Configuring Role-Based Access Control on Panorama (Version 11.0)

PCNSE Objective Focus

This topic directly addresses PCNSE objectives related to securing administrative access to Panorama using Role-Based Access Control (RBAC).

Overview: Securing Panorama Administration

Panorama provides powerful centralized management, making it critical to control who can access it and what actions they can perform. Role-Based Access Control (RBAC) on Panorama enables administrators to enforce the principle of least privilege, ensuring users only have the permissions necessary to perform their job functions.

RBAC separates administrative privileges into two key components:

By combining Admin Roles and Access Domains, you can create highly granular permission sets for different administrative users or groups.

Key RBAC Components

Admin Roles

Access Domains

Administrators

Configuring Custom Admin Roles (11.0)

While predefined roles exist, custom roles offer tailored permissions.

  1. Navigate to Panorama > Admin Roles .
  2. Click Add .
  3. Enter a descriptive Name for the role (e.g., `Firewall-Operator`, `Security-Policy-Auditor`).
  4. Configure access privileges across different sections:
    • Web UI: Check/uncheck specific tabs and sub-tabs (e.g., allow Monitor tab but disable Policies tab). You can often control specific actions within tabs (e.g., allow viewing rules but disable creating/editing).
    • Command Line: Enable/disable specific CLI command trees or individual commands.
    • XML API: Control access to different API endpoints (e.g., allow operational requests but block configuration requests).
    • Other Permissions: May include options for specific actions like Commit, Push, software/content management.
  5. Click OK to save the custom role.
  6. Commit the changes on Panorama.

Start with minimal privileges and add permissions as needed, following the least privilege principle.

Configuring Access Domains (11.0)

Access Domains restrict the devices and configuration objects an administrator can manage.

  1. Navigate to Panorama > Access Domains .
  2. Click Add .
  3. Enter a descriptive Name for the domain (e.g., `EMEA_Region_Devices`, `PCI_Segment_Policy`).
  4. Select the specific items to include in this domain's scope:
    • Device Groups: Select the DGs the user should manage.
    • Templates / Template Stacks: Select the Templates/Stacks the user should manage.
    • Managed Devices: Optionally, select specific individual firewalls or collectors.
    • Virtual Systems: Select specific Vsys if applicable.
    • Shared Objects: Control access to Shared objects (Global level).
    • (Advanced) You might also control access to specific reporting contexts.
  5. Click OK to save the access domain.
  6. Commit the changes on Panorama.

Carefully plan your Access Domains. An administrator assigned to a specific domain will ONLY see and be able to manage the items explicitly included in that domain.

Creating Administrator Accounts (11.0)

Combine Roles and Domains when creating administrator accounts.

  1. Navigate to Panorama > Administrators .
  2. Click Add .
  3. Enter a Name (username) for the administrator.
  4. Choose the Authentication Profile :
    • `None` (for local password authentication).
    • Select a pre-configured profile for RADIUS, TACACS+, LDAP, or SAML.
  5. If using local authentication, set and confirm the Password . Configure password complexity requirements under Panorama > Setup > Management > Authentication Settings .
  6. Select the Administrator Type :
    • Role Based: This is the standard option using RBAC.
      • Select the desired Role (predefined or custom) from the dropdown.
      • Select the desired Access Domain (predefined 'All' or custom) from the dropdown.
    • Dynamic: Used with external authentication (RADIUS/TACACS+) where roles/domains can be passed back via Vendor-Specific Attributes (VSAs).
    • (Older/Legacy) `Superuser` or `Device Administrator` types exist but Role Based is preferred for flexibility.
  7. Click OK to save the administrator account.
  8. Commit the changes on Panorama.

Example Scenarios

Best Practices for RBAC

Caveats / Gotchas / Considerations

PCNSE Exam Focus (Relevant to 11.0 Concepts)

References (Version 11.0)

These links point to the relevant sections within the official Palo Alto Networks documentation for Panorama version 11.0.