Configure Authentication Portal
The following procedure shows how to set up Authentication Portal authentication by configuring the PAN-OS integrated User-ID agent to redirect web requests that match an Authentication Policy rule to a firewall interface (redirect host).
Based on their sensitivity, the applications that users access through Authentication Portal require different authentication methods and settings. To accommodate all authentication requirements, you can use default and custom authentication enforcement objects. Each object associates an Authentication rule with an authentication profile and an Authentication Portal authentication method.
- Default authentication enforcement objects—Use the default objects if you want to associate multiple Authentication rules with the same global authentication profile. You must configure this authentication profile before configuring Authentication Portal, and then assign it in the Authentication Portal Settings. For Authentication rules that require Multi-Factor Authentication (MFA), you cannot use default authentication enforcement objects.
- Custom authentication enforcement objects—Use a custom object for each Authentication rule that requires an authentication profile that differs from the global profile. Custom objects are mandatory for Authentication rules that require MFA. To use custom objects, create authentication profiles and assign them to the objects after configuring Authentication Portal—when you Configure Authentication Policy.
If you use Authentication Portal without the other User-ID functions (user mapping and group mapping), you don’t need to configure a User-ID agent.
- Configure the interfaces that the firewall will use for incoming web requests, authenticating users, and communicating with directory servers to map usernames to IP addresses.When the firewall connects to authentication servers or User-ID agents, it uses the management interface by default. As a best practice, isolate your management network by configuring service routes to connect to the authentication servers or User-ID agents.
- (MGT interface only) Select, edit theDeviceSetupInterfacesManagementinterface, selectUser-ID, and clickOK.
- (Non-MGT interface only) Assign an Interface Management Profile to the Layer 3 interface that the firewall will use for incoming web requests and communication with directory servers. You must enableResponse PagesandUser-IDin the Interface Management profile.
- (Non-MGT interface only) Configure a service route for the interface that the firewall will use to authenticate users. If the firewall has more than one virtual system (vsys), the service route can be global or vsys-specific. The services must includeLDAPand potentially the following:
- Kerberos,RADIUS,TACACS+, orMulti-Factor Authentication—Configure a service route for any authentication services that you use.
- (Redirect mode only) Create a DNS address (A) record that maps the IP address on the Layer 3 interface to the redirect host. If you will use Kerberos SSO, you must also add a DNS pointer (PTR) record that performs the same mapping.
- Make sure Domain Name System (DNS) is configured to resolve your domain controller addresses.To verify proper resolution, ping the server FQDN. For example:admin@PA-220>ping host dc1.acme.com
- Configure clients to trust Authentication Portal certificates.Required for redirect mode—to transparently redirect users without displaying certificate errors. You can generate a self-signed certificate or import a certificate that an external certificate authority (CA) signed.To use a self-signed certificate, create a root CA certificate and use it to sign the certificate you will use for Authentication Portal:
- Select.DeviceCertificate ManagementCertificatesDevice Certificates
- Generate a Certificate to use for Authentication Portal. Be sure to configure the following fields:
- Common Name—Enter the DNS name of the intranet host for the Layer 3 interface.
- Signed By—Select the CA certificate you just created or imported.
- Certificate Attributes—ClickAdd, for theTypeselectIPand, for theValue, enter the IP address of the Layer 3 interface to which the firewall will redirect requests.
- Configure an SSL/TLS Service Profile. Assign the Authentication Portal certificate you just created to the profile.If you don’t assign an SSL/TLS Service Profile, the firewall uses TLS 1.2 by default. To use a different TLS version, configure an SSL/TLS Service Profile for the TLS version you want to use.
- Configure clients to trust the certificate:
- Import the certificate as a trusted root CA into all client browsers, either by manually configuring the browser or by adding the certificate to the trusted roots in an Active Directory (AD) Group Policy Object (GPO).
- (Optional) Configure Client Certificate Authentication.You don’t need an authentication profile or sequence for client certificate authentication. If you configure both an authentication profile/sequence and certificate authentication, users must authenticate using both.
- Use a root CA certificate to generate a client certificate for each user who will authenticate through Authentication Portal. The CA in this case is usually your enterprise CA, not the firewall.
- Export the CA certificate in PEM format to a system that the firewall can access.
- Import the CA certificate onto the firewall: see Import a Certificate and Private Key. After the import, click the imported certificate, selectTrusted Root CA, and clickOK.
- In theUsername Fielddrop-down, select the certificate field that contains the user identity information.
- In theCA Certificateslist, clickAddand select the CA certificate you just imported.
- (Optional) Configure Authentication Portal for the Apple Captive Network Assistant.This step is only required if you are using Authentication Portal with the Apple Captive Network Assistant (CNA). To use Authentication Portal with CNA, perform the following steps.
- Verify you have specified an FQDN for the redirect host (not just an IP address).
- Select an SSL/TLS service profile that uses a publicly-signed certificate for the specified FQDN.
- Enter the following command to adjust the number of requests supported for Authentication Portal:set deviceconfig setting ctd cap-portal-ask-requests<threshold-value>By default, the firewall has a rate limit threshold for Authentication Portal that limits the number of requests to one request every two seconds. The CNA sends multiple requests that can exceed this limit, which can result in a TCP reset and an error from the CNA. The recommended threshold value is 5 (default is one). This value will allow up to 5 requests every two seconds. Based on your environment, you may need to configure a different value. If the current value is not sufficient to handle the number of requests, increase the value.
- Configure the Authentication Portal settings.
- Selectand edit the settings.DeviceUser IdentificationAuthentication Portal Settings
- Enable Authentication Portal(default is enabled).
- Specify theTimer, which is the maximum time in minutes that the firewall retains an IP address-to-username mapping for a user after that user authenticates through Authentication Portal (default is 60; range is 1 to 1,440). After theTimerexpires, the firewall removes the mapping and any associated Authentication Timestamps used to evaluate theTimeoutin Authentication policy rules.When evaluating the Authentication PortalTimerand theTimeoutvalue in each Authentication policy rule, the firewall prompts the user to re-authenticate for whichever setting expires first. Upon re-authenticating, the firewall resets the time count for the Authentication PortalTimerand records new authentication timestamps for the user. Therefore, to enable differentTimeoutperiods for different Authentication rules, set the Authentication PortalTimerto a value the same as or higher than any ruleTimeout.
- Select theSSL/TLS Service Profileyou created for redirect requests over TLS. See Configure an SSL/TLS Service Profile.
- Select theMode(in this example,Redirect).
- (Redirect mode only) Specify theRedirect Host, which is the intranet hostname (a hostname with no period in its name) that resolves to the IP address of the Layer 3 interface on the firewall to which web requests are redirected.
- Select the fall back authentication method to use:
- To use client certificate authentication, select theCertificate Profileyou created.
- To use global settings for interactive or SSO authentication, select theAuthentication Profileyou configured.
- To use Authentication policy rule-specific settings for interactive or SSO authentication, assign authentication profiles to authentication enforcement objects when you Configure Authentication Policy.
- ClickOKandCommitthe Authentication Portal configuration.
- Next steps...
Recommended For You
Recommended videos not found.