<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Two-factor token based (2FA) authentication mechanism for administrative access in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201237#M59499</link>
    <description>&lt;P&gt;This should work, yes. Details on how to configure the RADIUS part on the firewall can be found here:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/authentication/configure-radius-authentication#id01590369-93b6-48be-8928-eac0ade51d5d" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/authentication/configure-radius-authentication#id01590369-93b6-48be-8928-eac0ade51d5d&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 19 Feb 2018 23:40:09 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-02-19T23:40:09Z</dc:date>
    <item>
      <title>Two-factor token based (2FA) authentication mechanism for administrative access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201154#M59477</link>
      <description>&lt;P&gt;Is there a way to configure MFA and OTP for administrative access. The company wants to comply with new standards and i didn't see way do it for local access. It is only mentioned how to do it for global protect vpn&amp;nbsp;users.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 16:52:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201154#M59477</guid>
      <dc:creator>SecurityConsultant</dc:creator>
      <dc:date>2018-02-19T16:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Two-factor token based (2FA) authentication mechanism for administrative access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201163#M59479</link>
      <description>&lt;P&gt;I dont think you can, someone else may know better but was looking the other day at adding MFA to amin login and can only add an MFA device in the "factors" tab of the server profile...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for this "Factors" tab PAN state the following....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;Additional authentication factors are supported for end-user authentication through Authentication Policy only. Additional factors &lt;U&gt;are not supported&lt;/U&gt; for remote user authentication to GlobalProtect portals and gateways &lt;U&gt;or for administrator authentication to the PAN-OS or Panorama web interface&lt;/U&gt;. Although you can configure additional factors, they will not be enforced for these use cases. You can, however, integrate with MFA vendors using RADIUS or SAML for all authentication use cases.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT color="#000000" face="Calibri" size="3"&gt;Bummer!!!!&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 17:44:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201163#M59479</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-02-19T17:44:25Z</dc:date>
    </item>
    <item>
      <title>Re: Two-factor token based (2FA) authentication mechanism for administrative access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201191#M59490</link>
      <description>&lt;P&gt;Exactly, the possibilities you have are RADIUS or SAML. SAML is great but cannot be used for SSH login (compared to RADIUS).&lt;/P&gt;&lt;P&gt;Or a completely different approach is if your PAN management interfaces are located behind a PaloAlto Firewall. This way you could enforce the integrated MFA with captive portal and only when a user is successfully authenticated there he will be able to see the admin webinterface. On the admin webinterface you can then stay with username/password as the additional factor was already entered.&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 20:04:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201191#M59490</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-02-19T20:04:24Z</dc:date>
    </item>
    <item>
      <title>Re: Two-factor token based (2FA) authentication mechanism for administrative access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201219#M59493</link>
      <description>&lt;P&gt;I didn't get what you meant by the management interfaces are behind the PAN. I use the dedicated management interface and the loopback to access the FW.&amp;nbsp; How to configure the MFA and the captive portal. Do you mean the MFA under the servers profiles.&lt;/P&gt;&lt;P&gt;Can you please share how to configure it.&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 22:04:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201219#M59493</guid>
      <dc:creator>SecurityConsultant</dc:creator>
      <dc:date>2018-02-19T22:04:35Z</dc:date>
    </item>
    <item>
      <title>Re: Two-factor token based (2FA) authentication mechanism for administrative access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201225#M59494</link>
      <description>&lt;P&gt;What I meant was if you have a dedicated management network which which is located behind another PaloAlto Networks Firewall and in this management network you have the management ports of your firewall(s).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But may be we should start with what you already have and what you want to improve. As you wrote you want MFA access for the firewall webinterface.&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Do you use local users or are they somewhere in a directory?&lt;/LI&gt;&lt;LI&gt;What authentication method are you using right now?&lt;/LI&gt;&lt;LI&gt;Do you already have MFA software which you use for other purposes (globalprotect, SAML IdP, Citrix access, ...)?&lt;/LI&gt;&lt;LI&gt;Are you talking about the managemebt webinterface of one firewall (cluster) or some more firewalls?&lt;/LI&gt;&lt;LI&gt;Do you already have dedicated managementnetworks, maybe for network devices or virtualization infrastructur or something else?&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Mon, 19 Feb 2018 22:38:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201225#M59494</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-02-19T22:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: Two-factor token based (2FA) authentication mechanism for administrative access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201229#M59497</link>
      <description>&lt;OL&gt;&lt;LI&gt;Do you use local users or are they somewhere in a directory? &lt;STRONG&gt;both of them&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;What authentication method are you using right now? &lt;STRONG&gt;just AD credentials&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Do you already have MFA software which you use for other purposes (globalprotect, SAML IdP, Citrix access, ...)? &lt;STRONG&gt;No&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Are you talking about the managemebt webinterface of one firewall (cluster) or some more firewalls? &lt;STRONG&gt;one cluster&lt;/STRONG&gt;&lt;/LI&gt;&lt;LI&gt;Do you already have dedicated managementnetworks, maybe for network devices or virtualization infrastructur or something else? &lt;STRONG&gt;No&amp;nbsp;&lt;/STRONG&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;Our customer already has an F5 VPN solution, were they MFA once the VPN client accesses. They added a radius server which is integrated with an OTP server(Azure) and that is working. Can this be done the same for Palo Admin access and if yes how to configure it?&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 23:01:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201229#M59497</guid>
      <dc:creator>SecurityConsultant</dc:creator>
      <dc:date>2018-02-19T23:01:55Z</dc:date>
    </item>
    <item>
      <title>Re: Two-factor token based (2FA) authentication mechanism for administrative access</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201237#M59499</link>
      <description>&lt;P&gt;This should work, yes. Details on how to configure the RADIUS part on the firewall can be found here:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/authentication/configure-radius-authentication#id01590369-93b6-48be-8928-eac0ade51d5d" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/authentication/configure-radius-authentication#id01590369-93b6-48be-8928-eac0ade51d5d&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 19 Feb 2018 23:40:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/two-factor-token-based-2fa-authentication-mechanism-for/m-p/201237#M59499</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-02-19T23:40:09Z</dc:date>
    </item>
  </channel>
</rss>

