FIDO Authentication Section
Originally Published: 2023-03-29
By default, the Embedded browser of Global Protect does not support FIDO Authentications, so you must follow the below steps to enable default OS browser-based SAML Authentication.
Procedure
- Go to Admin UI of Palo Alto > Network > Portal > Choose Your Configured Portal > Agent > Choose Your Agent > App. Next, change the default options as per below.
- Change “Use Single Sign On (Windows) to No, and change “Use Default Browser for SAML Authentication” to Yes. Related KB Article from Palo Alto NGFW to check more related configurations.
https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-new-features/new-features-released-in-gp-app/default-browser-for-saml-authentication
Related Articles
Cloud Administration Disable FIDO Authenticator API 33Number of Views Customize FIDO Authentication 70Number of Views Radiant Logic RadiantOne FID 7.3.12 - SecurID Access Implementation Guide 5Number of Views Radiant Logic RadiantOne FID 7.3.12 - Identity Source with AM Configuration - SecurID Access Implementation Guide 7Number of Views How to create a RSA SecurID for Software Token 2.5.1 setup program that can fit on single floppy disc 6Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA MFA Agent 2.5 for Microsoft Windows Installation and Administration Guide
Don't see what you're looking for?