09-24-2018 05:07 PM
I have configured multiple Active/Passive firewalls for Okta SSO (admin authentication) this is working as expected on the active devices, however I was planning to use a separate authentication profile for the passive devices. Everytime I push the profile for the secondary firewall it syncs it back to the primary.
It was my understanding that authentication profiles don't sync in HA (https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/high-availability/reference-ha-synch...). The devices are running 8.0.9. so I am not sure if this is expected behaviour and/or how to get around it
09-25-2018 08:18 AM
The admin auth settings (Device > Setup > Management > Authentication) do not sync, but the auth profiles (Device > Authentication Profiles) are not specific to administration and so they do sync between peers.
If your auth profile on both active and passive is called "OktaSSO" and you try to change the settings of that profile on only the passive, those won't stick.
You'll need to set two different auth profiles ("OktaSSOPri", "OktaSSOSec" for example), and set the active to use one and passive to use the other.
09-25-2018 04:19 PM
"You'll need to set two different auth profiles ("OktaSSOPri", "OktaSSOSec" for example), and set the active to use one and passive to use the other."
I have tried this, however because the auth profile syncs between both firewalls I end up with the same profile on both everytime. I have set "OktaSSOSec" on the passive device and I end up with the same profile on the primary, which doesn't makes sense to me. So no matter the order both FWs end up with the same profile and Okta then works for one and not the other.
Have you managed to get around this and get Okta admin access working on both devices of the HA pair?
I have raised this with support and been told they are aware of the issue but not in the pipeline to fix it.
09-25-2018 04:41 PM
Again, the profile itself will sync which is why you need two. Both of the two profiles will exist on both peers. If you have both profiles defined, and you tell the primary to use OktaSSOPri and you tell the secondary to use OktaSSOSec, those settings should stay unique after a commit and config sync.
Are you saying that the settings are also syncing (Device > Setup > Management > Authentication)? Those should not be syncing between the peers as you found in the document you linked. If you're seeing that the settings themselves are syncing contrary to the documentation, that would be a bug (or the very least a problem with documentation).
I haven't actually set it up how you are. I don't understand the use case of having different login info between an HA pair - they are essentially interchangable, so I've never seen anyone configure it that way. That's not all that important though, it *should* be functional as you want it to work.
09-25-2018 05:04 PM - edited 09-25-2018 05:12 PM
" you tell the primary to use OktaSSOPri and you tell the secondary to use OktaSSOSec, those settings should stay unique after a commit and config sync"
You would expect so, I agree with you. This is not the case though. If I tell the Primary to use "OktaSSOPri" and the secondary to use "OktaSSOSec" I end up with both firewalls using one or the other but not separate due to the sync process
"I don't understand the use case of having different login info between an HA pair"
When you use Okta for admin access, you provide the landing page, which is essentially the login page for the firewalls, since the devices have different hostnames and different management IP addresses Okta treats these as two separate profiles and generates different metadata for those profiles, this is the reason you end up needing different auth profile in the HA pair
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!