RADIUS

Remote Authentication Dial-In User Service (RADIUS) is a broadly supported networking protocol that provides centralized authentication and authorization. You can configure RADIUS authentication for end users or administrators on the firewall and for administrators on Panorama. Optionally, you can use RADIUS Vendor-Specific Attributes (VSAs) to manage administrator authorization. RADIUS VSAs enable you to quickly change the roles, access domains, and user groups of administrators through your directory service instead of reconfiguring settings on the firewall and Panorama. You can also configure the firewall to use a RADIUS server for:
When sending authentication requests to a RADIUS server, the firewall and Panorama use the authentication profile name as the network access server (NAS) identifier, even if the profile is assigned to an authentication sequence for the service (such as administrative access to the web interface) that initiates the authentication process.
The firewall and Panorama support the following RADIUS VSAs. To define VSAs on a RADIUS server, you must specify the vendor code (25461 for Palo Alto Networks firewalls or Panorama) and the VSA name and number. Some VSAs also require a value. Refer to your RADIUS server documentation for the steps to define these VSAs.
When configuring the advanced vendor options on a Cisco Secure Access Control Server (ACS), you must set both the
Vendor Length Field Size
and
Vendor Type Field Size
to
1
. Otherwise, authentication will fail.
Name
Number
Value
PaloAlto-Admin-Role
1
A default (dynamic) administrative role name or a custom administrative role name on the firewall.
PaloAlto-Admin-Access-Domain
2
The name of an access domain for firewall administrators (configured in the
Device
Access Domains
page). Define this VSA if the firewall has multiple virtual systems.
PaloAlto-Panorama-Admin-Role
3
A default (dynamic) administrative role name or a custom administrative role name on Panorama.
PaloAlto-Panorama-Admin-Access-Domain
4
The name of an access domain for Device Group and Template administrators (configured in the
Panorama
Access Domains
page).
PaloAlto-User-Group
5
The name of a user group that an authentication profile references.
PaloAlto-User-Domain
6
Don’t specify a value when you define these VSAs.
PaloAlto-Client-Source-IP
7
PaloAlto-Client-OS
8
PaloAlto-Client-Hostname
9
PaloAlto-GlobalProtect-Client-Version
10

Related Documentation