FIDO Authentication Section
Originally Published: 2023-03-29
By default, the Embedded browser of Global Protect does not support FIDO Authentications, so you must follow the below steps to enable default OS browser-based SAML Authentication.
Procedure
- Go to Admin UI of Palo Alto > Network > Portal > Choose Your Configured Portal > Agent > Choose Your Agent > App. Next, change the default options as per below.
- Change “Use Single Sign On (Windows) to No, and change “Use Default Browser for SAML Authentication” to Yes. Related KB Article from Palo Alto NGFW to check more related configurations.
https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-new-features/new-features-released-in-gp-app/default-browser-for-saml-authentication
Related Articles
Cloud Administration Disable FIDO Authenticator API 33Number of Views Radiant Logic RadiantOne FID 7.3.12 - SecurID Access Implementation Guide 5Number of Views Customize FIDO Authentication 70Number of Views Radiant Logic RadiantOne FID 7.3.12 - Identity Source with AM Configuration - SecurID Access Implementation Guide 7Number of Views RSA ID Plus FIDO Passkey Certification Status 175Number of Views
Trending Articles
Connection fails to Cloud Authentication Service when connecting through a proxy server from RSA Authentication Manager to… Downloading RSA Authentication Manager license files or RSA Software token seed records Unable to login to RSA Authentication Manager Security Console as super admin RSA Authentication Manager 8.9 Release Notes (January 2026) How to manipulate imported RSA SecurID Software Token(s) on an iPhone or iPad device
Don't see what you're looking for?