<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Force Authentication Policy (MFA) for known users (user-id agent) in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/force-authentication-policy-mfa-for-known-users-user-id-agent/m-p/385246#M90120</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/30703"&gt;@Sly_Cooper&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Can you post how you've actually configured the authentication rulebase entry? Sounds like it's simply been configured in a way to alert on unknown users, which would be standard from an authentication policy standpoint but not what you want in this case.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 10 Feb 2021 22:29:50 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2021-02-10T22:29:50Z</dc:date>
    <item>
      <title>Force Authentication Policy (MFA) for known users (user-id agent)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/force-authentication-policy-mfa-for-known-users-user-id-agent/m-p/385180#M90109</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had configured Authentication policy for one of the environments and everything worked fine as expected. While replicating similar setup for a different environment, the Authentication policy was not working. After some troubleshooting, I observed that if the firewall has user to ip mapping generated via user-id agents (type UIA), it does not trigger Authentication policy (MFA, Type SSO). I confirmed the theory by doing multiple test with and without user-id agent config. How can I enforce Authentication Policy for already known user? I do not to remove the user-id agent config for the vsys as this environment is just a subset of the environments covered (same zone). I want users to perform MFA before accessing certain resources and not provide access based on user-id mapping (active directory logs).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am running PAN-OS 9.0.x. Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 19:59:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/force-authentication-policy-mfa-for-known-users-user-id-agent/m-p/385180#M90109</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2021-02-10T19:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: Force Authentication Policy (MFA) for known users (user-id agent)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/force-authentication-policy-mfa-for-known-users-user-id-agent/m-p/385246#M90120</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/30703"&gt;@Sly_Cooper&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Can you post how you've actually configured the authentication rulebase entry? Sounds like it's simply been configured in a way to alert on unknown users, which would be standard from an authentication policy standpoint but not what you want in this case.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 10 Feb 2021 22:29:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/force-authentication-policy-mfa-for-known-users-user-id-agent/m-p/385246#M90120</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-02-10T22:29:50Z</dc:date>
    </item>
    <item>
      <title>Re: Force Authentication Policy (MFA) for known users (user-id agent)</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/force-authentication-policy-mfa-for-known-users-user-id-agent/m-p/385426#M90143</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;- Okta SAML profile (Imported)&lt;/P&gt;&lt;P&gt;- Authentication profile using the Okta SAML profile&lt;/P&gt;&lt;P&gt;- Captive portal using Okta SAML profile (redirect mode)&lt;/P&gt;&lt;P&gt;- Authentication policy, trust -&amp;gt; untrust -&amp;gt; http, https, tcp/3389 services -&amp;gt; default-web-form&lt;/P&gt;&lt;P&gt;- Security policy allowing required traffic&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I also tried using a custom authentication object by cloning default-web-form and configured it to use Okta SAML authentication profile, and using it in the authentication policy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is not with the authentication policy. If I remove user-id agents from the vsys, the firewall does not have user to ip mapping and the authentication works as expected. The authentication is not triggered when the user is already known via user-id agents. It does not trigger network MFA. I hope this explanation helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Feb 2021 15:36:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/force-authentication-policy-mfa-for-known-users-user-id-agent/m-p/385426#M90143</guid>
      <dc:creator>Sly_Cooper</dc:creator>
      <dc:date>2021-02-11T15:36:55Z</dc:date>
    </item>
  </channel>
</rss>

