Deploy GlobalProtect Credential Provider Settings in the Windows Registry
Focus
Focus
GlobalProtect

Deploy GlobalProtect Credential Provider Settings in the Windows Registry

Table of Contents

Deploy GlobalProtect Credential Provider Settings in the Windows Registry

You can deploy GlobalProtect credential provider settings in the Windows Registry to delay or enforce its sign-in request.
You can deploy the GlobalProtect credential provider settings to delay the GlobalProtect credential provider Windows sign-in request or to enforce the GlobalProtect credential provider as the default sign-in option for Windows 10 by using the Windows Registry.
  1. Delay the GlobalProtect credential provider Windows sign-in request.
    Establishing the GlobalProtect tunnel before Windows login can be useful in certain situations. For example, you may want to enforce the Windows device to synchronize data with the Active Directory or want to delay the GlobalProtect credential provider Windows sign-in request.
    You can configure the amount of time (in seconds) that the GlobalProtect credential provider waits for the tunnel to be established before submitting a Windows sign-in request when single sign on (SSO) is enabled. By default, the GlobalProtect Credential Provider Support to Delay Windows Login Before Establishing the Tunnel Connection feature is disabled and the GlobalProtect credential provider submits the sign-in requests without any delay.
    1. From the command prompt, enter the regedit command to open the Windows Registry Editor.
    2. In the Windows Registry, go to HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect\PanSetup
    3. Right-click PreLogonState and then select NewDWORD (32-bit) Value.
    4. Right-click New Value #1 and then select Rename.
      Enter LogonWaitTime. Right-click LogonWaitTime and then select Modify. In the Value Data field, set the number of seconds (range is 5-30) for end users to wait to log in to Windows before establishing a tunnel connection. Click OK.
    5. Repeat substeps 1, 2, and 3 to delay the GlobalProtect credential provider from submitting the Windows sign-in request after the tunnel is established.
      Enter LogonPostWaitTime. Right-click LogonPostWaitTime and then select Modify. In the Value Data field, set the number of seconds (range is 3-10) for end users to wait to log in to Windows. Click OK.
      You are required to first enter the amount of time (in seconds) for LogonWaitTime, and then enter the amount of time (in seconds) for LogonPostWaitTime.
  2. Enforce GlobalProtect credential provider as the default sign-in option for Windows 10.
    When GlobalProtect SSO is enabled on Windows devices, users can have more than one sign-in option in addition to using the GlobalProtect credential provider options such as a third-party credential, smart card, Windows Hello PIN, Windows Hello Password, or Windows Hello Fingerprint. Users can use any of these sign-in options to sign in to their Windows device and set it as the default sign-in option at the next Windows login making GlobalProtect SSO unavailable. Users must manually switch to the GlobalProtect credential provider again to enable GlobalProtect SSO. When the GlobalProtect credential provider is enabled as the default sign-in option even when users can login with any other sign-in option, the GlobalProtect credential provider sign-in option is selected at the next Windows login and for subsequent logins.
    When GlobalProtect is installed on Windows devices, users cannot log in to the device using the User Principal Name (UPN)- for example, username@domain- when the GlobalProtect credential provider is selected and the device is offline.
    Follow these guidelines when you are enforcing the GlobalProtect credential provider to be the default-sign option on Windows devices:
    • While the GlobalProtect app is installed or SSO is enabled, the GlobalProtect credential provider is set as the default sign-in option for all users even when the MakeGPCPDefault setting is disabled.
    • When SSO is enabled and the MakeGPCPDefault setting is enabled, users can use any sign-in options such as a third-party credential provider, smart card, Windows Hello PIN, Windows Hello password, or Windows Fingerprint to sign in to their Windows device. Regardless of the sign-in option selected, the GlobalProtect credential provider will be used as the default sign-in option at the next Windows login.
    • When SSO is enabled and the MakeGPCPDefault setting is disabled or empty, the user selected sign-in option will be used as the default at the next Windows login.
    • When SSO is disabled, the GlobalProtect credential provider is unavailable. The Windows default sign-in option will work as expected.
    • The Enforce GlobalProtect Credential Provider as the Default Sign-In for Windows 10 feature does not support the Other user login option. You can configure the Other user login option by using the Group Policy Object (GPO) on the Windows device.
    1. From the command prompt, enter the regedit command to open the Windows Registry Editor.
    2. In the Window Registry, go to:
      HKEY_LOCAL_MACHINE\SOFTWARE\Palo Alto Networks\GlobalProtect
    3. Right-click the GlobalProtect folder, then select NewString Value to add a new string value.
    4. Enter the MakeGPCPDefault string value. Right-click MakeGPCPDefault and then select Modify.
      In the Value data field, enter yes to enable the GlobalProtect credential provider to be the default sign-in option at the next Windows login. If you set the Value data to no, the MakeGPCPDefault setting is disabled and the user selected sign-in option will be used as the default at the next Windows login. Click OK.