GlobalProtect
Enable Two-Factor Authentication Using a Software Token Application
Table of Contents
Expand All
|
Collapse All
GlobalProtect Docs
-
9.1 (EoL)
- 10.1 & Later
- 9.1 (EoL)
-
-
-
- Deploy App Settings in the Windows Registry
- Deploy App Settings from Msiexec
- Deploy Scripts Using the Windows Registry
- Deploy Scripts Using Msiexec
- SSO Wrapping for Third-Party Credential Providers on Windows Endpoints
- Enable SSO Wrapping for Third-Party Credentials with the Windows Registry
- Enable SSO Wrapping for Third-Party Credentials with the Windows Installer
-
- Mobile Device Management Overview
- Set Up the MDM Integration With GlobalProtect
- Qualified MDM Vendors
-
- Remote Access VPN (Authentication Profile)
- Remote Access VPN (Certificate Profile)
- Remote Access VPN with Two-Factor Authentication
- Always On VPN Configuration
- Remote Access VPN with Pre-Logon
- GlobalProtect Multiple Gateway Configuration
- GlobalProtect for Internal HIP Checking and User-Based Access
- Mixed Internal and External Gateway Configuration
- Captive Portal and Enforce GlobalProtect for Network Access
-
-
- End User Experience
- Management and Logging in Panorama
-
- View a Graphical Display of GlobalProtect User Activity in PAN-OS
- View All GlobalProtect Logs on a Dedicated Page in PAN-OS
- Event Descriptions for the GlobalProtect Logs in PAN-OS
- Filter GlobalProtect Logs for Gateway Latency in PAN-OS
- Restrict Access to GlobalProtect Logs in PAN-OS
- Forward GlobalProtect Logs to an External Service in PAN-OS
- Configure Custom Reports for GlobalProtect in PAN-OS
- Monitoring and High Availability
-
- About GlobalProtect Cipher Selection
- Cipher Exchange Between the GlobalProtect App and Gateway
-
- Reference: GlobalProtect App Cryptographic Functions
-
- Reference: TLS Ciphers Supported by GlobalProtect Apps on macOS Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Windows 10 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Windows 7 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Android 6.0.1 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on iOS 10.2.1 Endpoints
- Reference: TLS Ciphers Supported by GlobalProtect Apps on Chromebooks
- Ciphers Used to Set Up IPsec Tunnels
- SSL APIs
-
6.3
- 6.3
- 6.2
- 6.1
- 6.0
- 5.1
-
- Download and Install the GlobalProtect App for Windows
- Use Connect Before Logon
- Use Single Sign-On for Smart Card Authentication
- Use the GlobalProtect App for Windows
- Report an Issue From the GlobalProtect App for Windows
- Disconnect the GlobalProtect App for Windows
- Uninstall the GlobalProtect App for Windows
- Fix a Microsoft Installer Conflict
-
- Download and Install the GlobalProtect App for macOS
- Use the GlobalProtect App for macOS
- Report an Issue From the GlobalProtect App for macOS
- Disconnect the GlobalProtect App for macOS
- Uninstall the GlobalProtect App for macOS
- Remove the GlobalProtect Enforcer Kernel Extension
- Enable the GlobalProtect App for macOS to Use Client Certificates for Authentication
-
6.1
- 6.1
- 6.0
- 5.1
-
6.3
- 6.3
- 6.2
- 6.1
- 6.0
- 5.1
End-of-Life (EoL)
Enable Two-Factor Authentication Using a Software Token Application
Use a software token application for two-factor authentication
for GlobalProtect.
If your organization uses a software token
(soft token) application, such as RSA SecurID, to implement two-factor
authentication, users are required to first open their software
token app and enter their PIN to obtain a passcode, then enter the
passcode in their GlobalProtect app in the Password field.
This two-step process complicates the login process.
To simplify
the login process and improve the users’ experience, GlobalProtect offers
seamless soft-token authentication. The user enters the RSA PIN
in the GlobalProtect Password field, and
GlobalProtect retrieves the passcode from RSA and proceeds with
the connection without the user taking the extra step of opening
the RSA application.
This feature is supported for all three
RSA modes: PinPad Style (PIN integrated with token code), Fob Style
(PIN followed by token code) and Pinless mode. For PinPad and Fob
Style, the user enters the PIN in the Password field
and GlobalProtect retrieves the passcode. In Pinless mode, the Password
field is grayed out and users enter their username.
This
feature is supported for Windows devices starting with GlobalProtect™
app 5.1.
- Change the registry keys on the client Windows
devices to enable seamless soft-token authentication.You must change the Windows registry on the clients’ Windows devices before you can enable seamless soft-token authentication. GlobalProtect retrieves this registry entry only once, when the GlobalProtect app initializes.
- Open the Windows Registry Editor and select HKEY_LOCAL_MACHINESOFTWAREPALO Also NetworksGlobalProtectSettings.
- Change the auth-api value to yes.Because auth-api is set as yes in the client machine, you should configure the portal and gateways with RSA-based authentication. No other authentication profile is supported because GlobalProtect will attempt to retrieve the passcode.Because the portal and gateway use RSA Authentication, we recommend that you enable cookie-based authentication on gateways. The token that is retrieved for the portal may still be active when GlobalProtect tries to get passcode for the gateway, and authentication may fail because the passcode was already used. Therefore, we suggest that you generate an Authentication Override cookie on the portal and Accept the cookie on the gateway.
- Configure the portal and gateway with RSA-based authentication.
- Enable cookie-based authentication on the GlobalProtect portal.Specifying GlobalProtect to override an existing authentication allows GlobalProtect to overwrite an existing passcode with a newly-created passcode.
- Select NetworkGlobalProtectPortals<portal-config>; then select the Agent tab.
- Add an Agent config or select an existing one.
- Select Generate cookie for authentication override.The authentication cookie includes the following fields:
- user—Username that is used to authenticate the user.
- domain—Domain name of the user.
- os—Application name that is used on the device.
- hostID—Unique ID that is assigned by GlobalProtect to identify the host.
- gen time—Date and time that the authentication cookie was generated.
- ip—IP address of the device that is used to successfully authenticate to GlobalProtect and to obtain the cookie.
- Enable the GlobalProtect gateway to accept cookies for
authentication overrides.
- Select NetworkGlobalProtectGateways<gateway> and select the Agent tab.
- Select Client Settings, then select the GlobalProtect client config or add a new one.
- Select Authentication Override; then,
select Accept cookie for authentication override.The authentication cookie includes the following fields:
- user—Username that is used to authenticate the user.
- domain—Domain name of the user.
- os—Application name that is used on the device.
- hostID—Unique ID that is assigned by GlobalProtect to identify the host.
- gen time—Date and time that the authentication cookie was generated.
- ip—IP address of the device that is used to successfully authenticate to GlobalProtect and to obtain the cookie.
- Select NetworkGlobalProtectPortals<portal-config>; then select the Authentication tab.
- Add a new client authentication
profile or select an existing one; then, select Automatically
retrieve passcode from SoftToken application.