Set Up Pre-Logon for Prisma Access Agent
Focus
Focus
Prisma Access Agent

Set Up Pre-Logon for Prisma Access Agent

Table of Contents

Set Up Pre-Logon for Prisma Access Agent

Complete the Cloud Identity Engine settings and configure pre-logon for Prisma Access Agent.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Check the prerequisites for the deployment you're using
  • Minimum required Prisma Access Agent version: 25.3.0.43
  • macOS 14 and later or Windows 10 version 2024 and later desktop devices
  • Contact your Palo Alto Networks account representative to activate the Prisma Access Agent feature
To set up pre-logon for Prisma Access Agents, you need to install the root certificate for signing client certificates in Cloud Identity Engine. Then, configure the machine certificate as an authentication method to establish a tunnel from an endpoint before logging in to Prisma Access on Strata Cloud Manager, and create a certificate profile that includes the pre-logon CA certificate. Finally, configure the pre-logon settings in the Agent Settings and set up security policy rules for pre-logon users in Strata Cloud Manager.
Before you begin to configure pre-logon, you need to complete the prerequisites on the endpoints.
Complete the following steps to configure pre-logon for Prisma Access Agents:
  1. In Cloud Identity Engine, install the root certificate for signing client certificates, which signs the machine hostname of the endpoint.
    1. Add a certificate to the CA Chains as follows:
      1. Select CA ChainsAdd CA Chain.
      2. Enter the name for the new CA Chain in CA Name.
      3. Drag and drop the certificate to Upload Certificate and Submit.
    2. Add an authentication type for the CA chain you added.
      1. Select Authentication TypesAdd New Authentication Type.
      2. Set Up an authentication type for the client certificate.
      3. Enter a meaningful name for the Authentication Type Name.
      4. Add CA Chain and select the CA chain that you added in step 1.a and Submit.
    3. Add an authentication profile for the authentication type that you created for the client certificate.
      1. Select Authentication ProfilesAdd Authentication Profile.
      2. Enter a meaningful PROFILE NAME.
      3. Choose the Single authentication mode.
      4. Select the authentication type that you created in step 1.b.
      5. Select User Principal Name for the Directory Sync Username Attribute.
      6. Select Common-Name for the Directory Sync Group Attribute.
      7. Submit.
  2. In Strata Cloud Manager, configure machine certificate authentication for pre-logon users.
    1. Import a third-party root CA certificate.
      Use a machine certificate as an authentication method to establish a tunnel from an endpoint before logging in to Prisma Access.
      1. Select ManageConfigurationNGFW and Prisma AccessConfiguration ScopeAccess AgentObjectsCertificate Management.
      2. Import a custom certificate. Ensure that you're importing the certificate for Prisma Access Agent mobile users.
      3. Enter the required values, and Save the certificate settings.
    2. Create a pre-logon certificate profile.
      Create a certificate profile and include the self-signed root CA. This CA validates the machine certificate by the Prisma Access Agent mobile user during pre-logon.
      1. Select ManageConfigurationNGFW and Prisma AccessConfiguration ScopeAccess AgentObjectsCertificate Management.
      2. Add Profile.
      3. Enter a Name for the certificate profile.
      4. Add the root pre-logon CA certificate you imported in step 2.a.
      5. Save the certificate profile settings.
  3. Configure the user authentication settings in Strata Cloud Manager.
    1. Go to WorkflowsPrisma Access SetupAccess AgentPrisma Access Agent.
    2. Add User Authentication.
    3. Select the following options:
      • Authenticate Users From—Select Match Any.
      • Authentication Type—Select Client Certificate OR SAML.
      • Certificate Profile—Select the pre-logon certificate profile that you created in step 2.b.
      • Authentication Profile—Select or create the authentication profile based on the Cloud Identity Engine profile you created in step 1.c.
  4. Enable pre-logon in the Agent Settings on Strata Cloud Manager.
    1. Go to WorkflowsPrisma Access SetupAccess AgentPrisma Access Agent.
    2. Click Add Agent Settings to create a new agent setting or select an existing agent setting to enable the pre-logon feature.
    3. In the Match Criteria, select Match anyMatch pre-logon. With this setting, devices running the pre-logon tunnel will get the agent configurations.
    4. In the Connect drop-down, select Even before the user logs on to the machine (Pre-logon).
    5. Select Show Advanced OptionsVPN and set the Pre-logon tunnel rename timeout (min) value.
      This determines, after a user logs in, how long the pre-logon tunnel will remain active before transitioning to a user-specific tunnel (when the pre-logon tunnel gets renamed to the user-specific tunnel). The range is 0-180 minutes. The default is 5 minutes.
  5. To allow endpoints to access resources, create security policy rules that match the pre-logon user. These policy rules should allow access to only the basic services for starting up the system; for example, DHCP, DNS, specific Active Directory services, antivirus, or other update services.
    1. Select ManageNGFW and Prisma AccessConfiguration ScopeAccess Agent.
    2. Select Security ServicesSecurity Policies.
    3. Select Add RuleSecurity Rule to create a security policy rule or modify an existing rule.
    4. Build the rule by configuring the appropriate rule components. Be sure to select UsersPre Logon.
  6. Add the following statement to the Prisma Access Agent configuration file (config.json) for predeployment:
    "pre_logon_supported" : true
    This will cause the agent to enroll to the Prisma Access Agent Manager (EPM) during pre-logon. Predeployment is only necessary for the first-time user.
  7. Test the configuration by rebooting a device and verifying that it establishes a pre-logon tunnel before user authentication. On Windows devices, check the Windows login screen. You can refer to the pre-logon workflow for more details.
  8. Verify the pre-logon tunnel status using the pacli command on the endpoint.
    1. Run the pacli epm status command and check the Authentication Status and User type fields in the output.
      A user type of Prelogon indicates that the user has not signed on to the operating system and the pre-logon tunnel is active. A user type of Logged on indicates that the user has successfully authenticated to the operating system and the pre-logon tunnel has transitioned to the user-specific tunnel.
    2. Run the pacli status command and check the Mode and field to determine the tunnel mode that’s active.
      After transitioning to the user-specific tunnel, the mode will change to the previously configured connection mode for the user (Always On or On Demand) and the same agent session will resume.
  9. Monitor the Inventory page to view the number of devices currently connected in pre-logon mode.
    1. Select ManagePrisma Access Agent.
    2. The Agent Status chart will show the number of agents connected to the gateway via the pre-logon tunnel. The status for agents in the pre-logon mode is connected-prelogon.
    3. The Agent Status column in the Devices table will show that a device is connected via the pre-logon tunnel with status connected-prelogon. In pre-logon mode, the User is always pre-logon.
      To show the users who are connected in pre-logon mode, you can filter on the User column to show only users the username of pre-logon.
      After the pre-logon tunnel transitions to the user-specific tunnel, the Agent Status will change to connected, and the User column will display the username associated with the device.
      There might be a brief interval (a few seconds) when the tunnel becomes disconnected during the tunnel transition. However, typically the agent will reconnect before sending the disconnection status to the Inventory page.