<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using Captive portal and Azure AD for user network authentication in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/using-captive-portal-and-azure-ad-for-user-network/m-p/518736#M498</link>
    <description>&lt;P&gt;Is there any documentation available on how to achieve this for general user network access? I assume the network has to be set up with a captive portal, but traffic to identity provider for SAML exchange need to be allowed even before the user gets general network access. Is this possible through IP/DNS whitelists?&lt;/P&gt;</description>
    <pubDate>Fri, 21 Oct 2022 15:04:05 GMT</pubDate>
    <dc:creator>JHOOPA</dc:creator>
    <dc:date>2022-10-21T15:04:05Z</dc:date>
    <item>
      <title>Using Captive portal and Azure AD for user network authentication</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/using-captive-portal-and-azure-ad-for-user-network/m-p/518736#M498</link>
      <description>&lt;P&gt;Is there any documentation available on how to achieve this for general user network access? I assume the network has to be set up with a captive portal, but traffic to identity provider for SAML exchange need to be allowed even before the user gets general network access. Is this possible through IP/DNS whitelists?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Oct 2022 15:04:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/using-captive-portal-and-azure-ad-for-user-network/m-p/518736#M498</guid>
      <dc:creator>JHOOPA</dc:creator>
      <dc:date>2022-10-21T15:04:05Z</dc:date>
    </item>
    <item>
      <title>Re: Using Captive portal and Azure AD for user network authentication</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/using-captive-portal-and-azure-ad-for-user-network/m-p/518739#M500</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/250609"&gt;@JHOOPA&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You are correct, I can't find any documentation either.&amp;nbsp; I have configured the authentication portal for network access, and not just for IP-User-Mapping.&amp;nbsp; You would follow this doc -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/user-id/map-ip-addresses-to-users/map-ip-addresses-to-usernames-using-captive-portal/configure-captive-portal" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/user-id/map-ip-addresses-to-users/map-ip-addresses-to-usernames-using-captive-portal/configure-captive-portal&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For my case, it was a web app and the redirection occurred within HTTPS.&amp;nbsp; The server for which I was requiring additional authentication was specified in the destination of the authentication policy.&amp;nbsp; Once I logged into the portal, the web page behind the firewall came up.&amp;nbsp; The 1st note in the above URL is extremely important.&amp;nbsp; If you want to redirect HTTPS, you will need to enable SSL Decryption.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to use the authentication portal for "general user network access" as you say, you would have to have the user manually login to the portal or use "the native captive portal assistant built in to the endpoint operating system (OS)."&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/globalprotect-quick-configs/captive-portal-and-enforce-globalprotect-for-network-access" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/globalprotect/9-1/globalprotect-admin/globalprotect-quick-configs/captive-portal-and-enforce-globalprotect-for-network-access&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The authentication portal is a good option, but requires a lot of steps to configure.&amp;nbsp; For general user network access, you may also want to consider alternative methods such as User-ID in the security policy, which also requires authentication.&amp;nbsp; If no method of User-ID is available, GlobalProtect with an internal gateway with no tunnel is an option.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit:&amp;nbsp; Here is an additional link -&amp;gt; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HCEzCAO" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HCEzCAO&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Oct 2022 17:57:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/using-captive-portal-and-azure-ad-for-user-network/m-p/518739#M500</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-10-21T17:57:47Z</dc:date>
    </item>
  </channel>
</rss>

