Integrate Third-Party Enterprise Browser with Explicit Proxy
Focus
Focus
Prisma Access

Integrate Third-Party Enterprise Browser with Explicit Proxy

Table of Contents

Integrate Third-Party Enterprise Browser with Explicit Proxy

Learn how to integrate a third-party browser with Prisma Access Explicit Proxy.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access 5.2.1 license
End users who use the Prisma Access browser can access both SaaS and private web applications using a secure, authenticated, and encrypted channel. Prisma Access ensures that a user is authenticated and authorized before they get access to any application.
Prisma Access extends this support to third-party enterprise browsers, allowing Explicit Proxy users to securely authenticate and be authorized to access private and SaaS applications using the same security, encryption, and authentication methods.
Prerequisites and Known Limitations
  • Configure Explicit Proxy.
  • Disable GlobalProtect if it's enabled.
  • You can use Prisma Access Browser with a third-party browser; however, you can't use multiple third-party browsers at the same time.
  • Any advanced settings configured for existing Explicit Proxy customers are applied to all third-party browsers to Explicit Proxy public or private app access traffic.
Configure a Third-Party Enterprise Browser
To integrate a third-party enterprise browser with Prisma Access, allowing users to securely access applications from that browser, complete the following steps:
  1. Enable third-party enterprise browser integration with Prisma Access.
    1. Log in to Strata Cloud Manager.
    2. Go to WorkflowsIntegrationsPrisma Access and click the settings icon under Third Party Enterprise Browser.
    3. On the settings page, enable Third Party Enterprise Browser Integration.
    4. Under Import Certificate File, select Browse to upload the public certificate, and Save.
      You must get the public key from your third-party enterprise browser.
      All certificate expiration notifications are managed in the third-party enterprise browser as it manages the certificate lifecycle.
    5. Push Config to push the Third Party Enterprise Browser Integration configuration to the Prisma Access Explicit Proxy.
  2. Configure Prisma Access Explicit Proxy integration on the third-party enterprise browser:
    1. On your third-party enterprise browser, enable Palo Alto Explicit Proxy integration.
    2. Add the public key provided to integrate the Palo Alto Strata Cloud Manager.
    3. Configure the encoded tenant ID provided when you configure Third Party Integration for the Palo Alto Networks Strata Cloud Manager.
    4. Configure Explicit Proxy FQDN.
When you enable the integration, the browser control panel generates an asymmetric key pair per tenant. The public key is provided to the admin for configuring third-party integration on the Prisma Access side. The private key is used to sign the JSON web token (JWT) by the browser control plane, and the public key (uploaded by the admin) is used to validate the signature. You can see the validity of the certificate on Strata Cloud Manager.
Troubleshooting for Proxy Errors
Error ConditionResponseBrowser Action
No Poxy-Authorization headerHTTP 407 with Proxy-Authenticate: Basic realm="proxy_fqdn"Retry with Token (might need to fetch token)
Token empty or incorrect Proxy-Authorization header formatHTTP 407 with Proxy-Authenticate: Basic realm="proxy_fqdn"Retry with Token (might need to fetch token)
Token parsing internal errorHTTP 407 with Proxy-Authenticate: Basic realm="proxy_fqdn" and error_msg= "Proxy-Agent Malformed token"Fetch a new token and retry- Limit retries to N number
Token expiredHTTP 407 with Proxy-Authenticate: Basic realm="proxy_fqdn" and error_msg= "Proxy-Agent Auth-Cookie expired"Fetch a new token from Prisma Access