I would like to create a secure internal tunnel such that a user requires authentication (ideally MFA, or a cert, or at least a PW, etc) to get from one internal zone to another internal zone (ie user zone to the management zone). What are my options?
Is anyone doing this sort of thing with Okta? Is there a certificate based way to do this? Other ideas?
If anyone can point me to some materials, or just help me know better what to search for or what the solution is called, I'd be delighted.
Do you already have user-id setup to properly identify the user so that you can authorize only the users needing access to management resources access to your management zone? If you have user-id setup properly I'm kind of missing the point of why you would want to do this, your accounts should be secured to the point where this is a none issue.
If you aren't using user-id I would recommend that you actually get it setup, but you can use an authentication policy to do this and capture the user-id for further use in your security rulebase.
Thanks very much for your input!
Yes I currently have user-ID set up for several zones, but user-ID captive portal redirect is currently only triggered on those zones when a user attempts to access the internet (user-zone -> internet-zone). I.e., the redirect is only triggering for http/https traffic.
I have tried doing user ID from a user-zone to management-zone - but I haven't found a way to trigger the authentication redirect to user-id captive portal in this case.
Any idea what I should check or what I'm doing wrong?
Hi @RSteffens ,
The Authentication Policy (Captive Portal) can "authenticate end users before they can access services and applications." https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/authentication/authentication-policy.html They would have to use web-browsing/ssl as far as I know.
You could also create an internal GP gateway for access.
MFA can be used for both options. Check out the table -> https://docs.paloaltonetworks.com/compatibility-matrix/mfa-vendor-support/mfa-vendor-support-table.h....
So I just found this knowledge base article that sounds like what I want to do.
Has anyone ever gotten this sort of thing working? I currently use the Okta Captive Portal for User ID, but again I can only get it working when http/https traffic triggers the captive portal. This would offer a great way to authenticate traffic between sensitive zones, if I can get it to work.
So far, that doesn't seem to have caused unwanted behavior for us with the existing Okta captive portal setup. On zones that use it, it authenticates reliably every time users attempt to access the web zone, repeatedly. I have not encountered a situation where it fails to authenticate anyone. It's fantastic because it's both multi factor, and auths against existing database of users in the Okta cloud LDAP.
If I could just take the exact way its currently working, and prompt for authenticating using captive portal the same way when accessing the management zone, as it does with the web zone.
Hi @RSteffens ,
Great document find! Why don't you add the management zone to your authentication policy? Am I missing something?
In the newer PAN-OS, the Captive Portal Settings tab under Device > User identification has been renamed Authentication Portal Settings. When I edit the setting and click on help, I see this message.
So, I don't think it is only for User/IP mapping or only triggers on unknown users in the newer PAN-OS. Also, in the Authentication Policy, you have a drop down for source users that can specify any, unknown, etc.
I have tested this with GlobalProtect, and I am required to authenticate on the web redirect page. My User-ID vpn-client data source existed before the captive-portal data source was generated.
I hope this helps,
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!