<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Captive portal authentication over TLS in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/576927#M115795</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7542"&gt;@jambulo&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/198699"&gt;@GSA_George&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp; I was faced to the same issue and I found where is the problem :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57579i96BDF1A2101E63D2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="8.png" alt="8.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="5.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57580i361ED7DFDBC4CDD4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="5.png" alt="5.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are using the IP address of the firewall or the FQDN in the Authentication Portal Settings, make sure that the certificate associated to the TLS Service Profile has this IP address of the FQDN in the SAN (Subject Alternative Name).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2.png" style="width: 863px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57581iEF1C33FEFFE5F6A9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="4.png" style="width: 862px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57582i0B77DC57FC09C5A4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="7.png" style="width: 492px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57583i825366E84D2DA25A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="7.png" alt="7.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="3.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57584iB3943D726AE0CF82/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="6.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57585i4D97D55942F6D676/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="6.png" alt="6.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 10 Feb 2024 21:51:40 GMT</pubDate>
    <dc:creator>rmeddane</dc:creator>
    <dc:date>2024-02-10T21:51:40Z</dc:date>
    <item>
      <title>Captive portal authentication over TLS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/464102#M102451</link>
      <description>&lt;P&gt;Hi, I've enabled captive portal on our systems, following the PA docs (&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/user-id/map-ip-addresses-to-users/map-ip-addresses-to-usernames-using-captive-portal/configure-captive-portal.html" target="_blank"&gt;Configure Authentication Portal (paloaltonetworks.com)&lt;/A&gt;). I have an SSL/TLS profile created with a valid, trusted certificate signed by our own internal CA. When our machines try to authenticate to the captive portal, they do so over HTTP not HTTPS. Is there some way to force captive portal auth over HTTPS?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 09:45:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/464102#M102451</guid>
      <dc:creator>GSA_George</dc:creator>
      <dc:date>2022-02-08T09:45:21Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal authentication over TLS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/464232#M102469</link>
      <description>&lt;P&gt;Hmmm, good question.&amp;nbsp; The SSL request needs to come from the users browser, not from the FW.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You may want to also make sure that your redirect IP has an interface mgmt profile that support only HTTPS and not HTTP.&lt;/P&gt;
&lt;P&gt;You may want to confirm that traffic from the user to the redirect IP is ONLY SSL on app-default, vs any on port 443.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Feb 2022 15:37:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/464232#M102469</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2022-02-08T15:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal authentication over TLS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/465209#M102560</link>
      <description>&lt;P&gt;Hi Steve,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The SSL request made to the firewall is via a 302 injected into the session by the FW. If I decrypt the traffic I see the 302 which has a header location value of &lt;A href="http://my_captive_portal_addr:6080" target="_blank"&gt;http://my_captive_portal_addr:6080&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Palo alto documentation suggests that 6080 should only be used for NTLM auth (&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/firewall-administration/reference-port-number-usage/ports-used-for-management-functions.html" target="_blank"&gt;Ports Used for Management Functions (paloaltonetworks.com)&lt;/A&gt;) however we are successfully auth'ing using kerberos.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If&amp;nbsp; I manually browse to&amp;nbsp;&lt;A href="http://my_captive_portal_addr:6080" target="_blank"&gt;https://my_captive_portal_addr:6082&lt;/A&gt;&amp;nbsp;I get a valid TLS connection albeit with a 403, so the firewall is obviously capable of setting up a TLS encrypted session to the captive portal address.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The interface management profile I'm using doesn't have HTTP or HTTPS selected. Only Response Pages and User-ID, which I believe is suggested by the palo alto documentation. I'm having a bit of trouble getting logs for the traffic in question, although I can see it in the fw session browser, I'm not sure it's using the security rule I'm expecting, so I need to narrow that down first.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I was hoping there might be a way to tell the captive portal configuration to only use port 6082 but my googling has returned nothing so far. I can't see that configuring a security rule allowing only SSL on app default will make any difference given the header location specifies http traffic over port 6080.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;George&lt;/P&gt;</description>
      <pubDate>Fri, 11 Feb 2022 13:52:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/465209#M102560</guid>
      <dc:creator>GSA_George</dc:creator>
      <dc:date>2022-02-11T13:52:27Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal authentication over TLS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/530317#M109443</link>
      <description>&lt;P&gt;Anyone have a solution to this problem? I'm seeing the exact same thing.&amp;nbsp; I verified via PCAP that users are getting redirected to the Captive Portal unencrypted over port 6080.&amp;nbsp; I can browse to the Captive Portal over port 6082 and I get a valid TLS connection with the correct server certificate.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Feb 2023 15:38:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/530317#M109443</guid>
      <dc:creator>jambulo</dc:creator>
      <dc:date>2023-02-08T15:38:55Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal authentication over TLS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/576927#M115795</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7542"&gt;@jambulo&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/198699"&gt;@GSA_George&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp; I was faced to the same issue and I found where is the problem :&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="8.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57579i96BDF1A2101E63D2/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="8.png" alt="8.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="5.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57580i361ED7DFDBC4CDD4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="5.png" alt="5.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you are using the IP address of the firewall or the FQDN in the Authentication Portal Settings, make sure that the certificate associated to the TLS Service Profile has this IP address of the FQDN in the SAN (Subject Alternative Name).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2.png" style="width: 863px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57581iEF1C33FEFFE5F6A9/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2.png" alt="2.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="4.png" style="width: 862px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57582i0B77DC57FC09C5A4/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="4.png" alt="4.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="7.png" style="width: 492px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57583i825366E84D2DA25A/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="7.png" alt="7.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="3.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57584iB3943D726AE0CF82/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="3.png" alt="3.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="6.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57585i4D97D55942F6D676/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="6.png" alt="6.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 10 Feb 2024 21:51:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/576927#M115795</guid>
      <dc:creator>rmeddane</dc:creator>
      <dc:date>2024-02-10T21:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal authentication over TLS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/577201#M115842</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1256391699"&gt;@rmeddane&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for this info.. I totally make sense that if the cert is signed as FDQN, then we use the FQDN name, but if the cert is signed by IP, then we use the IP in the Captive Portal settings... same/similar to a local/test GP configuration.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;It is good info for other community users and your contribution is appreciated.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Feb 2024 23:05:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/577201#M115842</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2024-02-13T23:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal authentication over TLS</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/577603#M115900</link>
      <description>&lt;P&gt;Thanks&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/113304"&gt;@S.Cantwell&lt;/a&gt;&amp;nbsp; for the additional infos.&lt;/P&gt;</description>
      <pubDate>Sun, 18 Feb 2024 12:59:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/captive-portal-authentication-over-tls/m-p/577603#M115900</guid>
      <dc:creator>rmeddane</dc:creator>
      <dc:date>2024-02-18T12:59:04Z</dc:date>
    </item>
  </channel>
</rss>

