<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Expedition Read Only Panorama API User? in Expedition Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-discussions/expedition-read-only-panorama-api-user/m-p/287315#M1964</link>
    <description>&lt;P&gt;The best would be to have the limitations based on the API keys, so that Panorama won't allow changes to be pushed using that API key.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That said, Expedition has some internal controls to set limitations on user roles.&lt;/P&gt;
&lt;P&gt;How can you use them?&lt;BR /&gt;Create a user for those auditors with the "viewer" role assigned within the project.&lt;/P&gt;
&lt;P&gt;When retreiving the API keys from panorama, specify that the keys are only for "admin". Notice that then, the "viewer" users won't have an API key assigned.&lt;/P&gt;
&lt;P&gt;So, your auditors will be able to see the config in Expedition, but won't have credentials to make a push.&lt;/P&gt;
&lt;P&gt;Notice that you would require an "admin" user to pull the config.&lt;/P&gt;</description>
    <pubDate>Mon, 09 Sep 2019 10:08:41 GMT</pubDate>
    <dc:creator>dgildelaig</dc:creator>
    <dc:date>2019-09-09T10:08:41Z</dc:date>
    <item>
      <title>Expedition Read Only Panorama API User?</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/expedition-read-only-panorama-api-user/m-p/285297#M1915</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to have our InfoSec team use Expedition to audit/report/track changes on our firewalls. &lt;STRONG&gt;What's the best way to set them up so they can use Expedition, but not have any rights to modify or push changes to Panorama or the firewalls? &lt;/STRONG&gt;Expedition v. 1.1.35.&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I've setup a Panorama user with XML API rights, but have found the user requires at least the "Operational Requests" and "&lt;STRONG&gt;Configuration&lt;/STRONG&gt;" roles in order to download the firewall config files for analysis. Per this page, the "Configuration" role can also &lt;STRONG&gt;modify&lt;/STRONG&gt; Panorama and the firewall configs, which we don't want to allow. &lt;A href="https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-web-interface-help/panorama-web-interface/panorama-admin-roles#" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-web-interface-help/panorama-web-interface/panorama-admin-roles#&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Maybe there's a way within Expedition to limit this type of access? Or a different set of RBAC roles? Ideally, I'd be able to give InfoSec a Panorama read-only API key and they'd be admins/super-users in Expedition, as they will be the ones primarily using the tool.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks in advance for any suggestions.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Aug 2019 15:25:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/expedition-read-only-panorama-api-user/m-p/285297#M1915</guid>
      <dc:creator>TylerDoyle</dc:creator>
      <dc:date>2019-08-27T15:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: Expedition Read Only Panorama API User?</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/expedition-read-only-panorama-api-user/m-p/287315#M1964</link>
      <description>&lt;P&gt;The best would be to have the limitations based on the API keys, so that Panorama won't allow changes to be pushed using that API key.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That said, Expedition has some internal controls to set limitations on user roles.&lt;/P&gt;
&lt;P&gt;How can you use them?&lt;BR /&gt;Create a user for those auditors with the "viewer" role assigned within the project.&lt;/P&gt;
&lt;P&gt;When retreiving the API keys from panorama, specify that the keys are only for "admin". Notice that then, the "viewer" users won't have an API key assigned.&lt;/P&gt;
&lt;P&gt;So, your auditors will be able to see the config in Expedition, but won't have credentials to make a push.&lt;/P&gt;
&lt;P&gt;Notice that you would require an "admin" user to pull the config.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Sep 2019 10:08:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/expedition-read-only-panorama-api-user/m-p/287315#M1964</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2019-09-09T10:08:41Z</dc:date>
    </item>
    <item>
      <title>Re: Expedition Read Only Panorama API User?</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-discussions/expedition-read-only-panorama-api-user/m-p/287770#M1996</link>
      <description>&lt;P&gt;Thanks for your reply and thoughts.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will see if there's a secure way to automate the admin-task of pulling the most recent XML configs from the firewalls into Expedition. That ability + using the RBAC setup inside Expedition sounds like it might accomplish what we're aiming for.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Sep 2019 21:14:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-discussions/expedition-read-only-panorama-api-user/m-p/287770#M1996</guid>
      <dc:creator>TylerDoyle</dc:creator>
      <dc:date>2019-09-10T21:14:06Z</dc:date>
    </item>
  </channel>
</rss>

