<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Web Authentication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/web-authentication/m-p/190781#M57582</link>
    <description>&lt;P&gt;You can do this on the Palo Alto too, it might work a little different than your Juniper setup however&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;create an authentication profile, enable captive portal, set a captive portal policy to intercept connections going to your server, set security policy to only allow access to identified users&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here's &lt;A title="Configure Captive Portal" href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/map-ip-addresses-to-users/map-ip-addresses-to-usernames-using-captive-portal/configure-captive-portal" target="_blank"&gt;how to setup captive portal&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;a little more info on &lt;A title="How to Configure Captive Portal " href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-Captive-Portal/ta-p/60455" target="_blank"&gt;the different modes&lt;/A&gt; (you'll need web-form)&lt;/P&gt;
&lt;P&gt;and the "&lt;A title="Getting Started: User-ID " href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-User-ID/ta-p/69321" target="_self"&gt;getting started: User-ID&lt;/A&gt;" guide if you'd like to know more about how it all works&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 08 Dec 2017 08:48:50 GMT</pubDate>
    <dc:creator>reaper</dc:creator>
    <dc:date>2017-12-08T08:48:50Z</dc:date>
    <item>
      <title>Web Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-authentication/m-p/190688#M57566</link>
      <description>&lt;P&gt;On our juniper firewalls we are using web authentication to restrict access to certain hosts and I would like to know if this is possible and how to on PA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The user hits a captive portal(webauth in juniper) that is boudn to an interface:&lt;/P&gt;&lt;P&gt;set interfaces reth0 unit xxxx family inet address x.x.x.x/24 web-authentication https&lt;BR /&gt;&lt;BR /&gt;This presents a simple login page that requries two factor authentication wich then puts an entry into a local database. A policy then allows the traffic based on this.&lt;/P&gt;&lt;P&gt;set security policies from-zone aaaa to-zone bbbb policy test match source-address subnetx&lt;BR /&gt;set security policies from-zone aaaa to-zone bbbb policy test match destination-address web-auth-hosts&lt;BR /&gt;set security policies from-zone aaaa to-zone bbbb policy test match application junos-https&lt;BR /&gt;set security policies from-zone aaaa to-zone bbbb policy test then permit firewall-authentication web-authentication&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Authentication Profile&lt;/P&gt;&lt;P&gt;set access profile TEST-ACCESS authentication-order radius&lt;BR /&gt;set access profile TEST-ACCESS session-options client-idle-timeout 10&lt;BR /&gt;set access profile TEST-ACCESS session-options client-session-timeout 120&lt;BR /&gt;set access profile TEST-ACCESS radius-server x.x.x.x port 1812&lt;BR /&gt;set access firewall-authentication web-authentication default-profile TEST-ACCESS&lt;BR /&gt;set access firewall-authentication web-authentication banner success "TEST Access Login Successful"&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2017 20:30:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-authentication/m-p/190688#M57566</guid>
      <dc:creator>r24481</dc:creator>
      <dc:date>2017-12-07T20:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: Web Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/web-authentication/m-p/190781#M57582</link>
      <description>&lt;P&gt;You can do this on the Palo Alto too, it might work a little different than your Juniper setup however&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;create an authentication profile, enable captive portal, set a captive portal policy to intercept connections going to your server, set security policy to only allow access to identified users&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here's &lt;A title="Configure Captive Portal" href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/map-ip-addresses-to-users/map-ip-addresses-to-usernames-using-captive-portal/configure-captive-portal" target="_blank"&gt;how to setup captive portal&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;a little more info on &lt;A title="How to Configure Captive Portal " href="https://live.paloaltonetworks.com/t5/Configuration-Articles/How-to-Configure-Captive-Portal/ta-p/60455" target="_blank"&gt;the different modes&lt;/A&gt; (you'll need web-form)&lt;/P&gt;
&lt;P&gt;and the "&lt;A title="Getting Started: User-ID " href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-User-ID/ta-p/69321" target="_self"&gt;getting started: User-ID&lt;/A&gt;" guide if you'd like to know more about how it all works&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 08 Dec 2017 08:48:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/web-authentication/m-p/190781#M57582</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-12-08T08:48:50Z</dc:date>
    </item>
  </channel>
</rss>

