Global Protect sole credential provider for Smart Cards

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Global Protect sole credential provider for Smart Cards

L1 Bithead

For weeks, we have been testing combinations of attempting to go passwordless via the use of Smart Cards.  The reason being is that Smart Cards work with all the technologies we have and Global Protect supports PIN SSO with Smart Cards for a seamless sign in.

 

There is an unfortunate side effect with the Global Protect Windows Credential Provider and Provider Filter in that if you disable the native password provider, the Global Protect wrapped Smart Card provider does not show up on lock, reboot, etc on the LogonUI screen.  The wrapped SC provider seems to show up consistently only if the password provider is also enabled (not ideal since the point is to get away from passwords), it does not, however, ever select itself as the default provider (password will always be displayed first, and you will have to choose other sign-in options to reveal the GP wrapped SC provider).  In addition to this issue, if you attempt to set the GP provider to be the default, you have the same issue where the provider doesn't show up on the lock screen or LogonUI screen (on bootup) without either waiting for the LogonUI to time out after 30 seconds, or reinserting the SC.

 

I'm curious how many others have run into this issue and to hopefully get more eyes on this issue from the PA side to get this issue resolved.

 

Right now, our best option is to disable the GP provider altogether so the Native SC provider is available and have a somewhat poor login experience by having the user enter their PIN (via the native Windows prompt) for the GP client to authenticate post-logon.  There's more useability issues here if a user logs in, doesn't put their PIN in and the tunnel times out after our 180 countdown.  This requires them to log off and log back in due to pre-logon not being able to request a Kerberos ticket after the tunnel disconnects.

 

Anyway, curious to see how others handle this situation as well if you've went passwordless via Smart Card and utilize always-on VPN.

0 REPLIES 0
  • 510 Views
  • 0 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!