FIDO Authentication Section
Originally Published: 2023-03-29
By default, the Embedded browser of Global Protect does not support FIDO Authentications, so you must follow the below steps to enable default OS browser-based SAML Authentication.
Procedure
- Go to Admin UI of Palo Alto > Network > Portal > Choose Your Configured Portal > Agent > Choose Your Agent > App. Next, change the default options as per below.
- Change “Use Single Sign On (Windows) to No, and change “Use Default Browser for SAML Authentication” to Yes. Related KB Article from Palo Alto NGFW to check more related configurations.
https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-new-features/new-features-released-in-gp-app/default-browser-for-saml-authentication
Related Articles
Customize FIDO Authentication 73Number of Views Cloud Administration Disable FIDO Authenticator API 33Number of Views Radiant Logic RadiantOne FID 7.3.12 - SecurID Access Implementation Guide 5Number of Views Radiant Logic RadiantOne FID 7.3.12 - Identity Source with AM Configuration - SecurID Access Implementation Guide 7Number of Views How to create a RSA SecurID for Software Token 2.5.1 setup program that can fit on single floppy disc 6Number of Views
Trending Articles
RSA Release Notes for RSA Authentication Manager 8.8 Generate a Certificate Signing Request (CSR) for the Web Tier RSA Authentication Manager 8.9 Release Notes (January 2026) RSA SecurID Software Token 4.1.2 and 4.2.1 for Mac OS X displays: No token storage device was detected. Verify that the de… RSA Authentication Manager 8.8 Security Configuration Guide
Don't see what you're looking for?