How to capture the MFA API information sent from the Palo Alto management interface to DUO API

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

How to capture the MFA API information sent from the Palo Alto management interface to DUO API

L1 Bithead

First time poster and unsure if correct location to post.  We are currently testing DUO install and need to capture the MFA/DUOv2 API information sent from the Palo Alto management interface to DUO API.  

1 ACCEPTED SOLUTION

Accepted Solutions
7 REPLIES 7

L6 Presenter

How are you attempting to use DUO? A local or cloud server? Radius/LDAP or the PA built-in MFA DUOv2 profile? Passing the correct allow list from the PA to DUO? And have the correct allow list in DUO to whatever your corporate auth source is?

 

From your description, it sounds like DUO is working, just not the user/group query from the PA to DUO to match to a particular user.

 

Edit: And I suppose this thread should probably be in the Configuration Discussions forum... but....

L1 Bithead

Hi, Thank you for the reply.  If I can move the post I will.  

We are using , Captive Portal, and PA built-in MFA DUOv2 profile, and this is for a local server.  LDAP/AD backend.  I'm unsure of the "allow list"  

L6 Presenter

Hmmm... OK, we use a local DUO server Radius connection (LDAP/AD DUO backend), I wasn't aware that MFA DUOv2 was available as a local server, I thought it was cloud only.

 

I would verify in your logs that you are not seeing anything unusual in the Authentication Profile, Logs -> System, then filter with (object eq [your-auth-profile-name]) . You should see something like this in a success:

authenticated for user \'alice\'. auth profile \'Duo\', vsys \'vsys1\', server profile \'DUO Radius\', server address \'1.2.3.4\', auth protocol \'PAP\', reply message \'Success. Logging you in...\' From: 5.6.7.8.

 

Or this in a failure case with the reason:

failed authentication for user \'alice\'. Reason: Invalid username/password. auth profile \'Duo\', vsys \'vsys1\', server profile \'Duo Radius\', server address \'1.2.3.4\', auth protocol \'PAP\', reply message \'Invalid username or password\' From: 5.6.7.8.

 

But since you say phone MFA works, but SMS MFA doesn't, the error will probably just be a timeout. Sounds like it is a problem on the DUO side, like maybe it doesn't have a SMS senderID set when queried by the PA? So the SMS send fails. But I don't know the details in the DUO server very well. You have me stumped at the moment.

Ok, sorry to be clear DUO service is in the Cloud.  LDAP and Captive Portal.   Thank you for your advice on checking the logs.  How would we capture a PCAP of the egress API data that is being sent out to DUO?  Can you do that from the firewall or you need some 3 device to sit in-between? 

L1 Bithead

If asked is there anyone to do that ourselves or does PA support do that?  

We need that PCAP or use TCP dump and filter just the API calls to DUO?  Duo support wants to see the api coming over and thoughts it can help shed light on information going to or from. 

L1 Bithead

How about this.  Can we Run TCP dump from the command line and PCAP
the outbound of management interface.  Can anyone point to that documentation or how to do it.  

 

tcpdump X.X.X.X to X.X.X.X 443 and thinking API commands 

L1 Bithead
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!