The firewall and Panorama can use external servers to
control administrative access to the web interface and end user
access to services or applications through Authentication Portal
and GlobalProtect. In this context, any authentication service that
is not local to the firewall or Panorama is considered external,
regardless of whether the service is internal (such as Kerberos)
or external (such as a SAML identity provider) relative to your
network. The server types that the firewall and Panorama can integrate
with include
Multi-Factor
Authentication (MFA),
SAML,
Kerberos,
TACACS+,
RADIUS,
and
LDAP. Although
you can also use the
Local
Authentication services that the firewall and Panorama support,
usually external services are preferable because they provide:
Authentication through an external service requires a server
profile that defines how the firewall connects to the service. You
assign the server profile to authentication profiles, which define
settings that you customize for each application and set of users.
For example, you can configure one authentication profile for administrators
who access the web interface and another profile for end users who
access a GlobalProtect portal. For details, see
Configure
an Authentication Profile and Sequence.