10-27-2021 03:37 PM
I would like to create a secure internal tunnel such that a user requires authentication (ideally MFA, or a cert, or at least a PW, etc) to get from one internal zone to another internal zone (ie user zone to the management zone). What are my options?
Is anyone doing this sort of thing with Okta? Is there a certificate based way to do this? Other ideas?
If anyone can point me to some materials, or just help me know better what to search for or what the solution is called, I'd be delighted.
Thanks!
10-28-2021 03:51 PM
So I just found this knowledge base article that sounds like what I want to do.
Has anyone ever gotten this sort of thing working? I currently use the Okta Captive Portal for User ID, but again I can only get it working when http/https traffic triggers the captive portal. This would offer a great way to authenticate traffic between sensitive zones, if I can get it to work.
10-28-2021 06:12 PM
Captive Portal will only trigger for users who aren't already authenticated and mapped to the IP via user-id. If you already have a user mapped to the IP it won't trigger anyways, regardless of it not being web traffic.
10-28-2021 06:31 PM
So far, that doesn't seem to have caused unwanted behavior for us with the existing Okta captive portal setup. On zones that use it, it authenticates reliably every time users attempt to access the web zone, repeatedly. I have not encountered a situation where it fails to authenticate anyone. It's fantastic because it's both multi factor, and auths against existing database of users in the Okta cloud LDAP.
If I could just take the exact way its currently working, and prompt for authenticating using captive portal the same way when accessing the management zone, as it does with the web zone.
10-29-2021 05:28 AM
Hi @RSteffens ,
Great document find! Why don't you add the management zone to your authentication policy? Am I missing something?
Hi @BPry and @OtakarKlier ,
In the newer PAN-OS, the Captive Portal Settings tab under Device > User identification has been renamed Authentication Portal Settings. When I edit the setting and click on help, I see this message.
So, I don't think it is only for User/IP mapping or only triggers on unknown users in the newer PAN-OS. Also, in the Authentication Policy, you have a drop down for source users that can specify any, unknown, etc.
I have tested this with GlobalProtect, and I am required to authenticate on the web redirect page. My User-ID vpn-client data source existed before the captive-portal data source was generated.
I hope this helps,
Tom
05-09-2022 12:36 PM - edited 05-09-2022 12:41 PM
Hi!
This is a bit late, but just wanted to let everyone know that I did indeed get this working using the guides here:
And here:
(although I wasn't integrating Prisma, the basic technique is the same)
This series is also very helpful:
https://live.paloaltonetworks.com/t5/blogs/globalprotect-overview/ba-p/322170 especially part IV
The final result is spectacular and wonderful. Thanks for all your helpful ideas!
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!