GlobalProtect Cert+SAML

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

GlobalProtect Cert+SAML

L1 Bithead

Hello,

 

I'm reaching out to see if anyone has configured GlobalProtect with cert+SAML authentication with multiple gateways across multiple firewalls.  I've been attempting to configure this, however, whenever I use cert+SAML at the gateway and I attempt to switch gateways after logging in, the logs always show "client cert not present". 

 

I have both the root/intermediate configured under certificate and have an accompanying certificate profile with nothing special specifying those two certs.  I have both machine and user certs issued to the machine/user respectively.  App configuration is basic, setup with pre-logon (always-on) and is targeted for "any".  

 

For context, I'm able to perform cert-only authentication and if i set the subject-alt name to email in the profile, it authenticates both machine and user respectively for whichever stage its at and determines the correct user.  Likewise, with SAML only, everything works fine as well when switching gateways.  It's only when I combine cert with SAML that it fails.

 

I haven't been able to find many resources with concrete information on whether this is supported or not, most videos I've seen only specify SAML at the gateway.

1 REPLY 1

L0 Member

The "Client Cert Not Present" error during a gateway switch usually stems from a mismatch in how the session cookie handles the multi-factor requirement. When moving between firewalls, GlobalProtect attempts to use an Authentication Override cookie to maintain a seamless connection; however, if the new gateway is configured to strictly require a certificate handshake before accepting that SAML-based cookie, the process fails because the certificate isn't being re-presented during the cookie validation phase. To resolve this, ensure that all firewalls share the same Certificate Profile and have "Any" or "User/Machine" selected, and most importantly, verify that "Accept Cookie for Authentication" is enabled on all gateways with a matching Cookie Lifetime to allow the authenticated session to roam without triggering a fresh, manual certificate prompt.

  • 434 Views
  • 1 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!