<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Protecting Admin UI with Duo MFA in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524799#M690</link>
    <description>&lt;P&gt;I'm attempting to setup Duo MFA with the admin UI of a PA-3220 running PAN-OS 10.2, but have been unsuccessful. I've found that the guide,&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/configure-multi-factor-authentication/configure-mfa-between-duo-and-the-firewall," target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/configure-multi-factor-authentication/configure-mfa-between-duo-and-the-firewall,&lt;/A&gt;&amp;nbsp;is referencing the Duo Access Gateway which is being sunset; new Duo applications using a DAG can no longer be created. Is there any guidance available that includes setting up MFA with PAN-OS 10.2 with Duo SSO?&lt;/P&gt;</description>
    <pubDate>Wed, 21 Dec 2022 20:14:08 GMT</pubDate>
    <dc:creator>RobBoydCFCU</dc:creator>
    <dc:date>2022-12-21T20:14:08Z</dc:date>
    <item>
      <title>Protecting Admin UI with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524799#M690</link>
      <description>&lt;P&gt;I'm attempting to setup Duo MFA with the admin UI of a PA-3220 running PAN-OS 10.2, but have been unsuccessful. I've found that the guide,&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/configure-multi-factor-authentication/configure-mfa-between-duo-and-the-firewall," target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/configure-multi-factor-authentication/configure-mfa-between-duo-and-the-firewall,&lt;/A&gt;&amp;nbsp;is referencing the Duo Access Gateway which is being sunset; new Duo applications using a DAG can no longer be created. Is there any guidance available that includes setting up MFA with PAN-OS 10.2 with Duo SSO?&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2022 20:14:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524799#M690</guid>
      <dc:creator>RobBoydCFCU</dc:creator>
      <dc:date>2022-12-21T20:14:08Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Admin UI with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524833#M691</link>
      <description>&lt;P&gt;Config should not be any different on firewall side.&lt;/P&gt;
&lt;P&gt;If DUO part is unclear then set up DAG profile style and then clone it to new hosted SAML profile.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 03:30:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524833#M691</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2022-12-22T03:30:43Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Admin UI with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524861#M692</link>
      <description>&lt;P&gt;I have an existing DAG profile style application in Duo that I converted to a SAML profile and attempted to use that without success. The firewall side was setup pretty much as described in the current guide.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'll post a screenshot of a failed logon attempt when I can have someone test this configuration again.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 14:18:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524861#M692</guid>
      <dc:creator>RobBoydCFCU</dc:creator>
      <dc:date>2022-12-22T14:18:33Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Admin UI with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524863#M693</link>
      <description>&lt;P&gt;Did you download xml config file from new SAML profile in DUO, imported it into Palo&amp;nbsp; "SAML Identify Provider" and changed auth to use this new profile?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 14:42:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524863#M693</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2022-12-22T14:42:32Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Admin UI with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524864#M694</link>
      <description>&lt;P&gt;Yes.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 14:43:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524864#M694</guid>
      <dc:creator>RobBoydCFCU</dc:creator>
      <dc:date>2022-12-22T14:43:43Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Admin UI with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524866#M695</link>
      <description>&lt;P&gt;The error that's produced when a user attempts to log in using SSO indicates the AssertionConsumerServiceURL does not match any configured Assertion Consumer Service URLs. The URL in question is using the internal IP address of the firewall. I'm not sure how that IP address made it into the URL; the application configuration does not specify it.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 14:53:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524866#M695</guid>
      <dc:creator>RobBoydCFCU</dc:creator>
      <dc:date>2022-12-22T14:53:21Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Admin UI with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524875#M696</link>
      <description>&lt;P&gt;I've resolved the ACS URL issue (misconfigured from the original DAG application somehow). Now, I just need to accounts not authenticating at the Duo SSO sign-in. Seems to be more of a Duo configuration issue than on the firewall.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for the assistance!&lt;/P&gt;</description>
      <pubDate>Thu, 22 Dec 2022 16:35:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/524875#M696</guid>
      <dc:creator>RobBoydCFCU</dc:creator>
      <dc:date>2022-12-22T16:35:38Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Admin UI with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/1223619#M5676</link>
      <description>&lt;P&gt;What was the solution for the ACS URL issue?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Mar 2025 21:49:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/1223619#M5676</guid>
      <dc:creator>Gustavo_Arevalo</dc:creator>
      <dc:date>2025-03-12T21:49:14Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Admin UI with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/1223784#M5682</link>
      <description>&lt;P&gt;Unfortunately, I don't recall as it was some time ago and I've since migrated us off SAML to RADIUS, using Duo, so we have MFA coverage for gui and cli access.&lt;BR /&gt;&lt;BR /&gt;I would suggest creating a new topic with details of you specific issue if you haven't already.&lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 15:22:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/1223784#M5682</guid>
      <dc:creator>RobBoydCFCU</dc:creator>
      <dc:date>2025-03-13T15:22:04Z</dc:date>
    </item>
    <item>
      <title>Re: Protecting Admin UI with Duo MFA</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/1223786#M5683</link>
      <description>&lt;P&gt;If you use "Generic SAML Service Provider - Single Sign-On" then you can add up to 10 different ACS URLs under same application.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Raido_Rattameister_0-1741880577161.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66631i3C0743CE20B043D7/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Raido_Rattameister_0-1741880577161.png" alt="Raido_Rattameister_0-1741880577161.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Mar 2025 15:43:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/protecting-admin-ui-with-duo-mfa/m-p/1223786#M5683</guid>
      <dc:creator>Raido_Rattameister</dc:creator>
      <dc:date>2025-03-13T15:43:39Z</dc:date>
    </item>
  </channel>
</rss>

