FIDO Authentication Section
Originally Published: 2023-03-29
By default, the Embedded browser of Global Protect does not support FIDO Authentications, so you must follow the below steps to enable default OS browser-based SAML Authentication.
Procedure
- Go to Admin UI of Palo Alto > Network > Portal > Choose Your Configured Portal > Agent > Choose Your Agent > App. Next, change the default options as per below.
- Change “Use Single Sign On (Windows) to No, and change “Use Default Browser for SAML Authentication” to Yes. Related KB Article from Palo Alto NGFW to check more related configurations.
https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-new-features/new-features-released-in-gp-app/default-browser-for-saml-authentication
Related Articles
Radiant Logic RadiantOne FID 7.3.12 - SecurID Access Implementation Guide 5Number of Views Cloud Administration Disable FIDO Authenticator API 33Number of Views Customize FIDO Authentication 67Number of Views Radiant Logic RadiantOne FID 7.3.12 - Identity Source with AM Configuration - SecurID Access Implementation Guide 7Number of Views Using RSA Security Key Utility 372Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 Deploying RSA Authenticator 6.2.2 for Windows Using DISM Downloading RSA Authentication Manager license files or RSA Software token seed records
Don't see what you're looking for?