Configure Pre-Logon Support for Prisma Access Agent
Learn how to configure pre-logon for Prisma Access Agent, enabling secure tunnel
connections before user authentication for improved device management and
security.
Where Can I Use This?
What Do I Need?
Prisma Access (Managed by Strata Cloud Manager)
Prisma Access (Managed by Panorama)
NGFW (Managed by Panorama)
Check the prerequisites for the deployment you're using
macOS 14 and later or Windows 10 version 2024 and later desktop
devices
Contact your Palo Alto Networks account representative to
activate the Prisma Access Agent feature
Configure pre-logon for Prisma Access Agent to establish a secure tunnel before a user
logs into their device, which provides essential network access for managing and
updating remote devices without requiring a user to log in to their device.
To implement pre-logon, you need to understand several key components:
Machine certificates must be deployed throughout your environment, typically
using a service like Microsoft Certificate Services. Prisma Access Agent
uses these certificates for device authentication during the pre-logon
process.
You need to configure the Prisma Access Agent settings to enable the
pre-logon feature and specify the connection method.
Be familiar with security policies and how they apply to pre-logon
users.
Pre-logon integrates with existing authentication methods, enabling you to use
certificate-based authentication for pre-logon while maintaining SAML or other methods
for user login. This flexibility ensures that your security policies remain intact while
improving device management capabilities. The feature also supports agent upgrades and
downgrades, ensuring your devices remain current and secure. This feature is designed to
work across system restarts and sleep-wake cycles, providing consistent connectivity for
your managed devices.
About Pre-Logon
The pre-logon workflow begins when a managed device boots up or resumes from sleep.
The device immediately uses its preinstalled machine certificate to authenticate
with the Prisma Access Agent management plane. Upon successful authentication, a
tunnel is established before any user logs in. This tunnel uses a generic username
called pre-logon because the user has not yet logged in. The
pre-logon tunnel grants the device access to network resources as defined by the
security policy configuration that you set up. At this stage, administrators can
push updates, apply group policies, or perform other management tasks without user
interaction.
If an actual username configured in the
IdP is called pre-logon, for example
pre-logon@email.com, that user will be able to access
Prisma Access Agent only in pre-logon mode. Specifically, the
pre-logon@email.com user will receive the app
configuration that is mapped to the generic pre-logon user,
instead of the app configuration being mapped to the
pre-logon@email.com user.
On Windows devices, the Windows login screen will show the Prisma Access Agent
status. If the device has never been enrolled (meaning the agent has never
registered with the management plane, and never been configured on the device), then
under the Sign-in options in the Windows login screen, the
user needs to click the Prisma Access Agent icon. The agent enrollment will proceed
and when finished, will automatically connect to the best available gateway using
the pre-logon tunnel. Once connected, the agent status will change to
Connected, and will list the gateway that the agent is
connected to.
For a device undergoing first-time enrollment,
authentication takes place with the management plane and the gateway. If the device
has previously been enrolled and the user is restarting their device, authentication
happens only with the gateway.
After a user logs in, the pre-logon tunnel transitions to a user-specific tunnel with
potentially broader access rights. The transition happens after the configured
pre-logon tunnel rename timeout expires. Throughout the user's session,
administrators retain the ability to manage the device, retrieve logs, and monitor
its status.
Upon user logout, the system reverts to the pre-logon state. The user-specific tunnel
is terminated, and the device returns to using the limited pre-logon tunnel. This
ensures continuous management capability and essential connectivity even when no
user is actively logged in. The cycle of transitioning between pre-logon and
user-specific tunnels continues, maintaining appropriate access controls throughout
the device's operational states until it's shut down.
The remote shell functionality does not work when the user
is on the logon screen. However, after the user logs on and until the tunnel rename
timeout period expires, the pre-logon tunnel is active and the remote shell will
work as expected.