How to Configure Palo Alto Global Protect VPN to support RSA AM to be LDAP + Passcode
Article Number
Applies To
Issue
Resolution
2- Next go to Agent , and make sure the configured agent for "Save User Credentials" is set to No or Save Username Only. Make sure the Authentication override is disabled to force LDAP everytime.
3- Next Go to Network > GlobalProtect > Gateways > Authentication, and choose your RSA AM RADIUS profile for your authentication to prompt for passcode
4- You can choose if you want to perform authentication override for the RSA Passcode section which overrides the authentication if needed, it is according to the customer implementation
Go to Network > GlobalProtect > Gateways > Agent > Client Settings , choose your configured client setting > Authentication Override
Related Articles
RSA AM License Support 343Number of Views How to verify RSA Authentication Manager (AM) 8.1 is sending syslog data to a remote syslog server. 1.25KNumber of Views RSA Authentication Manager 8.x - Weak Ciphers Vulnerabilities found with Qualys Scan - Updated 1.48KNumber of Views Cannot apply RSA Authentication Manager 8.1 SP1 patch due to special characters in OS user rsaadmin password 1.12KNumber of Views How to upload files to RSA Customer Support for analysis 218Number of Views
Trending Articles
Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.9 Release Notes (January 2026) Artifacts to gather in RSA Identity Governance & Lifecycle RSA Governance & Lifecycle 8.0.0 Administrators Guide RSA Governance & Lifecycle 8.0.0 Installation Guide
Don't see what you're looking for?