Palo Alto NGFW: LDAP authentication with DUO/OKTA MFA

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

Palo Alto NGFW: LDAP authentication with DUO/OKTA MFA

L1 Bithead

Hi,

We have a got a new Palo Alto NGFW in our Premises and configured with LDAP for authentication. Things were good with LDAP for authentication until we started looking for MFA. I couldn't find any document to have LDAP and DUO/OKTA for MFA. As this is my first firewall configuration, it hits me so hard. Can someone help me with this?

 

Thanks,

Jerome J

1 accepted solution

Accepted Solutions

Cyber Elite
Cyber Elite

Hi @jeromej ,

 

Both Duo and Okta support GlobalProtect through either RADIUS or SAML.

 

  1. RADIUS would be easier, in my opinion.  It uses the Duo Authentication Proxy (DAP) or the Okta RADIUS Agent.  These services authenticate to AD.
  2. SAML will go direct to the Duo or Okta cloud.  It will need to be connected to AD somehow.

Here is a simple diagram -> https://www.okta.com/integrations/mfa-for-vpn/palo-alto-networks/.

 

From experience the DAP is easy to setup and troubleshoot once you get used to it.  I have never done Okta.

 

You would think that you could use the Factors tab in the Authentication Profile.  Unless this table is old -> https://docs.paloaltonetworks.com/compatibility-matrix/mfa-vendor-support/mfa-vendor-support-table that method is only supported for Authentication Proxy.

 

You can Google "globalprotect duo" or "globalprotect okta" and you will find clear docs on how to do it from Duo/Okta/PANW using RADIUS or SAML.

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.

View solution in original post

2 REPLIES 2

Cyber Elite
Cyber Elite

Hi @jeromej ,

 

Both Duo and Okta support GlobalProtect through either RADIUS or SAML.

 

  1. RADIUS would be easier, in my opinion.  It uses the Duo Authentication Proxy (DAP) or the Okta RADIUS Agent.  These services authenticate to AD.
  2. SAML will go direct to the Duo or Okta cloud.  It will need to be connected to AD somehow.

Here is a simple diagram -> https://www.okta.com/integrations/mfa-for-vpn/palo-alto-networks/.

 

From experience the DAP is easy to setup and troubleshoot once you get used to it.  I have never done Okta.

 

You would think that you could use the Factors tab in the Authentication Profile.  Unless this table is old -> https://docs.paloaltonetworks.com/compatibility-matrix/mfa-vendor-support/mfa-vendor-support-table that method is only supported for Authentication Proxy.

 

You can Google "globalprotect duo" or "globalprotect okta" and you will find clear docs on how to do it from Duo/Okta/PANW using RADIUS or SAML.

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.

Hi @TomYoung,

 

Thanks for the reply. I have got a better view on this now. 

I would like to go with Okta RADIUS, as our organization prefers Okta over DUO for some reasons. So will work on the Okta RADIUS integration with PA.

 

 

Thanks,

Jerome

  • 1 accepted solution
  • 1380 Views
  • 2 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!