GlobalProtect
Configure a Per-App VPN Configuration for Windows 10 UWP Endpoints Using Workspace ONE
Table of Contents
Expand All
|
Collapse All
GlobalProtect Docs
-
- 10.1 & Later
- 9.1
-
- 6.2
- 6.1
- 6.0
- 5.3
- 5.2
- 5.1
-
- 6.1
- 6.0
- 5.2
- 5.1
-
- 6.2
- 6.1
- 6.0
- 5.3
- 5.2
- 5.1
Configure a Per-App VPN Configuration for Windows 10 UWP Endpoints Using Workspace
ONE
You can enable access to internal resources from your managed mobile endpoints by configuring
GlobalProtect VPN access using Workspace ONE. In a per-app VPN configuration, you
can specify which managed apps can send traffic through the GlobalProtect VPN
tunnel. Unmanaged apps will continue to connect directly to the internet instead of
through the GlobalProtect VPN tunnel.
Because Workspace ONE does not yet list GlobalProtect as an official connection provider for
Windows endpoints, you must select an alternate VPN provider, edit the settings
for the GlobalProtect app, and import the configuration back into the VPN
profile as described in the following workflow.
Use the following steps to configure a per-app VPN configuration for Windows 10 UWP endpoints
using Workspace ONE:
- Download the GlobalProtect app for Windows 10 UWP:
- Download the GlobalProtect app directly from the Microsoft Store.
- From the Workspace ONE console, modify an existing Windows 10 UWP profile add a new one.
- Select, and thenDevicesProfiles & ResourcesProfilesADDa new profile.
- SelectWindowsas the platform andWindows Phoneas the device type.
- Configure theGeneralsettings:
- Enter aNamefor the profile.
- (Optional) Enter a briefDescriptionof the profile that indicates its purpose.
- (Optional) Set theDeploymentmethod toManagedto enable the profile to be removed automatically upon unenrollment
- (Optional) Select anAssignment Typeto determine how the profile is deployed to endpoints. SelectAutoto deploy the profile to all endpoints automatically,Optionalto enable the end user to install the profile from the Self-Service Portal (SSP) or to manually deploy the profile to individual endpoints, orComplianceto deploy the profile when an end user violates a compliance policy applicable to the endpoint.
- (Optional) In theManaged Byfield, enter the Organization Group with administrative access to the profile.
- (Optional) In theAssigned Groupsfield, add the Smart Groups to which you want the profile added. This field includes an option to create a new Smart Group, which can be configured with specs for minimum OS, device models, ownership categories, organization groups, and more.
- (Optional) Indicate whether you want to include anyExclusionsto the assignment of this profile. If you selectYes, theExcluded Groupsfield displays, enabling you to select the Smart Groups that you wish to exclude from the assignment of this profile.
- Configure theCredentialssettings:All per-app VPN configurations require certificate-based authentication.
- To pull client certificates from Workspace ONE users:
- Set theCredential SourcetoUser Certificate.
- Select theS/MIME Signing Certificate(default).
- To upload a client certificate manually:
- Set theCredential SourcetoUpload.
- Enter aCredential Name.
- ClickUPLOADto locate and select the certificate that you want to upload.
- After you select a certificate, clickSAVE.
- Select theKey Locationwhere you want to store the certificate’s private key:
- TPM Required—Store the private key on a Trusted Platform Module. If a Trusted Platform Module is not available on the endpoint, the private key cannot be installed.
- TPM If Present—Store the private key on a Trusted Platform Module if one is available on the endpoint. If a Trusted Platform Module is not available on the endpoint, the private key is stored in the endpoint software.
- Software—Store the private key in the endpoint software.
- Passport—Save the private key to Microsoft Passport. To use this option, Workspace ONE Protection Agent must be installed on the endpoint.
- Set theCertificate StoretoPersonal.
- To use a predefined certificate authority and template:
- Set theCredential SourcetoDefined Certificate Authority.
- Select theCertificate Authorityfrom which you want obtain certificates.
- Select theCertificate Templatefor the certificate authority.
- Select theKey Locationwhere you want to store the certificate’s private key:
- TPM Required—Store the private key on a Trusted Platform Module. If a Trusted Platform Module is not available on the endpoint, the private key cannot be installed.
- TPM If Present—Store the private key on a Trusted Platform Module if one is available on the endpoint. If a Trusted Platform Module is not available on the endpoint, the private key is stored in the endpoint software.
- Software—Store the private key in the endpoint software.
- Passport—Save the private key to Microsoft Passport. To use this option, Workspace ONE Protection Agent must be installed on the endpoint.
- Set theCertificate StoretoPersonal.
- Configure theVPNsettings:
- Enter theConnection Namethat the endpoint displays.
- Select an alternateConnection Typeprovider (do not selectIKEv2,L2TP,PPTP, orAutomatic, as these do not have the associated vendor settings required for the GlobalProtect VPN profile).You must select an alternate vendor because Workspace ONE has not yet listed GlobalProtect as an official connection provider for Windows endpoints.
- In theServerfield, enter the hostname or IP address of the GlobalProtect portal to which users connect.
- In the Authentication area, select a certificate-basedAuthentication Typeto specify the method to authenticate end users.All per-app VPN configurations require certificate-based authentication.
- (Optional) To permit GlobalProtect to save user credentials,ENABLEthe option toRemember Credentialsin the Policies area.
- In the VPN Traffic Rules area,ADD NEW PER-APP VPN RULEto specify rules for specific legacy apps (typically .exe files) or modern apps (typically downloaded from the Microsoft Store):
- (Optional) EnableVPN On Demandto allow the GlobalProtect connection to establish automatically when the app is launched.
- Select aRouting Policyto specify whether to send app traffic through the VPN tunnel.
- (Optional) Configure specificVPN Traffic Filtersto route app traffic through the VPN tunnel only if it matches specific match criteria that you define, such as IP address and port.Add match criteria by clickingADD NEW FILTER. When prompted, enter aFilter Nameand correspondingFilter Value.
- SAVE & PUBLISHyour changes.
- Configure per-app VPN settings for a new managed app or modify the settings for an existing managed app.After configuring the settings for the app and enabling per-app VPN, you can publish the app to a group of users and enable the app to send traffic through the GlobalProtect VPN tunnel.
- Select.APPS & BOOKSApplicationsNativePublic
- To add a new app, selectADD APPLICATION. To modify the settings for an existing app, locate the app in the list of Public apps and then select the edit (
) icon in the actions menu next to the row.
- In theManaged Byfield, select the organization group that will manage this app.
- Set thePlatformtoWindows Phone.
- Select your preferredSourcefor locating the app:
- SEARCH APP STORE—Enter theNameof the app.
- ENTER URL—Enter the Microsoft Store URL for the app (for example, to search for the Dropbox mobile app by URL, enter https://www.microsoft.com/en-us/p/dropbox-mobile/9wzdncrfj0pk).
- ClickNEXT.If you chose to search the Microsoft Store,SELECTthe app from the list of search results.
- On the Add Application dialog, ensure that the appNameis correct. This is the name that will appear in the Workspace ONE App Catalog.
- (Optional) Assign the app to pre-defined or customCategoriesfor ease-of-access in the Workspace ONE App Catalog.
- SAVE & ASSIGNthe new app.
- On the Update Assignment dialog, selectAssignmentsand then clickADD ASSIGNMENTto add the Smart Groups that will have access to this app.
- In theSelect Assignment Groupsfield, select the Smart Groups that you want to grant access to this app.
- Select theApp Delivery Method. If you selectAUTO, the app is automatically deployed to the specified Smart Groups. If you selectON DEMAND, the app must be deployed manually.
- ADDthe new assignment.
- (Optional) To exclude certain Smart Groups from accessing the app, selectExclusionsand then select the Smart Groups that you want to exclude from theExclusionfield.
- SAVE & PUBLISHthe configuration to the assigned Smart Groups.
- To set the connection type provider to GlobalProtect, edit the VPN profile in XML.To minimize additional edits in the raw XML, review the settings in your VPN profile before you export the configuration. If you need to change a setting after you export the VPN profile, you can make the changes in the raw XML or, you can update the setting in the VPN profile and perform this step again.
- In the, select the radio button next to the new profile you added in the previous steps, and then selectDevicesProfilesList View</>XMLat the top of the table. Workspace ONE opens the XML view of the profile.
- Exportthe profile and then open it in a text editor of your choice.
- Edit the following settings for GlobalProtect:
- In theLoclURIelement that specifies thePluginPackageFamilyName, change the element to:<LocURI>./Vendor/MSFT/VPNv2/PaloAltoNetworks/PluginProfile/PluginPackageFamilyName</LocURI>
- In theDataelement that follows, change the value to:<Data>PaloAltoNetworks.GlobalProtect_rn9aeerfb38dg</Data>
- Save your changes to the exported profile.
- Return to Workspace ONE and select.DevicesProfilesList View
- Create (select) and name a new profile.AddAdd ProfileWindowsWindows Phone
- Select, and then copy and paste the edited configuration.Custom SettingsConfigure
- Save & Publishyour changes.
- Clean up the original profile by selecting the original profile from, and then selectingDevicesProfilesList View. Workspace ONE moves the profile to the Inactive list.More ActionsDeactivate
- Test the configuration.