Interesting discussion you @jdprovine and @Mick_Ball have here 😉 Just to be clear, I don't expect to be the "super user" with the ultimate solution ... but I already had quite a few situation with global protect and a lot of headache till some situations were solved (one still isn't, there I hope for GP 5.0) So ... 🙂 This one actually I don't really understand: @jdprovine wrote: @Mick_Ball well....... we want 1 user to do both LOL. once by radius, once by OTP or something like that, like you know ( I am going valley girl).... two authentications per person. soooooo..... sorry I couldnt help myself What do you @jdprovine mean with "we want 1 user do both"? As I understood your RADIUS is responsible for OTP, but now how is LDAP coming into the game? Or what is meant to do both? May I add what we use: We use RADIUS only. PaloAlto sends the credentials (username and password) to the RADIUS which checks these values via LDAP in the active directory. If the credentials are valid it sends a accept-challenge back to the firewall which then tells the global protect agent to show the prompt for the OTP. This is for the portal and on the gateway we use cookies but configured the same RADIUS profile there too to make sure OTP is forced in every situation (if for some reason the global protect agent does not connect to the portal first).
... View more