Deploy Connect Before Logon Settings in the Windows Registry
Focus
Focus
GlobalProtect

Deploy Connect Before Logon Settings in the Windows Registry

Table of Contents

Deploy Connect Before Logon Settings in the Windows Registry

Connect Before Logon allows users to log in to the VPN before logging into their Windows endpoints, enabling the deployment of settings and configurations prior to user login.
You can deploy Connect Before Logon settings to Windows 10 endpoints prior to enabling end users to log in to the VPN before logging into the endpoint by using the Windows Registry. GlobalProtect retrieves the registry keys only once, when the GlobalProtect app initializes.
Follow these guidelines when deploying the Connect Before Logon settings:
  • The Pre-logon and Pre-logon then On-demand connection methods are not supported simultaneously with Connect Before Logon.
  • If you are using smart card authentication or username/password-based authentication for user login using an authentication service such as LDAP, RADIUS, or OTP, you must configure exclusions for specific fully qualified domain names for the portal and gateway by entering them to Allow traffic to specified FQDN when Enforce GlobalProtect Connection for Network Access is enabled and GlobalProtect Connection is not established as an app setting in the App Configurations area of the GlobalProtect portal. If you are using SAML authentication for user login and using the configured SAML identity providers (ldPs) such as Okta, you must also configure exclusions for *okta.com and *oktacdn.com. For other ldPs, you must configure exclusions for the URLs that contain IP addresses or fully qualified domain names only if the Enforcer status is enabled.
  1. Configure the registry keys on the end user Windows endpoints.
    You must change the Windows registry on the end users’ Windows endpoints before you can enable Connect Before Logon. You can automatically add the registry keys or manually add the keys.
    • To automatically add the registry keys for PanPlapProvider and PanPlapProvider.dll in PanGPS.exe ( C:\Program Files\Palo Alto Networks\GlobalProtect), use the -registerplap command to run as an administrator by using the following syntax:
      PanGPS.exe -registerplap
    • To automatically unregister the keys for PanPlapProvider and PanPlapProvider.dll in PanGPS.exe ( C:\Program Files\Palo Alto Networks\GlobalProtect), use the -unregisterplap command to run as an administrator by using the following syntax:
      PanGPS.exe -unregisterplap
    To manually add the registry keys, open the Windows Registry Editor and enter regedit on the command prompt.
    You must create the CLSID folder.
    1. In the Windows Registry, go to HKEY_CLASSES_ROOT\CLSID\{20A29589-E76A-488B-A520-63582302A285}.
      Add the PanPlapProvider value in the format @=PanPlapProvider.
    2. In the Windows Registry, go to HKEY_CLASSES_ROOT\CLSID\{20A29589-E76A-488B-A520-63582302A285}\InprocServer32@="PanPlapProvider.dll".
      Verify that the ThreadingModel value is set to Apartment. This is the default value.
    3. In the Windows Registry, go to HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\PLAP Providers\{20A29589-E76A-488B-A520-63582302A285}@="PanPlapProvider".
      Add the PanPlapProvider value in the format @=PanPlapProvider.
  2. (Optional) Configure additional portal addresses or names to display.
    If configured, Connect Before Logon will use the default portal address or name in the Windows Registry (HKEY_LOCAL_MACHINE\SOFTWARE\PaloAlto Networks\GlobalProtect\PanSetup with key Portal).
    You can configure additional portal addresses or names that you want to display in the Portal drop-down by changing the registry keys on the end user Windows endpoints. You can add up to five portal addresses or names. You must change the Windows registry on the end users’ Windows endpoints before you can define the portal addresses or names.
    Open the Windows Registry Editor and enter regedit on the command prompt.
    1. In the Windows Registry, create the CBL folder under HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect.
    2. In the Windows Registry, go to HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect\CBL.
    3. Select EditNewString Value to create a registry entry for each portal that you want to add.
      You must specify each entry as Portal1, Portal2, Portal3, Portal4, and Portal5. Each entry cannot contain spaces.
    4. Right-click the portal registry value, and then select Modify.
    5. Enter the IP address or name of the GlobalProtect portal in the Value Data field, and then click OK.
    6. Repeat steps 3 and 4 for each portal that you want to add.
  3. (Optional) Display the predefined portal addresses or names.
    You must change the Windows registry on the end users’ Windows endpoints before you can display the portal addresses or names.
    Open the Windows Registry Editor and enter regedit on the command prompt.
    1. In the Windows Registry, create the CBL folder under HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect.
    2. In the Windows Registry, go to HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect\CBL.
    3. Select EditNewString Value to create a registry entry for AlwaysShowPortal.
    4. Enter the value as yes in the Value Data field, and then click OK.
      By default, Connect Before Logon does not display the portal address or name if only one portal is defined.
  4. (Optional) Enable end users to authenticate using a smart card.
    You must change the Windows registry on the end users’ Windows endpoints before you can enable smart card authentication.
    Open the Windows Registry Editor and enter regedit on the command prompt.
    1. In the Windows Registry, create the CBL folder under HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect.
    2. In the Windows Registry, go to HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect\CBL.
    3. Select EditNewString Value to create a registry entry for UseSmartCard.
    4. Enter the value as yes in the Value Data field, and then click OK.
  5. Reboot the endpoint.
    You must reboot the endpoint in order for the PLAP and Connect Before Logon registry keys to take effect.
  6. Verify the configuration.
    After you have configured the settings in the Windows registry and to use Connect Before Logon starting with GlobalProtect™ app 5.2, choose the authentication method: