- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
on 04-10-2020 12:07 PM - edited on 07-11-2022 11:30 PM by jennaqualls
In my previous article, "GlobalProtect: User/Device Context & Compliance," we covered security policy matching based on user identity and device context provided via the GlobalProtect app. We also enabled notifications to the end user based on compliance of the endpoint.
In this post, we are going to configure Authentication Policy with MFA to provide elevated access for both HTTP and non-HTTP traffic to specific sensitive resources. You can see a diagram of the environment here.
The value in leveraging Authentication Policy with MFA is to ensure that regardless of whether or not a user is known and the device is compliant, they must authenticate with multiple factors to validate their identity prior to accessing a specific resource. This helps prevent lateral movement by malicious attackers that are persisting internally via a compromised machine or with phished credentials.
Although this capability can be configured without GlobalProtect for HTTP applications, we are going to focus on non-HTTP applications to highlight the GlobalProtect app's role in the authentication prompt process.
In my next article, "GlobalProtect: Pre-Logon Authentication," we will configure pre-logon authentication using machine certificates.
@DLONGPRÉ It works great with Azure AD SAML authentication and MFA is prompted in Azure login. No need for any additional configuration specific to MFA.
I currently have pre-login working with SSO + SAML with Azure MFA... the issue that I see is that when a user stays logged in for a time greater than their time required to reauthenticate via MFA, the machine is stuck in a limbo state during this time. Has anyone else experienced this and does anyone know of a workaround?
@DLONGPRÉ @CEkanayake2 Are you currently using Azure MFA, Authentication Policy and GlobalProtect? If so, can you help me out? Trying to use this to restrict administrative access to resources to comply with new requirements and I'm having a difficult time.
Is there a way to make this work where the user only receives an MFA push notification directly to their phone when they hit a Security Authentication policy? I want to use this with user-certificate authentication. My ideal workflow would be as follows:
1. With prelogon configured, the user authenticates with their user certificate (not machine), and by the time they're done signing into their laptop, they are authenticated to Globalprotect. This allows us to have usernames in the traffic logs, and formulate security policies (eg for Internet) with Security Profile Groups attached to them for L7 protection. As a fallback, SAML auth profile is configured, and if a user has an issue with their certificate they receive a SAML login prompt.
Step 1 works absolutely perfectly. Anyone that just needs to use the internet never has to think about the VPN, they're always connected and protected by the Security Group profile that is configured.
2. When the user tries to access an internal resource in the network, (hitting a security authentication policy), they receive an MFA push to their company-issued phone. After they acknowledge the challenge, they are free to access internal resources for x amount of hours.
is this a technically possible solution?
@Brooks_Hassinger it should be possible. The MFA push is performed separately based on the auth profile applied to the auth policy, which is separate from the GP authentication process.