review the sign out vs disconnect.  Right now my GP is set to just offer disconnect, so I'll switch that to sign out and see if that accomplishes what I need.

 

Jason Hensley
Tavoca, Inc
Director of IT

PA_nts - you got me going in the right direction.  I ended up moving our org from the Azure Security Defaults to managing authentication with Conditional Access policies.  I created a policy that forced authentication every time for my VPN users, and tied it to the Palo Alto GP Enterprise application.  It now works beautifully. Asks for credentials every time, AND uses our company's MFA options. Bonus is that I now have more granular control over authentication policies in my organization. 

Thanks for the help!

 

Jason Hensley
Tavoca, Inc
Director of IT

awesome glad to you hear you got it working.. happy days!

  • 890 Views
  • 6 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!