<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SAML for external admin, local admin for internal admin in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/saml-for-external-admin-local-admin-for-internal-admin/m-p/588804#M2374</link>
    <description>&lt;P&gt;Hi, been racking my brain trying to figure this one out.&lt;/P&gt;
&lt;P&gt;Essentially, to comply with regional guidelines for our client, we are enforcing MFA for all administrative accounts on the Palo Altos, which are internet facing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have implemented SAML authenticating with Azure AD with Microsoft Authenticator for 2FA, which is all fine and well, and I am ready to delete the local admin accounts but surely that's really risky, in case the firewall has an issue with reaching the idp or something else happens, then it's a total lockout.&lt;/P&gt;
&lt;P&gt;Is there a way of allowing ONLY SAML login from external whitelisted IP addresses (I assume managed with Interface Mgmt under Network), but allow a local admin account access to Panorama from, say, a specific internal interface such as Management?&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
    <pubDate>Wed, 05 Jun 2024 07:49:31 GMT</pubDate>
    <dc:creator>NineMasts</dc:creator>
    <dc:date>2024-06-05T07:49:31Z</dc:date>
    <item>
      <title>SAML for external admin, local admin for internal admin</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/saml-for-external-admin-local-admin-for-internal-admin/m-p/588804#M2374</link>
      <description>&lt;P&gt;Hi, been racking my brain trying to figure this one out.&lt;/P&gt;
&lt;P&gt;Essentially, to comply with regional guidelines for our client, we are enforcing MFA for all administrative accounts on the Palo Altos, which are internet facing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have implemented SAML authenticating with Azure AD with Microsoft Authenticator for 2FA, which is all fine and well, and I am ready to delete the local admin accounts but surely that's really risky, in case the firewall has an issue with reaching the idp or something else happens, then it's a total lockout.&lt;/P&gt;
&lt;P&gt;Is there a way of allowing ONLY SAML login from external whitelisted IP addresses (I assume managed with Interface Mgmt under Network), but allow a local admin account access to Panorama from, say, a specific internal interface such as Management?&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Wed, 05 Jun 2024 07:49:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/saml-for-external-admin-local-admin-for-internal-admin/m-p/588804#M2374</guid>
      <dc:creator>NineMasts</dc:creator>
      <dc:date>2024-06-05T07:49:31Z</dc:date>
    </item>
    <item>
      <title>Re: SAML for external admin, local admin for internal admin</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/saml-for-external-admin-local-admin-for-internal-admin/m-p/592713#M2406</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1098940119"&gt;@NineMasts&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hi, been racking my brain trying to figure this one out.&lt;/P&gt;
&lt;P&gt;Essentially, to comply with regional guidelines for our client, we are enforcing MFA for all administrative accounts on the Palo Altos, which are internet facing.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have implemented SAML authenticating with Azure AD with Microsoft Authenticator for 2FA, which is all fine and well, and I am ready to delete the local admin accounts but surely that's really risky, in case the firewall has an issue with reaching the idp or something else happens, then it's a total lockout.&amp;nbsp;&lt;A href="https://www.spotify-pie.com" target="_blank" rel="noopener"&gt;&lt;FONT size="1 2 3 4 5 6 7" color="#FFFFFF"&gt;Spotify Pie&lt;/FONT&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Is there a way of allowing ONLY SAML login from external whitelisted IP addresses (I assume managed with Interface Mgmt under Network), but allow a local admin account access to Panorama from, say, a specific internal interface such as Management?&lt;/P&gt;
&lt;P&gt;Thanks in advance!&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hello,&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;To achieve your desired setup, you can follow these steps:&lt;/P&gt;
&lt;P&gt;SAML Authentication for External Access:&lt;BR /&gt;Configure SAML authentication for external users (administrators) accessing the Palo Alto Networks firewall.&lt;BR /&gt;Ensure that your SAML setup with Azure AD and Microsoft Authenticator is working as expected.&lt;BR /&gt;Whitelisted IP Addresses for SAML:&lt;BR /&gt;Apply the Interface Management profile to the external-facing interface (e.g., ethernet1/3):&lt;BR /&gt;Go to Network &amp;gt; Interfaces &amp;gt; Ethernet.&lt;BR /&gt;Click on the interface name (e.g., ethernet1/3).&lt;BR /&gt;Under the Advanced tab, select the Management Profile as Remote_management.&lt;BR /&gt;Click OK and commit the changes.&lt;BR /&gt;Local Admin Access via Specific Internal Interface (e.g., Management):&lt;BR /&gt;For local admin access (e.g., Panorama), allow it only from a specific internal interface (e.g., Management):&lt;BR /&gt;Use security policies to restrict access based on source IP addresses.&lt;BR /&gt;Create a policy that allows traffic from the internal interface (Management) to the desired services (e.g., Panorama).&lt;BR /&gt;Ensure that this policy is placed before any other more permissive policies.&lt;BR /&gt;By following these steps, you’ll allow SAML login from external whitelisted IPs while still allowing local admin access via the specified internal interface. Remember to thoroughly test your setup before enforcing it in production.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Hope this will help you.&lt;BR /&gt;Best regards,&lt;BR /&gt;florence023 &lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jul 2024 04:59:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/saml-for-external-admin-local-admin-for-internal-admin/m-p/592713#M2406</guid>
      <dc:creator>florence023</dc:creator>
      <dc:date>2024-07-24T04:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: SAML for external admin, local admin for internal admin</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/saml-for-external-admin-local-admin-for-internal-admin/m-p/592726#M2407</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1034609747"&gt;@florence023&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;IMHO applying an interface management profile to the untrusted interface is a _&lt;STRONG&gt;&lt;EM&gt;really&lt;/EM&gt;&lt;/STRONG&gt;_ bad idea&lt;/P&gt;
&lt;P&gt;This also does not resolve the question, any admin profile/mgt interface will allow both SAML and local accounts, so if you want you can have both at the same time&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1098940119"&gt;@NineMasts&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What I would recommend is to have a breakglass admin account: all admins get a SAML account and one local admin account is created with a 'secret' password so no one uses it unless there is an emergency that breaks SAML (in which case the password is retrieved from the vault and admins can log in with the breakglass account)&lt;/P&gt;
&lt;P&gt;in addition you can set up a log forwarding profile with a filter for that username so if someone does log in with that breakglass account while there's no emergency, you are notified&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jul 2024 08:06:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/saml-for-external-admin-local-admin-for-internal-admin/m-p/592726#M2407</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-07-23T08:06:58Z</dc:date>
    </item>
  </channel>
</rss>

