Using pre-logon user with client certificates, how to force global protect to select a particular certificate and not prompt user?

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Using pre-logon user with client certificates, how to force global protect to select a particular certificate and not prompt user?

L0 Member

The issue is that we are about to replace our Issuing Intermediate Root Certificate (IIRC) in our PKI chain with a new one due to expiration on December 15th. Right now we configure laptops we sent out to remote users with the special registry key settings in GlobalProtect to allow the "pre-logon" user, and to pre-define a specific portal to use. So users receive their laptops at home, connect to their home wifi, and globalprotect makes logging in behind our firewall seamless. Great!

 

What is worrying me is what will happen when we put the new Intermediate certificate into production, is what is depicted here in this LiveCommunity thread. Obviously, our IIRC will have the same Issuing CA for it - the offline root server. Which means that the first bullet point here will be an issue - the new client certificates that our Windows PKI environment will start issuing for clients immediately after we replace the IIRC with the new one (typical domain joined computer behavior), will mean that within a day or two of replacing the IIRC, remote client computers will have two unexpired, essentially identical (same OID in the enhanced key usage field, so we can't use the OID filter method to force GlobalProtect to choose one certificate) certificates on them.

 

My concern is that GlobalProtect will see the two valid client certificates, one with a validity ending on December 15th, and one with our defined one year expiration date from the date we do the IIRC replacement, and then try to prompt the pre-logon user account to select which certificate to use, as shown in my first link above. Of course the pre-logon user will not be able to select which certificate to use, which means that my users will not be able to have the seamless logon experience.

 

So my question is - how on either GlobalProtect settings, or Portal settings, can I make sure that if a GlobalProtect client has two valid certificates that could be used, that it is forced to pick the one with the farther-out expiration date, and not try to prompt the user (or the pre-logon user, which would be worse) to select a certificate, if enhanced key usage field on client certificates are the same?

 

Or more generally, how can I simply accomplish my goal of wanting remote users with never-logged-into, freshly shipped laptops to be able to power on, join home network, get behind-the-scenes-"pre-logged-in" to GlobalProtect, sign into Windows with their Active Directory credentials, and get to work?

0 REPLIES 0
  • 1019 Views
  • 0 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!