Enable Two-Factor Authentication Using a Software Token Application
Focus
Focus
GlobalProtect

Enable Two-Factor Authentication Using a Software Token Application

Table of Contents
End-of-Life (EoL)

Enable Two-Factor Authentication Using a Software Token Application

Use a software token application for two-factor authentication for GlobalProtect.
If your organization uses a software token (soft token) application, such as RSA SecurID, to implement two-factor authentication, users are required to first open their software token app and enter their PIN to obtain a passcode, then enter the passcode in their GlobalProtect app in the Password field. This two-step process complicates the login process.
To simplify the login process and improve the users’ experience, GlobalProtect offers seamless soft-token authentication. The user enters the RSA PIN in the GlobalProtect Password field, and GlobalProtect retrieves the passcode from RSA and proceeds with the connection without the user taking the extra step of opening the RSA application.
This feature is supported for all three RSA modes: PinPad Style (PIN integrated with token code), Fob Style (PIN followed by token code) and Pinless mode. For PinPad and Fob Style, the user enters the PIN in the Password field and GlobalProtect retrieves the passcode. In Pinless mode, the Password field is grayed out and users enter their username.
This feature is supported for Windows devices starting with GlobalProtect™ app 5.1.
  1. Change the registry keys on the client Windows devices to enable seamless soft-token authentication.
    You must change the Windows registry on the clients’ Windows devices before you can enable seamless soft-token authentication. GlobalProtect retrieves this registry entry only once, when the GlobalProtect app initializes.
    1. Open the Windows Registry Editor and select HKEY_LOCAL_MACHINESOFTWAREPALO Also NetworksGlobalProtectSettings.
    2. Change the auth-api value to yes.
      Because auth-api is set as yes in the client machine, you should configure the portal and gateways with RSA-based authentication. No other authentication profile is supported because GlobalProtect will attempt to retrieve the passcode.
      Because the portal and gateway use RSA Authentication, we recommend that you enable cookie-based authentication on gateways. The token that is retrieved for the portal may still be active when GlobalProtect tries to get passcode for the gateway, and authentication may fail because the passcode was already used. Therefore, we suggest that you generate an Authentication Override cookie on the portal and Accept the cookie on the gateway.
  2. Configure the portal and gateway with RSA-based authentication.
  3. Enable cookie-based authentication on the GlobalProtect portal.
    Specifying GlobalProtect to override an existing authentication allows GlobalProtect to overwrite an existing passcode with a newly-created passcode.
    1. Select NetworkGlobalProtectPortals<portal-config>; then select the Agent tab.
    2. Add an Agent config or select an existing one.
    3. Select Generate cookie for authentication override.
      The authentication cookie includes the following fields:
      • user—Username that is used to authenticate the user.
      • domain—Domain name of the user.
      • os—Application name that is used on the device.
      • hostID—Unique ID that is assigned by GlobalProtect to identify the host.
      • gen time—Date and time that the authentication cookie was generated.
      • ip—IP address of the device that is used to successfully authenticate to GlobalProtect and to obtain the cookie.
  4. Enable the GlobalProtect gateway to accept cookies for authentication overrides.
    1. Select NetworkGlobalProtectGateways<gateway> and select the Agent tab.
    2. Select Client Settings, then select the GlobalProtect client config or add a new one.
    3. Select Authentication Override; then, select Accept cookie for authentication override.
      The authentication cookie includes the following fields:
      • user—Username that is used to authenticate the user.
      • domain—Domain name of the user.
      • os—Application name that is used on the device.
      • hostID—Unique ID that is assigned by GlobalProtect to identify the host.
      • gen time—Date and time that the authentication cookie was generated.
      • ip—IP address of the device that is used to successfully authenticate to GlobalProtect and to obtain the cookie.
  5. Select NetworkGlobalProtectPortals<portal-config>; then select the Authentication tab.
  6. Add a new client authentication profile or select an existing one; then, select Automatically retrieve passcode from SoftToken application.