How to Configure Palo Alto Global Protect VPN to support RSA AM to be LDAP + Passcode
Article Number
Applies To
Issue
Resolution
2- Next go to Agent , and make sure the configured agent for "Save User Credentials" is set to No or Save Username Only. Make sure the Authentication override is disabled to force LDAP everytime.
3- Next Go to Network > GlobalProtect > Gateways > Authentication, and choose your RSA AM RADIUS profile for your authentication to prompt for passcode
4- You can choose if you want to perform authentication override for the RSA Passcode section which overrides the authentication if needed, it is according to the customer implementation
Go to Network > GlobalProtect > Gateways > Agent > Client Settings , choose your configured client setting > Authentication Override
Related Articles
How to verify RSA Authentication Manager (AM) 8.1 is sending syslog data to a remote syslog server. 1.24KNumber of Views RSA Authentication Manager 8.x - Weak Ciphers Vulnerabilities found with Qualys Scan - Updated 1.47KNumber of Views RSA AM License Support 335Number of Views Cannot apply RSA Authentication Manager 8.1 SP1 patch due to special characters in OS user rsaadmin password 1.12KNumber of Views Does RSA support the installation of third party software or applications on the RSA Authentication Manager 8.X (virtual) … 513Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026)
Don't see what you're looking for?