You can Configure
Multi-Factor Authentication (MFA) to ensure that each user
authenticates using multiple methods (factors) when accessing highly
sensitive services and applications. For example, you can force
users to enter a login password and then enter a verification code
that they receive by phone before allowing access to important financial
documents. This approach helps to prevent attackers from accessing
every service and application in your network just by stealing passwords.
Of course, not every service and application requires the same degree
of protection, and MFA might not be necessary for less sensitive
services and applications that users access frequently. To accommodate
a variety of security needs, you can Configure
Authentication Policy rules that trigger MFA or a single
authentication factor (such as login credentials or certificates)
based on specific services, applications, and end users.
When choosing how many and which types of authentication factors
to enforce, it’s important to understand how policy evaluation affects
the user experience. When a user requests a service or application,
the firewall first evaluates Authentication policy. If the request
matches an Authentication policy rule with MFA enabled, the firewall
displays a Authentication Portal web form so that users can authenticate
for the first factor. If authentication succeeds, the firewall displays
an MFA login page for each additional factor. Some MFA services
prompt the user to choose one factor out of two to four, which is
useful when some factors are unavailable. If authentication succeeds
for all factors, the firewall evaluates Security policy for the requested service
or application.
To reduce the frequency of authentication challenges that
interrupt the user workflow, configure the first factor to use Kerberos or SAML single sign-on
(SSO) authentication.
To implement MFA for GlobalProtect,
refer to Configure GlobalProtect to facilitate multi-factor
authentication notifications.
You cannot use MFA authentication
profiles in authentication sequences.
For end-user authentication via Authentication
Policy, the firewall directly integrates with several MFA platforms
(Duo v2, Okta Adaptive,
PingID, and RSA SecurID), as well as integrating through
RADIUS or SAML for all other MFA platforms. For remote user authentication
to GlobalProtect portals and gateways and for administrator authentication
to the Panorama and PAN-OS web interface, the firewall integrates with
MFA vendors using RADIUS and SAML only.
The firewall supports the following MFA factors:
Factor
Description
Push
An endpoint device (such as a phone or tablet)
prompts the user to allow or deny authentication.
Short message service (SMS)
An SMS message on the endpoint device prompts
the user to allow or deny authentication. In some cases, the endpoint
device provides a code that the user must enter in the MFA login
page.
Voice
An automated phone call prompts the user
to authenticate by pressing a key on the phone or entering a code
in the MFA login page.
One-time password (OTP)
An endpoint device provides an automatically
generated alphanumeric string, which the user enters in the MFA
login page to enable authentication for a single transaction or
session.