NOTE: the freeware pfsense firewall can configure a working VPN with user passwords and user certs (2FA) inside of 20 MINUTES. With Palo Alto Networks, I'm on WEEK 6. Where I am at: 1) I have GlobalProtect working with password auth. (Had to call tech support, who knew what steps were missing from the documentation.) 2) I want to have 2FA: so, I spun up a CA (easy-rsa) to provide a CA cert, and generate per-user certs. (pfSense will just do this for you in the GUI, but I did the process described here: https://openvpn.net/index.php/open-source/documentation/howto.html#pki) 3) I can get password + cert working with the unsupported Linux client. (https://github.com/dlenski/openconnect) 4) I can get password + cert working with the unsupported Linux client, using either my personal cert, or another user's personal cert. (WTF?) 5) We have tried and tried and tried again to "import" a personal cert on MacOS but anywhere we import a cert with the "Keychain Access" app GlobalProtect comes back with the same error: "The client certificate to establish the GlobalProtect connection was not found." Our client certs have Subject fields that look like this: User=user1: Subject: C=US, ST=CA, L=Menlo Park, O=Quantifind, OU=Ops, CN=user1/name=VPN/emailAddress=ops@example.com User=user2: Subject: C=US, ST=CA, L=Menlo Park, O=Quantifind, OU=Ops, CN=user2/name=VPN/emailAddress=ops@example.com Questions: A) How in the name of all that is good do you get a user cert imported on MacOS? B) My Certificate Profile is configured for Username Field: Subject (common-name) ... what should I have in there? C) Or, are my cert Subject's in a form that won't work for GlobalProtect: what should they look like? Thanks, -danny
... View more