Configure MFA Between RSA SecurID and the Firewall
Multi-factor authentication allows you to protect company assets by using multiple factors to verify a user’s identity before allowing them to access network resources. To enable multi-factor authentication (MFA) between the firewall and the RSA SecurID Access Cloud Authentication Service, you must first configure the RSA SecurID Service so that you have the details that you need to configure the firewall to authenticate users using multiple factors. After you have performed the required configuration on the RSA SecurID Access Console, you can configure the firewall to integrate with RSA SecurID.
The Palo Alto Networks next-generation firewall integrates with the RSA SecurID Access Cloud Authentication Service. The MFA API integration with RSA SecurID is supported for cloud-based services only and does not support two-factor authentication for the on-premise Authentication Manager when the second factor uses the Vendor Specific API. The minimum content version required for this integration is 752 and PAN-OS 8.0.2.
Get the RSA SecurID Access Cloud Authentication Service Details
In order to securely pass user authentication requests to and from the firewall and the RSA SecurID Access Cloud Authentication Service, you must first go to the RSA SecurID Access Console and configure the RSA Access ID, the authentication service URL, and the client API key that the firewall needs to authenticate to and interact with the service. The firewall also needs the Access Policy ID that uses either the RSA Approve or RSA Tokencode authentication method to authenticate to the identity source.
- Generate the RSA SecurID API key—Log on to RSA SecurID Access Console and select.My AccountCompany SettingsAuthentication API KeysAdda new key and thenSave SettingsandPublish Changes.
- Get the RSA SecurID Access endpoint API (Authentication Service Domain) to which the firewall must connect—Select, pick an Identity Router toPlatformIdentity RoutersEditand jot down theAuthentication Service Domain. In this example it is https://rsaready.auth-demo.auth.
- Get the Access Policy ID—Selectand jot down the name of the access policy that will allow the firewall to act as an authentication client to the RSA SecurID service. The policy must be configured to use either the RSA Approve or the RSA Tokencode authentication methods only.AccessPolicies
Configure the Firewall for MFA with RSA SecurID
- Configure the firewall to trust the SSL certificate provided by the RSA SecurID Access endpoint API.
- Export the SSL certificate from the RSA SecurID Access endpoint and import it into the firewall.To enable trust between the firewall and the RSA SecurID Access endpoint API, you must either import a self-signed certificate, or the CA certificate used to sign the certificate.
- Configure a Certificate Profile (and clickDeviceCertificate ManagementCertificate ProfileAdd).
- Configure Captive Portal () in Redirect mode to display a web form for authenticating to RSA SecureID. Make sure to specify the Redirect Host as an IP address or a hostname (with no periods in its name) that resolves to the IP address of the Layer 3 interface on the firewall to which web requests are redirected.DeviceUser IdentificationCaptive Portal Settings
- Configure a multi-factor authentication server profile to specify how the firewall must connect with the RSA SecurID cloud serviceand click(DeviceServer ProfilesMulti Factor AuthenticationAdd).
- Enter aNameto identify the MFA server profile.
- Select theCertificate Profilethat you created earlier, rsa-cert-profile in this example. The firewall will use this certificate when establishing a secure connection with RSA SecurID cloud service.
- In theMFA Vendordrop-down, selectRSA SecurID Access.
- Configure theValuefor each attribute that you noted in Get the RSA SecurID Access Cloud Authentication Service Details:
- API Host—Enter the hostname or IP address of the RSA SecurID Access API endpoint to which the firewall must connect, rsaready.auth-demo.auth in this example.
- Base URI—Do not modify the default value (/mfa/v1_1)
- Client Key—Enter the RSA SecurID Client Key.
- Access ID—Enter the RSA SecurID Access ID.
- Assurance Policy—Enter the RSA SecurID Access Policy name, mfa-policy in this example.
- Timeout—The default is 30 seconds.
- Save the profile.
- Configure an authentication profile (and clickDeviceAuthentication ProfileAdd).The profile defines the order of the authentication factors that users must respond to.
- Select theTypefor the first authentication factor and select the correspondingServer Profile.
- SelectFactors,Enable Additional Authentication Factors, andAddthe rsa-mfa server profile you created earlier in this example.
- ClickOKto save the authentication profile.
- Configure an authentication enforcement object. (and clickObjectsAuthenticationAdd).Make sure to select the authentication profile you just defined called RSA in this example.
- Configure an Authentication policy rule. (and clickPoliciesAuthenticationAdd)Your authentication policy rule must match the services and applications you want to protect, specify the users who must authenticate, and include the authentication enforcement object that triggers the authentication profile. In this example, RSA SecurID Access authenticates all users who accessing HTTP, HTTPS, SSH, and VNC traffic with the authentication enforcement object called RSA Auth Enforcement (inActions, select theAuthentication Enforcementobject).
- Commityour changes on the firewall.
- Verify that users on your network are being secured using RSA SecurID using the Push or PIN Code authentication method you enabled.
- Push authentication
- Ask a user on your network to launch a web browser and access a website. The Captive Portal page with the IP address or hostname for the Redirect Host you defined earlier should display.
- Verify that the user enters the credentials for the first authentication factor and then continues to the secondary authentication factor, and selectsPush.
- Check for aSign-In requeston the RSA SecurID Access application on the user’s mobile device.
- Ask the user toAcceptthe Sign-In Request on the mobile device, and wait for a few seconds for the firewall to receive the notification of successful authentication. The user should be able to access the requested website.To test an authentication failure,Declinethe sign-in request on the mobile device.
- PIN Code authentication
- Ask a user on your network to launch a web browser and access a website. The Captive Portal page with the IP address or hostname for the redirect host you defined earlier should display.
- Verify that the user enters the credentials for the first authentication factor and then continues to the secondary authentication factor, and selectsPIN Code.
- Check that aPIN Codedisplays on the RSA SecurID Access application on the user’s mobile device.
- Ask the user to copy the PIN code in theEnter the PIN...prompt of the web browser and clickSubmit. Wait for a few seconds for the firewall to receive the notification of successful authentication. The user should be able to access the requested website.
Multi-Factor Authentication You can Configure Multi-Factor Authentication (MFA) to ensure that each user authenticates using multiple methods (factors) when accessing highly sensitive services and applications. ...
Configure Multi-Factor Authentication
Configure Multi-Factor Authentication To use Multi-Factor Authentication (MFA) for protecting sensitive services and applications, you must configure Captive Portal to display a web form for ...
Authentication Policy and Multi-Factor Authentication
Authentication Policy and Multi-Factor Authentication To protect services and applications from attackers, you can use the new Authentication policy to control access for end users. ...
Objects > Authentication
Objects > Authentication An authentication enforcement object specifies the method and service to use for authenticating end users who access your network resources. You assign ...
Configure an Authentication Profile
Authentication Profile Device > Authentication Profile Select Device Authentication Profile or Panorama Authentication Profile to manage authentication profiles. To create a new profile, Add one ...
Configure Local or External Authentication for Firewall Adm...
Configure Local or External Authentication for Firewall Administrators You can use Local Authentication and External Authentication Services to authenticate administrators who access the firewall. These ...
Authentication Authentication is a method for protecting services and applications by verifying the identities of users so that only legitimate users have access. Several firewall ...
Configure an Authentication Profile and Sequence
Configure an Authentication Profile and Sequence An authentication profile defines the authentication service that validates the login credentials of administrators who access the firewall web ...
Enable Two-Factor Authentication Using One-Time Passwords (OTPs)
Enable Two-Factor Authentication Using One-Time Passwords (OTPs) Use this workflow to configure two-factor authentication using one-time passwords (OTPs) on the portal and gateways. When a ...