Hi @Stevenjwilliams83 ,
Unless I misunderstood your question I would try this. Have an authentication profile using MFA in your Authentication settings:
Hope this helps,
@Stevenjwilliams83 MFA in authenticaion profile is only supported for Captive Portal/Authentication policies. The admin authenticaion can support 2FA by using RADIUS or TACACS server or as you mentioned SAML. Please see the official compatibility matrix below:
@Stevenjwilliams83 You can do this, but if you have a pair of Palo's (and you most likely do), you'll run into the same issue that I had and that is the syncing of the Authentication settings with the peer. Because you can only have one Authentication Profile in the Authentications Settings and you can't tell it not to sync with the peer, whatever Profile you've set up will probably have the IP of your Palo - which is different from its peer. Thus, when you try to log into the peer with your new MFA method, you'll get redirected to your other Palo and it will fail. So yes, it does work, but only for one of the pair. If I could tell it to not sync the Authentication settings with the peer and have a separate Authentication Profile for each node, I'd be golden. But I can't so I'm not. haha.
Let me know if this doesn't make sense and I can try to go into more detail.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The Live Community thanks you for your participation!