Configure Multiple Portals in Prisma Access
Focus
Focus

Configure Multiple Portals in Prisma Access

Table of Contents

Configure Multiple Portals in Prisma Access

You can configure two portals based on port numbers in the same Prisma Access tenant, with each portal supporting a different authentication method. Enable this feature to migrate mobile users from one authentication method to another without creating a new Prisma Access tenant. This feature depends on the authentication override cookie settings, and are enabled for both portals and on gateways.
When configuring multiple GlobalProtect portals with Traffic Steering, do not configure
Accept Default Routes over Service Connections
(
Panorama
Cloud Services
Configuration
Traffic Steering
Settings
Accept Default Route over Service Connection
); if you do, mobile users cannot connect to the secondary portal.
  1. Contact your Palo Alto Networks account team to activate this functionality.
  2. Configure a mobile user and the authentication method for it.
    The minimum required version of the GlobalProtect Client version is 6.1.
  3. Select
    Cloud Services
    Configuration
    Mobile Users—GlobalProtect
    Settings
    Advanced
    .
  4. Enable Multiple Portal for Multiple Authentication Methods
    .
    The new portal appears for the 8443 port for the same tenant. This portal inherits the configuration settings from the original port, which is port 443.
  5. Edit the portal configurations to update the authentication settings.
    1. Click the portal hyperlink or select
      Panorama
      Templates
      Network
      GlobalProtect
      Portals
      and click the portal hyperlink.
    2. In the
      Authentication
      section,
      Add
      a
      Client Authentication
      with a different
      Authentication Profile
      .
    You can edit only the
    Client Authentication
    and
    Certificate Profile
    authentication settings.
    If you use certificate-based authentication in both portals, ensure that the gateway doesn't have certificate-based authentication.
    This feature enables the authentication override settings to generate cookie for both portals in the GlobalProtect app settings.
    This feature enables the authentication override settings to generate and accept cookie for both portals in the tunnel settings.
  6. Commit all your changes to Panorama and push the configuration changes to Prisma Access.
    1. Click
      Commit
      Commit and Push
      .
    2. Edit Selections
      and, in the
      Prisma Access
      tab, make sure that
      Mobile Users
      is selected in the
      Push Scope
      , then click
      OK
      .
    3. Click
      Commit and Push
      .
  7. Add the portals manually or using endpoint management software in the GlobalProtect app.
  8. Verify if you can connect to both portals with different authentication profiles for the gateway.
    1. Log in to your Windows machine.
    2. Connect to the portals in your GlobalProtect app.
      When you change the connection between portals of different authentication methods, authenticate the user login.
      If the authentication cookie expires when you connect to the 8443 portal and switch to the manual gateway, GlobalProtect connects to the
      Best Available Gateway
      .
      If your GlobalProtect app uses cached portal configurations, fallback to portal does not work.
    3. View logs for both portals in
      Monitor
      Logs
      GlobalProtect
      to see the portal and authentication information.
If you're using SAML-based authentication for the secondary portal, enter the values as follows while integrating:
  • Single sign on URL
    : Enter
    https://
    Portal-FQDN
    :443/SAML20/SP/ACS
    Portal-FQDN
    is the FQDN for the Prisma Access portal
    Use portal
    443
    even if you have configured the secondary portal (8443).
  • Audience URI (SP Entity ID)
    : Enter
    https://
    Portal-FQDN
    :443/SAML20/SP

Recommended For You