<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PaloAlto 3rd party captive portal integration in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-3rd-party-captive-portal-integration/m-p/243227#M69558</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/103288"&gt;@fenriquez&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is possible with 2 different ways, but not with point 3 of your list:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/103288"&gt;@fenriquez&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Paloalto firewall should try to authenticate now the user with the credentials provided before in point (3)&amp;nbsp;via Radius&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The authentication needs to be done on your portal only, otherwise if the firewall has to authenticate the user also, he needs to log in again on the captive portal of the firewall which is not really possible as you redirect the user first to your portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But thats not a problem. The ways it will work are the following:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Syslog: your captive portal server sends syslog messages containing the source IP and the username to the firewall. The firewall then parses these messages and adds these ip-user mappings to the local usertable.&lt;/LI&gt;&lt;LI&gt;API: as soon as a user successfully logged in your captive portal server adds the ip-user-mapping over an API call to the firewall.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;For both ways, your captive portal needs to be placed in the internal network or at least before any NAT is applied because otherwise your captive portal cannot send the actual client IP to the firewall and the whole situation will not work. In addition when the syslog is sent or the API call is made, you need to check if there is a small delay required before your captive portal redirects the user to the actual URL that the user tried to open.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS: Sorry for this question, but if this works like that and in the background the authentication is done with RADIUS, why should a paloalto customer pay for your solution when the firewall already has this capability out of the box?&lt;/P&gt;</description>
    <pubDate>Thu, 13 Dec 2018 20:51:42 GMT</pubDate>
    <dc:creator>Remo</dc:creator>
    <dc:date>2018-12-13T20:51:42Z</dc:date>
    <item>
      <title>PaloAlto 3rd party captive portal integration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-3rd-party-captive-portal-integration/m-p/243216#M69554</link>
      <description>&lt;P&gt;Hi! First of all sorry if this question is explained anywhere else; I've dedicated a few hours to browse docs and posts but I cannot find a proper answer. I work for a company that deploys hotspot solutions over premises using different hardware solutions. It turns out to be that we need to integrate Paloalto appliance in our solution. Our approach is basically this:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Firewall intercepts traffic for non authenticatrd users&lt;/LI&gt;&lt;LI&gt;User is redirected via a 302 http redirect to our portal (it can be placed on the wan zone so it can be reached by the Paloalto firewall)&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Web form is presented so the user validates himself. If credentials are valid (they are internally located on a Radius server) &amp;nbsp;then control must be returned to Paloalto firewall&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Paloalto firewall should try to authenticate now the user with the credentials provided before in point (3)&amp;nbsp;via Radius&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Radius replies with an Access-Accept so a Session-Start should be send from Paloalto to the Radius server (accounting starts)&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;So here there are my questions:&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Is this approach feasible? I understand that points (1) and (2) are easily configurable as a Redirect Captive Portal with web form authentication....&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;How must our&amp;nbsp;captive portal inform to Paloalto that credentials are valid so Paloalto starts with Radius authentication? Some manufacturers implement a special login URL, other ones use a propietary protocol, but I cannot find detailed information about the whole workflow.&amp;nbsp;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Thanks a lot in advanced for your help.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kind Regards&amp;nbsp;&lt;/P&gt;&lt;P&gt;Fernando E.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 13 Dec 2018 20:19:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-3rd-party-captive-portal-integration/m-p/243216#M69554</guid>
      <dc:creator>fenriquez</dc:creator>
      <dc:date>2018-12-13T20:19:41Z</dc:date>
    </item>
    <item>
      <title>Re: PaloAlto 3rd party captive portal integration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-3rd-party-captive-portal-integration/m-p/243227#M69558</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/103288"&gt;@fenriquez&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is possible with 2 different ways, but not with point 3 of your list:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/103288"&gt;@fenriquez&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Paloalto firewall should try to authenticate now the user with the credentials provided before in point (3)&amp;nbsp;via Radius&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;The authentication needs to be done on your portal only, otherwise if the firewall has to authenticate the user also, he needs to log in again on the captive portal of the firewall which is not really possible as you redirect the user first to your portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But thats not a problem. The ways it will work are the following:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Syslog: your captive portal server sends syslog messages containing the source IP and the username to the firewall. The firewall then parses these messages and adds these ip-user mappings to the local usertable.&lt;/LI&gt;&lt;LI&gt;API: as soon as a user successfully logged in your captive portal server adds the ip-user-mapping over an API call to the firewall.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;For both ways, your captive portal needs to be placed in the internal network or at least before any NAT is applied because otherwise your captive portal cannot send the actual client IP to the firewall and the whole situation will not work. In addition when the syslog is sent or the API call is made, you need to check if there is a small delay required before your captive portal redirects the user to the actual URL that the user tried to open.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Remo&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PS: Sorry for this question, but if this works like that and in the background the authentication is done with RADIUS, why should a paloalto customer pay for your solution when the firewall already has this capability out of the box?&lt;/P&gt;</description>
      <pubDate>Thu, 13 Dec 2018 20:51:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-3rd-party-captive-portal-integration/m-p/243227#M69558</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-12-13T20:51:42Z</dc:date>
    </item>
    <item>
      <title>Re: PaloAlto 3rd party captive portal integration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-3rd-party-captive-portal-integration/m-p/243278#M69574</link>
      <description>&lt;P&gt;ok, I see the picture, once you send the syslog trace then the PaloAlto firewall allows the user to access the Internet.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding why using our solution instead of the integrated portal: the picture I depicted it's a simplified one. Our client wants a "complicated" authorization mechanism which involves sending an email to someone that must allow another one&amp;nbsp;with an SMS.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks a lot for your help.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 04:50:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-3rd-party-captive-portal-integration/m-p/243278#M69574</guid>
      <dc:creator>fenriquez</dc:creator>
      <dc:date>2018-12-14T04:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: PaloAlto 3rd party captive portal integration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/paloalto-3rd-party-captive-portal-integration/m-p/243279#M69575</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/103288"&gt;@fenriquez&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Regarding why using our solution instead of the integrated portal: the picture I depicted it's a simplified one. Our client wants a "complicated" authorization mechanism which involves sending an email to someone that must allow another one&amp;nbsp;with an SMS.&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Now I understand &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Dec 2018 05:56:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/paloalto-3rd-party-captive-portal-integration/m-p/243279#M69575</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-12-14T05:56:34Z</dc:date>
    </item>
  </channel>
</rss>

