<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Kerberos SSO Admin with 2 devices in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/kerberos-sso-admin-with-2-devices/m-p/1244129#M6539</link>
    <description>&lt;P&gt;Thank you for the instructions. But how can I configure that the fqdn always points to the active fw?&lt;/P&gt;</description>
    <pubDate>Thu, 18 Dec 2025 07:06:13 GMT</pubDate>
    <dc:creator>IT-Esp</dc:creator>
    <dc:date>2025-12-18T07:06:13Z</dc:date>
    <item>
      <title>Kerberos SSO Admin with 2 devices</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/kerberos-sso-admin-with-2-devices/m-p/1243991#M6525</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;I have 2 devices running in active-passive HA.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to use kerberos SSO for the admin ui.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;with one device it is working, but how can i add a second spn?&lt;/P&gt;</description>
      <pubDate>Tue, 16 Dec 2025 13:56:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/kerberos-sso-admin-with-2-devices/m-p/1243991#M6525</guid>
      <dc:creator>IT-Esp</dc:creator>
      <dc:date>2025-12-16T13:56:41Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos SSO Admin with 2 devices</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/kerberos-sso-admin-with-2-devices/m-p/1244081#M6536</link>
      <description>&lt;P data-start="163" data-end="413"&gt;For Kerberos SSO access to the PAN-OS admin UI in an Active/Passive HA pair, you do &lt;STRONG data-start="247" data-end="254"&gt;not&lt;/STRONG&gt; configure a second SPN on the firewall. The correct and supported design is to use &lt;STRONG data-start="338" data-end="389"&gt;one shared management FQDN and one Kerberos SPN&lt;/STRONG&gt;, used by both HA peers.&lt;/P&gt;
&lt;H3 data-start="415" data-end="454"&gt;How Kerberos works in this scenario&lt;/H3&gt;
&lt;P data-start="455" data-end="606"&gt;Kerberos authentication is based on the &lt;STRONG data-start="495" data-end="522"&gt;service hostname (FQDN)&lt;/STRONG&gt;, not on the individual firewall device. The browser requests a Kerberos ticket for:&lt;/P&gt;
&lt;P data-start="608" data-end="630"&gt;HTTP/&amp;lt;management-FQDN&amp;gt;&lt;/P&gt;
&lt;P data-start="632" data-end="778"&gt;As long as both firewalls present the same FQDN and use the same service account, Kerberos authentication will work on either unit after failover.&lt;/P&gt;
&lt;H3 data-start="780" data-end="807"&gt;Supported configuration&lt;/H3&gt;
&lt;OL data-start="809" data-end="1784"&gt;
&lt;LI data-start="809" data-end="967"&gt;
&lt;P data-start="812" data-end="883"&gt;&lt;STRONG data-start="812" data-end="847"&gt;Choose a single management FQDN&lt;/STRONG&gt;&lt;BR /&gt;Example:&lt;BR /&gt;fw-admin.company.com&lt;/P&gt;
&lt;P data-start="888" data-end="967"&gt;This FQDN must always resolve to the currently active firewall’s management IP.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="969" data-end="1100"&gt;
&lt;P data-start="972" data-end="1051"&gt;&lt;STRONG data-start="972" data-end="1016"&gt;Use one Active Directory service account&lt;/STRONG&gt;&lt;BR /&gt;Example:&lt;BR /&gt;svc_pan_fw_kerberos&lt;/P&gt;
&lt;P data-start="1056" data-end="1100"&gt;This account will be used by both firewalls.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1102" data-end="1354"&gt;
&lt;P data-start="1105" data-end="1241"&gt;&lt;STRONG data-start="1105" data-end="1154"&gt;Create the SPN (run once in Active Directory)&lt;/STRONG&gt;&lt;BR /&gt;Run the following command from a domain controller or a system with RSAT installed:&lt;/P&gt;
&lt;P data-start="1246" data-end="1301"&gt;setspn -A HTTP/fw-admin.company.com svc_pan_fw_kerberos&lt;/P&gt;
&lt;P data-start="1306" data-end="1354"&gt;Verify the SPN:&lt;BR /&gt;setspn -L svc_pan_fw_kerberos&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1356" data-end="1630"&gt;
&lt;P data-start="1359" data-end="1420"&gt;&lt;STRONG data-start="1359" data-end="1399"&gt;Configure both firewalls identically&lt;/STRONG&gt;&lt;BR /&gt;On both HA peers:&lt;/P&gt;
&lt;UL data-start="1424" data-end="1630"&gt;
&lt;LI data-start="1424" data-end="1470"&gt;
&lt;P data-start="1426" data-end="1470"&gt;Use the same Kerberos authentication profile&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1474" data-end="1506"&gt;
&lt;P data-start="1476" data-end="1506"&gt;Use the same AD server profile&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1510" data-end="1562"&gt;
&lt;P data-start="1512" data-end="1562"&gt;Use the same service account (svc_pan_fw_kerberos)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1566" data-end="1630"&gt;
&lt;P data-start="1568" data-end="1630"&gt;Access the admin UI using the same FQDN (fw-admin.company.com)&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="1632" data-end="1784"&gt;
&lt;P data-start="1635" data-end="1784"&gt;&lt;STRONG data-start="1635" data-end="1652"&gt;Access method&lt;/STRONG&gt;&lt;BR /&gt;Administrators must always access the firewall using the shared FQDN, not the individual management IP or hostname of each unit.&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H3 data-start="1786" data-end="1805"&gt;Important notes&lt;/H3&gt;
&lt;UL data-start="1806" data-end="1995"&gt;
&lt;LI data-start="1806" data-end="1849"&gt;
&lt;P data-start="1808" data-end="1849"&gt;Do NOT create separate SPNs per firewall.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1850" data-end="1889"&gt;
&lt;P data-start="1852" data-end="1889"&gt;Do NOT bind the SPN to an IP address.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1890" data-end="1940"&gt;
&lt;P data-start="1892" data-end="1940"&gt;Do NOT use different hostnames for each HA peer.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1941" data-end="1995"&gt;
&lt;P data-start="1943" data-end="1995"&gt;The SPN must be associated with only one AD account.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;H3 data-start="1997" data-end="2007"&gt;Result&lt;/H3&gt;
&lt;P data-start="2008" data-end="2032"&gt;With this configuration:&lt;/P&gt;
&lt;UL data-start="2033" data-end="2185"&gt;
&lt;LI data-start="2033" data-end="2076"&gt;
&lt;P data-start="2035" data-end="2076"&gt;Kerberos SSO works on the active firewall&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2077" data-end="2144"&gt;
&lt;P data-start="2079" data-end="2144"&gt;After HA failover, Kerberos continues to work without any changes&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="2145" data-end="2185"&gt;
&lt;P data-start="2147" data-end="2185"&gt;No second SPN is required or supported&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="2187" data-end="2417"&gt;If Kerberos works on one device today, this means the SPN and service account are already correct. The remaining requirement is to ensure both firewalls use the same configuration and are accessed through the same management FQDN.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Dec 2025 20:37:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/kerberos-sso-admin-with-2-devices/m-p/1244081#M6536</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2025-12-17T20:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos SSO Admin with 2 devices</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/kerberos-sso-admin-with-2-devices/m-p/1244129#M6539</link>
      <description>&lt;P&gt;Thank you for the instructions. But how can I configure that the fqdn always points to the active fw?&lt;/P&gt;</description>
      <pubDate>Thu, 18 Dec 2025 07:06:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/kerberos-sso-admin-with-2-devices/m-p/1244129#M6539</guid>
      <dc:creator>IT-Esp</dc:creator>
      <dc:date>2025-12-18T07:06:13Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos SSO Admin with 2 devices</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/kerberos-sso-admin-with-2-devices/m-p/1244156#M6542</link>
      <description>&lt;DIV class="flex max-w-full flex-col grow"&gt;
&lt;DIV class="min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;amp;]:mt-1" dir="auto" data-message-author-role="assistant" data-message-id="25c8e40c-99b8-437d-a04f-0f039eaf8a20" data-message-model-slug="gpt-5-2"&gt;
&lt;DIV class="flex w-full flex-col gap-1 empty:hidden first:pt-[1px]"&gt;
&lt;DIV class="markdown prose dark:prose-invert w-full break-words dark markdown-new-styling"&gt;
&lt;P data-start="20" data-end="137"&gt;PAN-OS does &lt;STRONG data-start="32" data-end="39"&gt;not&lt;/STRONG&gt; have a built-in way to make a management FQDN automatically move between Active/Passive HA peers.&lt;/P&gt;
&lt;P data-start="139" data-end="322"&gt;To ensure Kerberos SSO continues working, the shared management FQDN must always resolve to the &lt;STRONG data-start="235" data-end="270"&gt;active firewall’s management IP&lt;/STRONG&gt;, and this must be handled &lt;STRONG data-start="297" data-end="321"&gt;outside the firewall&lt;/STRONG&gt;.&lt;/P&gt;
&lt;H4 data-start="324" data-end="354"&gt;Supported ways to do this&lt;/H4&gt;
&lt;OL data-start="356" data-end="992"&gt;
&lt;LI data-start="356" data-end="619"&gt;
&lt;P data-start="359" data-end="395"&gt;&lt;STRONG data-start="359" data-end="395"&gt;DNS-based solution (most common)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="399" data-end="619"&gt;
&lt;LI data-start="399" data-end="446"&gt;
&lt;P data-start="401" data-end="446"&gt;Create one FQDN (e.g. &lt;CODE data-start="423" data-end="445"&gt;fw-admin.company.com&lt;/CODE&gt;)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="450" data-end="499"&gt;
&lt;P data-start="452" data-end="499"&gt;Point it to the active firewall’s management IP&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="503" data-end="542"&gt;
&lt;P data-start="505" data-end="542"&gt;Use a &lt;STRONG data-start="511" data-end="526"&gt;low DNS TTL&lt;/STRONG&gt; (30–60 seconds)&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="546" data-end="619"&gt;
&lt;P data-start="548" data-end="619"&gt;Update DNS manually or with an external script that detects HA failover&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="621" data-end="842"&gt;
&lt;P data-start="624" data-end="657"&gt;&lt;STRONG data-start="624" data-end="657"&gt;Reverse proxy / load balancer&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="661" data-end="842"&gt;
&lt;LI data-start="661" data-end="715"&gt;
&lt;P data-start="663" data-end="715"&gt;Place a proxy in front of both management interfaces&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="719" data-end="799"&gt;
&lt;P data-start="721" data-end="799"&gt;The proxy has the stable FQDN and forwards traffic only to the active firewall&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="803" data-end="842"&gt;
&lt;P data-start="805" data-end="842"&gt;No DNS changes needed during failover&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;LI data-start="844" data-end="992"&gt;
&lt;P data-start="847" data-end="881"&gt;&lt;STRONG data-start="847" data-end="881"&gt;Cloud floating IP (cloud-only)&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL data-start="885" data-end="992"&gt;
&lt;LI data-start="885" data-end="946"&gt;
&lt;P data-start="887" data-end="946"&gt;Some cloud platforms can move a virtual IP between HA peers&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="950" data-end="992"&gt;
&lt;P data-start="952" data-end="992"&gt;This is handled by the cloud, not PAN-OS&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;H4 data-start="994" data-end="1015"&gt;Important points&lt;/H4&gt;
&lt;UL data-start="1017" data-end="1287"&gt;
&lt;LI data-start="1017" data-end="1101"&gt;
&lt;P data-start="1019" data-end="1101"&gt;PAN-OS &lt;STRONG data-start="1026" data-end="1046"&gt;does not support&lt;/STRONG&gt; a floating/virtual management IP on physical firewalls&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1102" data-end="1141"&gt;
&lt;P data-start="1104" data-end="1141"&gt;You &lt;STRONG data-start="1108" data-end="1120"&gt;must not&lt;/STRONG&gt; create multiple SPNs&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1142" data-end="1212"&gt;
&lt;P data-start="1144" data-end="1212"&gt;Administrators must always access the firewall using the shared FQDN&lt;/P&gt;
&lt;/LI&gt;
&lt;LI data-start="1213" data-end="1287"&gt;
&lt;P data-start="1215" data-end="1287"&gt;The solution relies on DNS or infrastructure, not firewall configuration&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P data-start="1289" data-end="1421" data-is-last-node="" data-is-only-node=""&gt;&lt;STRONG data-start="1289" data-end="1305"&gt;Bottom line:&lt;/STRONG&gt;&lt;BR data-start="1305" data-end="1308" /&gt;Use a single management FQDN and a single SPN, and control where that FQDN points using DNS or an external proxy.&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="z-0 flex min-h-[46px] justify-start"&gt;&amp;nbsp;&lt;/DIV&gt;</description>
      <pubDate>Thu, 18 Dec 2025 15:41:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/kerberos-sso-admin-with-2-devices/m-p/1244156#M6542</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2025-12-18T15:41:04Z</dc:date>
    </item>
  </channel>
</rss>

