Prisma Access Browser
IP-Based Enforcement Using an Authentication Gateway
Table of Contents
Expand All
|
Collapse All
Prisma Access Browser Docs
IP-Based Enforcement Using an Authentication Gateway
IP-based enforcement Using the Authentication Gateway.
Where Can I Use This? | What Do I Need? |
---|---|
|
|
IP-based enforcement enables you to restrict access to your applications by
ensuring that authentication traffic originates only from authorized Prisma Access
Browser egress IP addresses.
Existing customers using the shared Authentication Gateway,
refer to the Migration Guide for existing Customers, below.
Platform Support
IP-based enforcement supports both Prisma Access Browser (PAB) and Prisma Access
Mobile Browser, providing consistent protection across desktop and mobile
platforms.
How it Works
The IP-based enforcement feature works through a simple yet effective
mechanism:
- The Authentication Gateways serves as a forward proxy: The Authentication Gateways functions as a forward proxy with a set of predictable, dedicated IP addresses specific to your tenant.
- Configured traffic routing: The browser’s configuration routes IdP authentication traffic through the Prisma Access Browser gateway.
- IdP conditional access: You establish conditional access rules in your identity provider to only enable authentication from your dedicated Authentication Gateway egress IP addresses.
- Enforced access control: As a result, authentication attempts from browsers other than PAB will fail, effectively restricting access to your protected applications.
Key Benefits
- Dedicated tenant-specific egress IPs: Your tenant receives unique IP addresses not shared with other customers.
- Multitenant validation: Easily verify traffic from specific tenants, even when managing multiple tenants.
- Regional availability: Available in strategic global locations with automatic failover protection.
Supported Regions
IP-based enforcement is available in the following GCP compute regions:
- us-east4 (Ashburn, Virginia)
- us-west1 (Portland)
- europe-west2 (London)
- europe-west3 (Frankfurt)
- Asia-south1 (Mumbai) IP-based enforcement operates across all five regions by default, and the system doesn’t allow selecting individual regions.
Configuration Steps
- Configure dedicated Egress IP Addresses
- From the Strata Cloud Manager, go to Workflow → Prisma Access Browser → SSO Enforcement.Configuration → Onboarding → Prisma Access Browser → View.Click Create Dedicated Egress IP Addresses.This process can take a few minutes until the IP Addresses are available in all regions.Copy the list of generated IP addresses for use in your IdP configuration,Configure your Identity Provider (IdP)
- Select your IdP provider from the list of supported providers and click Save:In case your IdP does not appear on the list or you're using a custom IdP, contact Support or your Account team to configure your custom IdP URL. If you use multiple identity providers, you can select more than one from the list.Follow the specific instructions for your selected IdP to configure conditional access with your dedicated egress IP addresses.Enable Authentication Traffic Routing
- Toggle the Authentication Traffic Routing switch to enable the feature.If you use Shared Authentication Gateway, continue with the Migration Guide for existing Customers (below).Validate the configuration by logging into an enforced application in your IdP:
- Test using a commercial browser - the system should deny access.
- Test using the Prisma Access Browser - the system should grant access.
Migration Guide for Existing Customers
If you're already using IP address-based enforcement with shared IP addresses, follow these steps to migrate to dedicated IP addresses:- Access the New Interface: The Admin Console will display a new dedicated IP address tab.
- Create Unique IP addresses: Generate your tenant-specific
dedicated IP addresses.
- Update IdP: Add the new IP addresses to your IdP's conditional access policy rule.
- Switch Enforcement Method: Change to “Dedicated IP addresses” in the web interface, and click Save.
Important Migration Notes:- When migrating, keep the original shared IP addresses in your IdP's configuration as a fall back.
- If you encounter issues with the new configuration, you can
temporarily switch back to shared IP addresses in the admin console.
Mobile browsers with versions older than [1.5093 for iOS, 1.5096 for Android] will continue using the old shared IP addresses until upgraded to the minimum supported version.
Troubleshooting
If you encounter issues with IP-based enforcement:- Check your browser's troubleshooting page. :
- Click the Prisma Access Browser Extension icon in the menu
bar.
- Click the shield icon.
- Open the Authentication Gateway section.
- Ensure that the Status shows Configured, and that no errors appear.
- Click Test Connectivity. Follow the instructions as
needed.
- Click the Prisma Access Browser Extension icon in the menu
bar.
- Ensure that you have correctly configured the IP addresses in your IdP.
- Turn on the Authentication Traffic Routing toggle.
- If the issues persist, contact Support.
Frequently Asked Questions (FAQ)
Q: How long does it take for dedicated IP addresses to become available?A: The process typically takes a few minutes to complete across all supported regions.Q: Can I use the same IP addresses across multiple tenants?A: No, each tenant receives unique dedicated IP addresses to ensure proper isolation and security. For organizations managing multiple tenants, including all relevant IP addresses in the conditional access configuration is crucial.Q: How long will the IP addresses remain reserved?A: The system allocates your dedicated IP address to your tenant for as long as your tenant remains active as long as the Dedicated IP Addresses feature is enabled.Q: Which platforms support the Authentication Gateway?A: The feature is available for both Prisma Access Browser for desktop and mobile.Q: What is the expected behavior if the dedicated Authentication Gateways is configured, but the user has an old browser version?A: Old browser versions will keep sending traffic to the legacy Authentication Gateway (“shared proxy”) until the browser is up to date. For desktop browsers, the extension version should be automatically updated immediately after the next browser launch. For the Mobile Browser, ensure that users update to a supported version.Q: What does the traffic flow look like if I configure “route all traffic to Prisma Access”?A: When you enable the authentication routing, the authentication traffic will be routed through the authentication proxy regardless of the general traffic routing to Prisma Access.Q: What happens if a region becomes unavailable?A: The system or browser automatically routes users to the second-nearest available region to maintain service continuity.Q: Can I see all the Traffic logs in SLS?A: Currently this isn’t available.Q: My tenant is in a different region than the Authentication Gateways. What will happen?A: Authentication traffic will be routed through the region nearest to the user.Q: Can I use a dedicated authenticated gateway with an Eval/Lab license?A: The creation of dedicated egress IP addresses is a feature of paid subscriptions. If you're on a trial or require access through a different arrangement, contact your account team.