Cannot Access Global Protect Portal

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Cannot Access Global Protect Portal

L1 Bithead

Good Morning ,

 

I am currently working on implementing Global Protect with  Duo SSO integration  for user authentication . Although all  the following configuration elements appear to be in place I am getting the following error message when attempting to access the portal . Can you please advise what may be going wrong her e? 

HThiam_0-1765312272753.png

 

Thank you in advance 

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

 

Most common confirmed causes for this exact behavior

1. Assertion Consumer Service (ACS) URL mismatch

This is the #1 cause of this error with GlobalProtect + Duo.

Facts:

  • Duo SSO strictly validates the ACS URL in the SAML request

  • GlobalProtect portal and gateway have different ACS URLs

  • If the ACS URL configured in Duo does not exactly match what PAN-OS sends, Duo rejects the request

For GlobalProtect Portal, the ACS URL must be:

 

 
https://<portal-fqdn>/SAML20/SP/ACS

 

This must match character-for-character in:

  • Duo SSO Application → Service Provider → ACS URL

  • PAN-OS Authentication Profile → SAML Identity Provider

Palo Alto explicitly documents that any mismatch causes authentication failure before assertion is issued.


2. Entity ID (Issuer) mismatch

Duo validates the SAML Issuer / Entity ID.

For GlobalProtect:

  • The Entity ID is defined in PAN-OS under the SAML IdP profile

  • Duo must be configured with the exact same value

If the Entity ID differs (even by trailing slash), Duo will show this error page.

This is confirmed in Duo SSO SAML troubleshooting documentation.


3. Incorrect certificate used for SAML signing

Confirmed behavior:

  • GlobalProtect signs SAML requests

  • Duo requires the signing certificate uploaded in the Duo SSO app

  • If PAN-OS uses a different certificate than the one Duo has, the request is rejected

Common mistake:

  • Admin uploads the portal SSL certificate instead of the SAML signing certificate

  • Or rotates the cert on PAN-OS but does not update Duo

Palo Alto documentation explicitly states the SAML signing certificate must match the IdP configuration.


4. Username / NameID format mismatch

Duo SSO requires:

  • A valid NameID

  • In a format it expects (usually emailAddress or unspecified)

If PAN-OS sends:

  • DOMAIN\username

  • while Duo expects user@domain

Duo will fail the transaction and display this page.

Duo documents this exact failure mode for SAML apps.

Please help out other users and “Accept as Solution” if a post helps solve your problem !

View solution in original post

2 REPLIES 2

Cyber Elite
Cyber Elite

 

Most common confirmed causes for this exact behavior

1. Assertion Consumer Service (ACS) URL mismatch

This is the #1 cause of this error with GlobalProtect + Duo.

Facts:

  • Duo SSO strictly validates the ACS URL in the SAML request

  • GlobalProtect portal and gateway have different ACS URLs

  • If the ACS URL configured in Duo does not exactly match what PAN-OS sends, Duo rejects the request

For GlobalProtect Portal, the ACS URL must be:

 

 
https://<portal-fqdn>/SAML20/SP/ACS

 

This must match character-for-character in:

  • Duo SSO Application → Service Provider → ACS URL

  • PAN-OS Authentication Profile → SAML Identity Provider

Palo Alto explicitly documents that any mismatch causes authentication failure before assertion is issued.


2. Entity ID (Issuer) mismatch

Duo validates the SAML Issuer / Entity ID.

For GlobalProtect:

  • The Entity ID is defined in PAN-OS under the SAML IdP profile

  • Duo must be configured with the exact same value

If the Entity ID differs (even by trailing slash), Duo will show this error page.

This is confirmed in Duo SSO SAML troubleshooting documentation.


3. Incorrect certificate used for SAML signing

Confirmed behavior:

  • GlobalProtect signs SAML requests

  • Duo requires the signing certificate uploaded in the Duo SSO app

  • If PAN-OS uses a different certificate than the one Duo has, the request is rejected

Common mistake:

  • Admin uploads the portal SSL certificate instead of the SAML signing certificate

  • Or rotates the cert on PAN-OS but does not update Duo

Palo Alto documentation explicitly states the SAML signing certificate must match the IdP configuration.


4. Username / NameID format mismatch

Duo SSO requires:

  • A valid NameID

  • In a format it expects (usually emailAddress or unspecified)

If PAN-OS sends:

  • DOMAIN\username

  • while Duo expects user@domain

Duo will fail the transaction and display this page.

Duo documents this exact failure mode for SAML apps.

Please help out other users and “Accept as Solution” if a post helps solve your problem !

L1 Bithead

This is now resolved . Redeploying the Global Protect App in  Duo application appears to have done the trick. Thank you 

  • 1 accepted solution
  • 169 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!