• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

Company · Blog · Newsletter · Events · Partner Program

Downloads      Support      Security     Admin Login
Rublon

Rublon

Secure Remote Access

  • Product
    • Regulatory Compliance
    • Use Cases
    • Rublon Reviews
    • Authentication Basics
    • What is MFA?
    • Importance of MFA
    • User Experience
    • Authentication Methods
    • Rublon Authenticator
    • Remembered Devices
    • Logs
    • Single Sign-On
    • Access Policies
    • Directory Sync
  • Solutions
    • MFA for Remote Desktop
    • MFA for Remote Access Software
    • MFA for Windows Logon
    • MFA for Linux
    • MFA for Active Directory
    • MFA for LDAP
    • MFA for RADIUS
    • MFA for SAML
    • MFA for RemoteApp
    • MFA for Workgroup Accounts
    • MFA for Entra ID
  • Customers
  • Industries
    • Financial Services
    • Investment Funds
    • Retail
    • Technology
    • Healthcare
    • Legal
    • Education
    • Government
  • Pricing
  • Docs
Contact Sales Free Trial

Multi-Factor Authentication (2FA/MFA) for Palo Alto GlobalProtect – LDAP(S)

December 11, 2023 By Rublon Authors

Last updated on June 11, 2025

Overview

The purpose of this document is to help you enable Rublon Multi-Factor Authentication (MFA) for users logging in to Palo Alto GlobalProtect VPN. To achieve that using LDAP / LDAPS (e.g., Microsoft Active Directory, OpenLDAP), you have to use Rublon Authentication Proxy, an on-premise RADIUS and LDAP proxy server, which allows you to integrate Rublon with Palo Alto GlobalProtect VPN to add Multi-Factor Authentication to your VPN logins.

In this scenario, the Authentication Proxy will work as an LDAP(S) proxy server.

Demo Video

Supported Authentication Methods

Authentication Method Supported Comments
Mobile Push ✔ N/A
WebAuthn/U2F Security Key – N/A
Passcode ✔ N/A
SMS Passcode – N/A
SMS Link ✔ N/A
Phone Call ✔ N/A
QR Code – N/A
Email Link ✔ N/A
YubiKey OTP Security Key ✔ N/A

Before You Start

Ensure that you have properly and fully configured your Palo Alto GlobalProtect VPN. Then, install and configure Rublon Authentication Proxy before configuring Palo Alto GlobalProtect VPN to work with it. Ensure you have prepared the Auth Proxy for LDAPS if you wish to use it. Read Rublon Authentication Proxy and follow the steps in the Installation and Configuration sections. Afterward, follow the Configuration section in this document.

Configuration

Follow these steps to enable Rublon MFA for Palo Alto GlobalProtect VPN.

Add LDAP(S) Server Profile

1. Log in to the Palo Alto administrator panel.

2. Select the Device tab and then select Server Profiles → LDAP.

Image showing selecting the LDAP server profile in the Palo Alto admin panel

3. Click Add at the bottom of the page to add a new LDAP server.

Image showing adding a new LDAP server profile in the Palo Alto admin panel

4. In Profile Name, enter a name for your LDAP/LDAPS server, e.g., RAP_LDAP or RAP_LDAPS.

5. In the Server List section, click Add and fill in the information about the Rublon Authentication Proxy. Refer to the following table.

NameEnter a name for your RADIUS server, e.g., Auth_Proxy to emphasize that the Rublon Authentication Proxy works as a proxy of your LDAP server.
LDAP ServerEnter the IP address of the Rublon Authentication Proxy.
PortEnter the port.

If you want to use LDAP, enter 389.

If you want to use LDAPS, enter 636.

6. In Server Settings, enter the server information. Refer to the following screenshot and table.

Image showing creating an LDAP server profile in the Palo Alto admin panel
Image showing creating an LDAPS server profile in the Palo Alto admin panel
TypeSelect active-directory
Base DNEnter the Base DN of a user who has Read rights in your LDAP(S) server.
Bind DNEnter the Bind DN of a user who has Read rights in your LDAP(S) server.
PasswordEnter the password of the user defined by Bind DN.
Confirm PasswordReenter the password of the user defined by Bind DN.
Bind Timeout60
Search Timeout30
Retry Interval60
Require SSL/TLS secured connectionUncheck if you want to use LDAP.

Check if you want to use LDAPS.
Verify Server Certificate for SSL sessionsUncheck if you want to use LDAP.

Check if you want to use LDAPS.

6. Click OK to save your new LDAP(S) server profile.

Add Authentication Profile

1. Go to Device → Authentication Profile.

Image showing opening the Authentication Profile tab in the GlobalProtect admin panel

2. Click Add to add a new authentication profile.

3. Fill in the form and click OK. Refer to the following image and table.

Image showing creating the authentication profile
NameEnter a name for your authentication profile, e.g., RAP_LDAP.
TypeSelect LDAP.
Server ProfileSelect the LDAP Server Profile you have created before.
User DomainLeave empty.
Username Modifier%USERINPUT%

4. Select the Advanced tab. In the Allow List, click the Add button and select all.

Image showing selecting the allow list for the authentication profile

5. Click OK to save your authentication profile.

LDAPS Only: Add Certificate

Note

If you are using LDAPS, you must add a certificate:

1. Go to Device → Certificate Management → Certificates → Device Certificates and click Import at the bottom.

Image showing how to add a certificate for LDAPS

2. Fill in the form with the information about your certificate. It can be a Local or SCEP certificate. You also can (but do not have to) import a private key file, in which case you will have to enter the passphrase, too.

Image showing importing a certificate in the Palo Alto GlobalProtect admin panel

3. After you are done, click OK to import your certificate.

Configure GlobalProtect Gateway

1. Select the Network tab.

2. Go to GlobalProtect → Gateways.

Image showing selecting the GlobalProtect Gateways tab

3. Click your GlobalProtect Gateway profile name to open its properties.

4. In the newly opened window, select the Authentication tab.

Image showing the GlobalProtect Gateway Configuration

5. Depending on your configuration, click the current entry under Client Authentication to modify it or create a new one by clicking the Add button.

6. Fill in the Client Authentication form with the following information.

Image showing gateway client authentication
NameEnter a descriptive name, e.g., GlobalProtect_Rublon.
OSAny
Authentication ProfileSelect the Authentication Profile you have created before.

7. Click OK to save Client Authentication information.

8.  Click OK to save your choices and finish your GlobalProtect Gateway configuration.

Configure GlobalProtect Portal

1. Select the Network tab and then go to GlobalProtect → Portals.

Image showing selecting the GlobalProtect Portals tab

2. Click your GlobalProtect Portal to open the properties window.

3. In the new window, select the Authentication tab and click the current entry under Client Authentication to modify it or create a new one by clicking the Add button.

Image showing the GlobalProtect Portal Configuration

4. Fill in the form. Refer to the following image and table.

Image showing portal client authentication
NameEnter a descriptive name, e.g., GlobalProtect_Rublon. 
OSAny
Authentication ProfileSelect the Authentication Profile you have created before.

5. Click OK to save the settings. Then, click OK again to finish your GlobalProtect Portal configuration.

Commit Your Configuration

Image showing committing the changes in the Palo Alto GlobalProtect admin panel

1. Click Commit in the upper-right corner of the administrator panel.

2. A new window will open for you to preview changes.

3. Click Commit to make your changes take effect.

Log in to Palo Alto GlobalProtect with LDAP / LDAPS and Rublon MFA

This example portrays connecting via the Palo Alto VPN client with Rublon MFA.

  • Mobile Push has been set as the second factor in Rublon Authentication Proxy configuration (AUTH_METHOD was set to push)
  • We assume you have already installed and configured the VPN client. To download the client, log in to the GlobalProtect website and download the VPN client. Note that if you configured the GlobalProtect Portal for Rublon MFA, you will be required to undergo Rublon MFA authentication before downloading the client.

To log in to Palo Alto GlobalProtect with Rublon MFA (and test your configuration):

1. Open your VPN client, enter your portal address, and click Connect.

Image showing the Palo Alto GlobalProtect VPN client

2. Provide your username and password and click Connect.

Image showing entering the login and password in the Palo Alto GlobalProtect VPN client

3. You will receive a push notification on your phone. 

Image showing a Mobile Push from Rublon MFA for Palo Alto GlobalProtect using LDAP / LDAPS login

4. Tap APPROVE.

5. You will get connected to Palo Alto GlobalProtect.

Image showing a successful connection to the GlobalProtect network

Troubleshooting

If you encounter any issues with your Rublon integration, please contact Rublon Support.

Related Posts

Rublon Authentication Proxy

Rublon Authentication Proxy – Integrations

Filed Under: Documentation

Primary Sidebar

Contents

  • Overview
  • Demo Video
  • Supported Authentication Methods
  • Before You Start
  • Configuration
    • Add LDAP(S) Server Profile
    • Add Authentication Profile
    • LDAPS Only: Add Certificate
    • Configure GlobalProtect Gateway
    • Configure GlobalProtect Portal
    • Commit Your Configuration
  • Log in to Palo Alto GlobalProtect with LDAP / LDAPS and Rublon MFA
  • Troubleshooting
  • Related Posts
Try Rublon for Free
Start your 30-day Rublon Trial to secure your employees using multi-factor authentication.
No Credit Card Required


Footer

Product

  • Regulatory Compliance
  • Use Cases
  • Rublon Reviews
  • Authentication Basics
  • What is MFA?
  • Importance of MFA
  • User Experience
  • Authentication Methods
  • Rublon Authenticator
  • Remembered Devices
  • Logs
  • Single Sign-On
  • Access Policies
  • Directory Sync

Solutions

  • MFA for Remote Desktop
  • MFA for Windows Logon
  • MFA for Remote Access Software
  • MFA for Linux
  • MFA for Active Directory
  • MFA for LDAP
  • MFA for RADIUS
  • MFA for SAML
  • MFA for RemoteApp
  • MFA for Workgroup Accounts
  • MFA for Entra ID

Industries

  • Financial Services
  • Investment Funds
  • Retail
  • Technology
  • Healthcare
  • Legal
  • Education
  • Government

Documentation

  • 2FA for Windows & RDP
  • 2FA for RDS
  • 2FA for RD Gateway
  • 2FA for RD Web Access
  • 2FA for SSH
  • 2FA for OpenVPN
  • 2FA for SonicWall VPN
  • 2FA for Cisco VPN
  • 2FA for Office 365

Support

  • Knowledge Base
  • FAQ
  • System Status

About

  • About Us
  • Blog
  • Events
  • Co-funded by the European Union
  • Contact Us

  • Facebook
  • GitHub
  • LinkedIn
  • Twitter
  • YouTube

© 2025 Rublon · Imprint · Legal & Privacy · Security

  • English