<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Okta Admin Authentication on HA deployment in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232366#M66657</link>
    <description>&lt;P&gt;&lt;SPAN&gt;"&amp;nbsp;you tell the primary to use OktaSSOPri and you tell the secondary to use OktaSSOSec, those settings should stay unique after a commit and config sync"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You would expect so, I agree with you. This is not the case though. If I tell the Primary to use "OktaSSOPri" and the secondary to use "OktaSSOSec" I end up with both firewalls using one or the other but not separate due to the sync process&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"I don't understand the use case of having different login info between an HA pair"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When you use Okta for admin access, you provide the landing page, which is essentially the login page for the firewalls, since the devices have different hostnames and different management IP addresses Okta treats these as two separate profiles and generates different metadata for those profiles, this is the reason you end up needing different auth profile in the HA pair&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 26 Sep 2018 00:12:07 GMT</pubDate>
    <dc:creator>Jonathan_C</dc:creator>
    <dc:date>2018-09-26T00:12:07Z</dc:date>
    <item>
      <title>Okta Admin Authentication on HA deployment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232184#M66635</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured multiple Active/Passive firewalls for Okta SSO (admin authentication) this is working as expected on the active devices, however I was planning to use a separate authentication profile for the passive devices. Everytime I push the profile for the secondary firewall it syncs it back to the primary.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It was my understanding that authentication profiles don't sync in HA (&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/high-availability/reference-ha-synchronization/what-settings-dont-sync-in-activepassive-ha" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/high-availability/reference-ha-synchronization/what-settings-dont-sync-in-activepassive-ha&lt;/A&gt;). The devices are running 8.0.9. so I am not sure if this is expected behaviour and/or how to get around it&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 00:07:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232184#M66635</guid>
      <dc:creator>Jonathan_C</dc:creator>
      <dc:date>2018-09-25T00:07:43Z</dc:date>
    </item>
    <item>
      <title>Re: Okta Admin Authentication on HA deployment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232291#M66646</link>
      <description>&lt;P&gt;The admin auth&amp;nbsp;&lt;U&gt;&lt;STRONG&gt;settings&lt;/STRONG&gt;&lt;/U&gt;&amp;nbsp;(Device &amp;gt; Setup &amp;gt; Management &amp;gt; Authentication) do not sync, but the auth&amp;nbsp;&lt;U&gt;&lt;STRONG&gt;profiles&lt;/STRONG&gt;&lt;/U&gt;&amp;nbsp;(Device &amp;gt; Authentication Profiles) are not specific to administration and so they do sync between peers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your auth profile on both active and passive is called "OktaSSO" and you try to change the settings of that profile on only the passive, those won't stick.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You'll need to set two different auth profiles ("OktaSSOPri", "OktaSSOSec" for example), and set the active to use one and passive to use the other.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 15:18:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232291#M66646</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2018-09-25T15:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Okta Admin Authentication on HA deployment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232353#M66654</link>
      <description>&lt;P&gt;"&lt;SPAN&gt;You'll need to set two different auth profiles ("OktaSSOPri", "OktaSSOSec" for example), and set the active to use one and passive to use the other."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have tried this, however because the auth profile syncs between both firewalls I end up with the same profile on both everytime. I have set "OktaSSOSec" on the passive device and I end up with the same profile on the primary, which doesn't makes sense to me. So no matter the order both FWs end up with the same profile and Okta then works for one and not the other.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Have you managed to get around this and get Okta admin access working on both devices of the HA pair?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I have raised this with support and been told they are aware of the issue but not in the pipeline to fix it.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 23:19:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232353#M66654</guid>
      <dc:creator>Jonathan_C</dc:creator>
      <dc:date>2018-09-25T23:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: Okta Admin Authentication on HA deployment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232356#M66655</link>
      <description>&lt;P&gt;Again, the profile itself will sync which is why you need two. Both of the two profiles will exist on both peers. If you have both profiles defined, and you tell the primary to use OktaSSOPri and you tell the secondary to use OktaSSOSec, those settings should stay unique after a commit and config sync.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Are you saying that the&amp;nbsp;&lt;STRONG&gt;settings&lt;/STRONG&gt; are also syncing (Device &amp;gt; Setup &amp;gt; Management &amp;gt; Authentication)? Those should not be syncing between the peers as you found in the document you linked. If you're seeing that the settings themselves are syncing contrary to the documentation, that would be a bug (or the very least a problem with documentation).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I haven't actually set it up how you are. I don't understand the use case of having different login info between an HA pair - they are essentially interchangable, so I've never seen anyone configure it that way. That's not all that important though, it *should* be functional as you want it to work.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Sep 2018 23:41:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232356#M66655</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2018-09-25T23:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: Okta Admin Authentication on HA deployment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232366#M66657</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"&amp;nbsp;you tell the primary to use OktaSSOPri and you tell the secondary to use OktaSSOSec, those settings should stay unique after a commit and config sync"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;You would expect so, I agree with you. This is not the case though. If I tell the Primary to use "OktaSSOPri" and the secondary to use "OktaSSOSec" I end up with both firewalls using one or the other but not separate due to the sync process&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"I don't understand the use case of having different login info between an HA pair"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;When you use Okta for admin access, you provide the landing page, which is essentially the login page for the firewalls, since the devices have different hostnames and different management IP addresses Okta treats these as two separate profiles and generates different metadata for those profiles, this is the reason you end up needing different auth profile in the HA pair&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Sep 2018 00:12:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232366#M66657</guid>
      <dc:creator>Jonathan_C</dc:creator>
      <dc:date>2018-09-26T00:12:07Z</dc:date>
    </item>
    <item>
      <title>Re: Okta Admin Authentication on HA deployment</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232509#M66688</link>
      <description>&lt;P&gt;Thanks for the use case, I hadn't realized it was specific to the hostname/IP. Makes it impossible to use Okta syncing like that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It sounds like you're hitting a bug. The profiles should sync but the actual settings for the admin login shouldn't. I'd recommend getting your support case reopened if it's closed, if it's a known limitation then it should be well documented at the very least.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Sep 2018 18:49:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/okta-admin-authentication-on-ha-deployment/m-p/232509#M66688</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2018-09-26T18:49:17Z</dc:date>
    </item>
  </channel>
</rss>

