Michael McNamara https://blog.michaelfmcnamara.com technology, networking, virtualization and IP telephony Sat, 02 Mar 2024 17:45:15 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.4 Issues with Palo Alto 10.2.x and GlobalProtect with SAML https://blog.michaelfmcnamara.com/2024/02/issues-palo-alto-10-2-x-and-globalprotect-with-saml/ https://blog.michaelfmcnamara.com/2024/02/issues-palo-alto-10-2-x-and-globalprotect-with-saml/#respond Thu, 29 Feb 2024 04:34:21 +0000 https://blog.michaelfmcnamara.com/?p=7470

We’ve been using Palo Alto’s GlobalProtect with Azure SAML successfully for the past 4 years. We have a single portal with multiple gateways deployed globally. We recently started upgrading our Palo Alto firewalls from 9.1.x to address the certificate issues and discovered that GlobalProtect broke when we hit 10.2.x. We were getting the infamous “Failed to get client configuration” error. The firewall was unable to determine the username to use for the LDAP query to get the group membership.

Ultimately we had to go back to our Azure SAML configuration and modify the username attribute such that the SAML response would return “domain\username” format.

Cheers!

Update: March 2, 2024

It’s turn’s out that prior to 10.2 the user domain was being learned from a certificate on the client. We issue certificates to all our devices as a second factor, third factor really when you think about MFA. I don’t believe Palo Alto has any intention on “fixing” the issue, hence you need to update your SAML attributes to return “domain/username” in the username attribute.

]]>
https://blog.michaelfmcnamara.com/2024/02/issues-palo-alto-10-2-x-and-globalprotect-with-saml/feed/ 0