NGFW (managed by Panorama or Strata Cloud Manager)
Prisma Access (managed by Panorama or Strata Cloud
Manager)
PAN-OS 11.1.0 and later
For earlier PAN-OS versions, use
the predeployment registry key/plist setting
GlobalProtect Gateway license or Prisma Access license with
the Mobile User subscription
Starting with PAN-OS version 11.1.0, the default browser selection for SAML
authentication is set at the GlobalProtect client authenticaiton level. This setting
controls whether the GlobalProtect app uses the device's default browser for the
initial SAML or CAS authentication to the portal.
With this feature, you can select the Use Default Browser
option to use the device's default web browser (instead of the GlobalProtect
embedded browser) to complete the authentication workflow. Follow the steps below to
access this option:
On Panorama, navigate to NetworkGlobalProtectPortals<portal-config>Authentication<client-authentication-config>
On Strata Cloud Manager, follow the steps below:
Enable the feature flag for Use Default
Browser.
Navigate to ConfigurationNGFW and Prisma AccessConfiguration ScopePrisma AccessGlobalProtect
Post-Upgrade Behavior Logic
When upgrading from a PAN-OS version earlier than 11.1.0, the system performs a
migration check across all existing GlobalProtect agent configurations:
If any portal agent configuration had the deprecated Use Default
Browser for SAML Authentication option enabled, the new
portal-wide Use Default Browser option is
automatically selected after the upgrade. This is true for both Panorama and
Strata Cloud Manager environments.
If all agent configurations had the setting disabled, the Use
Default Browser option will not be enabled.
Example Upgrade Scenario 1 (Default Browser is Enabled)
This scenario shows the result of a mixed configuration after migration.
With this configuration, Windows users use the embedded browser
and all other users use the default browser.
The Use Default Browser option is automatically
enabled in the Client Authentication configuration. All users will now
start using the default browser, overriding the Windows-specific
setting.
Example Scenario 2 (Restoring OS-Specific Browser Behavior)
The pre-upgrade configuration for this scenario is as follows:
After upgrading to PAN-OS 11.2.0 or later, the Use Default
Browser option is enabled in the client authentication configuration
instead of the in agent-configuration, so all users will start using the default
browser.
In order to retain the pre-upgrade behavior, set the client authentication as
follows:
These settings will enable Windows users to use the embedded browser for SAML
authentication and all other OS users to use the default browser.
Downgrade Behavior
If you downgrade the PAN-OS version from 11.1.0 to an earlier version, the
Use Default Browser configuration in the client
authentication setting will be automatically removed. You must revert to using
predeployment registry key/plist settings to manage the browser preference.
GlobalProtect gateway authentication configurations are not
affected during the upgrade or downgrade scenarios.