Device > Authentication Sequence
Table of Contents
9.1 (EoL)
Expand all | Collapse all
-
- Objects > Addresses
- Objects > Address Groups
- Objects > Regions
- Objects > Dynamic User Groups
- Objects > Application Groups
- Objects > Application Filters
- Objects > Services
- Objects > Service Groups
- Objects > External Dynamic Lists
- Objects > Custom Objects > Spyware/Vulnerability
- Objects > Custom Objects > URL Category
- Objects > Security Profiles > Antivirus
- Objects > Security Profiles > Anti-Spyware Profile
- Objects > Security Profiles > Vulnerability Protection
- Objects > Security Profiles > File Blocking
- Objects > Security Profiles > WildFire Analysis
- Objects > Security Profiles > Data Filtering
- Objects > Security Profiles > DoS Protection
- Objects > Security Profiles > GTP Protection
- Objects > Security Profiles > SCTP Protection
- Objects > Security Profile Groups
- Objects > Log Forwarding
- Objects > Authentication
- Objects > Decryption > Forwarding Profile
- Objects > Schedules
-
-
- Firewall Interfaces Overview
- Common Building Blocks for Firewall Interfaces
- Common Building Blocks for PA-7000 Series Firewall Interfaces
- Tap Interface
- HA Interface
- Virtual Wire Interface
- Virtual Wire Subinterface
- PA-7000 Series Layer 2 Interface
- PA-7000 Series Layer 2 Subinterface
- PA-7000 Series Layer 3 Interface
- Layer 3 Interface
- Layer 3 Subinterface
- Log Card Interface
- Log Card Subinterface
- Decrypt Mirror Interface
- Aggregate Ethernet (AE) Interface Group
- Aggregate Ethernet (AE) Interface
- Network > Interfaces > VLAN
- Network > Interfaces > Loopback
- Network > Interfaces > Tunnel
- Network > Interfaces > SD-WAN
- Network > VLANs
- Network > Virtual Wires
-
- Network > Network Profiles > GlobalProtect IPSec Crypto
- Network > Network Profiles > IPSec Crypto
- Network > Network Profiles > IKE Crypto
- Network > Network Profiles > Monitor
- Network > Network Profiles > Interface Mgmt
- Network > Network Profiles > QoS
- Network > Network Profiles > LLDP Profile
- Network > Network Profiles > SD-WAN Interface Profile
-
-
- Device > Setup
- Device > Setup > Management
- Device > Setup > Interfaces
- Device > Setup > Telemetry
- Device > Setup > Content-ID
- Device > Setup > WildFire
- Device > Log Forwarding Card
- Device > Config Audit
- Device > Administrators
- Device > Admin Roles
- Device > Access Domain
- Device > Authentication Sequence
-
- Security Policy Match
- QoS Policy Match
- Authentication Policy Match
- Decryption/SSL Policy Match
- NAT Policy Match
- Policy Based Forwarding Policy Match
- DoS Policy Match
- Routing
- Test Wildfire
- Threat Vault
- Ping
- Trace Route
- Log Collector Connectivity
- External Dynamic List
- Update Server
- Test Cloud Logging Service Status
- Test Cloud GP Service Status
- Device > Virtual Systems
- Device > Shared Gateways
- Device > Certificate Management
- Device > Certificate Management > Certificate Profile
- Device > Certificate Management > OCSP Responder
- Device > Certificate Management > SSL/TLS Service Profile
- Device > Certificate Management > SCEP
- Device > Certificate Management > SSL Decryption Exclusion
- Device > Response Pages
- Device > Server Profiles
- Device > Server Profiles > SNMP Trap
- Device > Server Profiles > Syslog
- Device > Server Profiles > Email
- Device > Server Profiles > HTTP
- Device > Server Profiles > NetFlow
- Device > Server Profiles > RADIUS
- Device > Server Profiles > TACACS+
- Device > Server Profiles > LDAP
- Device > Server Profiles > Kerberos
- Device > Server Profiles > SAML Identity Provider
- Device > Server Profiles > DNS
- Device > Server Profiles > Multi Factor Authentication
- Device > Local User Database > Users
- Device > Local User Database > User Groups
- Device > Scheduled Log Export
- Device > Software
- Device > Dynamic Updates
- Device > Licenses
- Device > Support
-
- Network > GlobalProtect > MDM
- Network > GlobalProtect > Device Block List
- Network > GlobalProtect > Clientless Apps
- Network > GlobalProtect > Clientless App Groups
- Objects > GlobalProtect > HIP Profiles
-
- Use the Panorama Web Interface
- Context Switch
- Panorama Commit Operations
- Defining Policies on Panorama
- Log Storage Partitions for a Panorama Virtual Appliance in Legacy Mode
- Panorama > Setup > Interfaces
- Panorama > High Availability
- Panorama > Administrators
- Panorama > Admin Roles
- Panorama > Access Domains
- Panorama > Device Groups
- Panorama > Plugins
- Panorama > Log Ingestion Profile
- Panorama > Log Settings
- Panorama > Scheduled Config Export
End-of-Life (EoL)
Device > Authentication Sequence
- Device > Authentication Sequence
- Panorama > Authentication Sequence
In some environments, user accounts reside in multiple directories
(such as LDAP and RADIUS). An authentication sequence is a set of
authentication profiles that the firewall tries to use for authenticating
users when they log in. The firewall tries the profiles sequentially
from the top of the list to the bottom—applying the authentication,
Kerberos single sign-on, allow list, and account lockout values
for each—until one profile successfully authenticates the user.
The firewall only denies access if all profiles in the sequence
fail to authenticate. For details on authentication profiles, see Device
> Authentication Profile.
Configure an authentication sequence
with multiple authentication profiles that use different authentication
methods. Configure at least two external authentication methods
and one local (internal) method so connectivity issues don’t prevent
authentication. Make the local authentication profile the last profile
in the sequence so it’s only used if all external authentication
methods fail. (External authentication provides dedicated, reliable,
centralized authentication services, including logging and troubleshooting
features.)
Authentication Sequence Settings | Description |
---|---|
Name | Enter a name to identify the sequence. The
name is case-sensitive, can have up to 31 characters, and can include
only letters, numbers, spaces, hyphens, underscores, and periods.
The name must be unique in the current Location (firewall
or virtual system) relative to other authentication sequences and
to authentication profiles. In a firewall
that has multiple virtual systems, if the Location of
the authentication sequence is a virtual system (vsys), don’t enter
the same name as an authentication profile in the Shared location.
Similarly, if the sequence Location is Shared, don’t
enter the same name as a profile in a vsys. While you can commit an
authentication sequence and profile with the same names in these cases,
reference errors might occur. |
Location | Select the scope in which the sequence is
available. In the context of a firewall that has more than one virtual
system (vsys), select a vsys or select Shared (all
virtual systems). In any other context, you can’t select the Location; its
value is predefined as Shared (firewalls) or as Panorama. After
you save the sequence, you can’t change its Location. |
Use domain to determine authentication profile | Select this option (selected by default)
if you want the firewall to match the domain name that a user enters
during login with the User Domain or Kerberos Realm of
an authentication profile associated with the sequence and then
use that profile to authenticate the user. The user input that the
firewall uses for matching can be the text preceding the username
(with a backslash separator) or the text following the username
(with a @ separator). If the firewall does not find a match, it tries
the authentication profiles in the sequence in top-to-bottom order. |
Authentication Profiles | Click Add and select
from the drop-down for each authentication profile you want to add
to the sequence. To change the list order, select a profile and
click Move Up or Move Down.
To remove a profile, select it and click Delete. You
cannot add an authentication profile that specifies a multi-factor
authentication (MFA) server profile or a Security Assertion Markup
Language (SAML) Identity Provider server profile. |