<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AZURE Entra MFA for admin access via CLI in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-entra-mfa-for-admin-access-via-cli/m-p/1247741#M6673</link>
    <description>&lt;P&gt;I am aware of NPS and these methods which I am trying to get away from them. The new CIE is a hack at best too. I really don't understand why Palo Alto releases so many half baked solutions&lt;/P&gt;</description>
    <pubDate>Mon, 09 Feb 2026 15:23:07 GMT</pubDate>
    <dc:creator>Carleton</dc:creator>
    <dc:date>2026-02-09T15:23:07Z</dc:date>
    <item>
      <title>AZURE Entra MFA for admin access via CLI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-entra-mfa-for-admin-access-via-cli/m-p/1229795#M5924</link>
      <description>&lt;P&gt;We are easily able to setup MFA for the Web UI for the management port vial SAML and Entra SAML auth. We have run into some challenges I was surprised exist. First here are the requirements and goals&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;PA VM series firewalls in&amp;nbsp; AZURE.&lt;/LI&gt;
&lt;LI&gt;No On prem AD, ISE or Kerberos dependencies. Our goal it to be 10)% clouds based.&lt;/LI&gt;
&lt;LI&gt;MFA to manage the PA for both web UI and CLI.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;Problem&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;We have not been able to find a way to leverage SAML or other MS Entra solutions to lock down the Managment port access for both WEBV and CLI, SAML Auth only works with the web UI. Every other solution we have found involves buying a one off solution Just for the PA - unacceptable.&lt;/LI&gt;
&lt;LI&gt;Second the built-in admin account can't be disabled or MFA forced to use the account. I cant believe the main supersuser account cant be locked down or disabled.&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Thu, 22 May 2025 15:16:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-entra-mfa-for-admin-access-via-cli/m-p/1229795#M5924</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2025-05-22T15:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: AZURE Entra MFA for admin access via CLI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-entra-mfa-for-admin-access-via-cli/m-p/1229843#M5925</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/224178"&gt;@Carleton&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't know why PANW does not allow SAML for CLI access.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/compatibility-matrix/reference/mfa-vendor-support" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/compatibility-matrix/reference/mfa-vendor-support&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You could do MFA with a local NPS server pointed to Entra.&amp;nbsp; That is not 3rd party but it does require a local server.&amp;nbsp; &lt;A href="https://learn.microsoft.com/en-us/entra/architecture/auth-radius" target="_blank" rel="noopener"&gt;https://learn.microsoft.com/en-us/entra/architecture/auth-radius&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have not tested it, but this person has found a way to not allow the local account to work if RADIUS is up.&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/t5/general-topics/local-authentication-should-not-work-if-when-radius-is-available/td-p/511849" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-topics/local-authentication-should-not-work-if-when-radius-is-available/td-p/511849&lt;/A&gt;&amp;nbsp; EDIT2:&amp;nbsp; &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt; may have a simpler way -&amp;gt; &lt;A href="https://live.paloaltonetworks.com/t5/next-generation-firewall/to-force-ngfw-login-using-saml-sso/td-p/1229870" target="_blank"&gt;https://live.paloaltonetworks.com/t5/next-generation-firewall/to-force-ngfw-login-using-saml-sso/td-p/1229870&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;However, you cannot use SAML in an authentication sequence.&amp;nbsp; Again, RADIUS to NPS would solve that problem.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I think you have valid points.&amp;nbsp; The solution would be to ask your PANW SE to create feature requests.&amp;nbsp; I don't think the business units look at this forum for ideas.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;EDIT:&amp;nbsp; The RADIUS users may have to log onto the GUI 1st before the CLI will work.&amp;nbsp; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm3qCAC" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Cm3qCAC&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 May 2025 13:32:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-entra-mfa-for-admin-access-via-cli/m-p/1229843#M5925</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-05-27T13:32:56Z</dc:date>
    </item>
    <item>
      <title>Re: AZURE Entra MFA for admin access via CLI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-entra-mfa-for-admin-access-via-cli/m-p/1230692#M5949</link>
      <description>&lt;P&gt;I think&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;provided you with some good pointers regarding the SAML auth, but i'm wondering about your second question&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;are you logged in as the 'admin' account when you try to change it?&lt;/P&gt;
&lt;P&gt;unless you set the admin account up in a bootstrap and are rebooting the vm all the time and calling the bootstrap to rebuild the admin account, the default "admin" account is not locked. You can delete it, rename it, change it any way you like if you first create and log in as a different superuser&lt;/P&gt;</description>
      <pubDate>Mon, 02 Jun 2025 13:08:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-entra-mfa-for-admin-access-via-cli/m-p/1230692#M5949</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2025-06-02T13:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: AZURE Entra MFA for admin access via CLI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-entra-mfa-for-admin-access-via-cli/m-p/1247741#M6673</link>
      <description>&lt;P&gt;I am aware of NPS and these methods which I am trying to get away from them. The new CIE is a hack at best too. I really don't understand why Palo Alto releases so many half baked solutions&lt;/P&gt;</description>
      <pubDate>Mon, 09 Feb 2026 15:23:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-entra-mfa-for-admin-access-via-cli/m-p/1247741#M6673</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2026-02-09T15:23:07Z</dc:date>
    </item>
  </channel>
</rss>

