Authentication policy enables you to authenticate end users before they can access services and applications. Whenever a user requests a service or application (such as by visiting a web page), the firewall evaluates Authentication policy. Based on the matching Authentication policy rule, the firewall then prompts the user to authenticate using one or more methods (factors), such as login and password, Voice, SMS, Push, or One-time Password (OTP) authentication . For the first factor, users authenticate through a Authentication Portal web form. For any additional factors, users authenticate through a Multi-Factor Authentication (MFA) login page.
To implement Authentication policy for GlobalProtect, refer to Configure GlobalProtect to facilitate multi-factor authentication notifications.
After the user authenticates for all factors, the firewall evaluates Security Policy to determine whether to allow access to the service or application.
To reduce the frequency of authentication challenges that interrupt the user workflow, you can specify a timeout period during which a user authenticates only for initial access to services and applications, not for subsequent access. Authentication policy integrates with Authentication Portal to record the timestamps used to evaluate the timeout and to enable user-based policies and reports.
Based on user information that the firewall collects during authentication, User-ID creates a new IP address-to-username mapping or updates the existing mapping for that user (if the mapping information has changed). The firewall generates User-ID logs to record the additions and updates. The firewall also generates an Authentication log for each request that matches an Authentication rule. If you favor centralized monitoring, you can configure reports based on User-ID or Authentication logs and forward the logs to Panorama or external services as you would for any other log types.
When configuring an Authentication policy rule, you can specify a timeout period during which a user authenticates only for initial access to services and applications, not for subsequent access. Your goal is to specify a timeout that strikes a balance between the need to secure services and applications and the need to minimize interruptions to the user workflow. When a user authenticates, the firewall records a timestamp for the first authentication challenge (factor) and a timestamp for any additional Multi-Factor Authentication (MFA) factors. When the user subsequently requests services and applications that match an Authentication rule, the firewall evaluates the timeout specified in the rule relative to each timestamp. This means the firewall reissues authentication challenges on a per-factor basis when timeouts expire. If you Redistribute User Mappings and Authentication Timestamps , all your firewalls will enforce Authentication policy timeouts consistently for all users.
The firewall records a separate timestamp for each MFA vendor. For example, if you use Duo v2 and PingID servers to issue challenges for MFA factors, the firewall records one timestamp for the response to the Duo factor and one timestamp for the response to the PingID factor.
Within the timeout period, a user who successfully authenticates for one Authentication rule can access services or applications that other rules protect. However, this portability applies only to rules that trigger the same authentication factors. For example, a user who successfully authenticates for a rule that triggers TACACS+ authentication must authenticate again for a rule that triggers SAML authentication, even if the access requests are within the timeout period for both rules.
When evaluating the timeout in each Authentication rule and the global timer defined in the Authentication Portal settings (see Configure Authentication Portal ), the firewall prompts the user to re-authenticate for whichever setting expires first. Upon re-authenticating, the firewall records new authentication timestamps for the rules and resets the time count for the Authentication Portal timer. Therefore, to enable different timeout periods for different Authentication rules, set the Authentication Portal timer to a value that is the same as or higher than the timeout in any rule.
Perform the following steps to configure Authentication policy for end users who access services through Authentication Portal. Before starting, ensure that your Security Policy allows users to access the services and URL categories that require authentication.
Before you configure an Authentication policy rule, make sure you understand that the set of IPv4 addresses is treated as a subset of the set of IPv6 addresses, as described in detail in Policy .
Configure Authentication Portal . If you use Multi-Factor Authentication (MFA) services to authenticate users, you must set the Mode to Redirect.
Configure the firewall to use one of the following services to authenticate users.
Configure an Authentication Profile and Sequence for each set of users and Authentication policy rules that require the same authentication services and settings.
Select the Type of authentication service and related settings:
Configure an authentication enforcement object.
The object associates each authentication profile with an Authentication Portal method. The method determines whether the first authentication challenge (factor) is transparent or requires a user response.
Select ObjectsAuthentication and Add an object.
Enter a Name to identify the object.
Select an Authentication Method for the authentication service Type you specified in the authentication profile:
Select the Authentication Profile you configured.
Enter the Message that the Authentication Portal web form will display to tell users how to authenticate for the first authentication factor.
Click OK to save the object.
Configure an Authentication policy rule.
Create a rule for each set of users, services, and URL categories that require the same authentication services and settings.
The firewall does not apply the Authentication Portal timeout if your authentication policy uses default authentication enforcement objects (for example, default-browser-challenge).To require users to re-authenticate after the Authentication Portal timeout, clone the rule for the default authentication object and move it before the existing rule for the default authentication object.
Select PoliciesAuthentication and Add a rule.
Enter a Name to identify the rule.
Select Source and Add specific zones and IP addresses or select Any zones or IP addresses.
The rule applies only to traffic coming from the specified IP addresses or from interfaces in the specified zones .
Select User and select or Add the source users and user groups to which the rule applies (default is any).
Select or Add the Host Information Profiles to which the rule applies (default is any).
Select Destination and Add specific zones and IP addresses or select any zones or IP addresses.
The IP addresses can be resources (such as servers) for which you want to control access.
Select Service/URL Category and select or Add the services and service groups for which the rule controls access (default is service-http).
Select or Add the URL Categories for which the rule controls access (default is any). For example, you can create a custom URL category that specifies your most sensitive internal sites.
Select Actions and select the Authentication Enforcement object you created.
Specify the Timeout period in minutes (default 60) during which the firewall prompts the user to authenticate only once for repeated access to services and applications.
Timeout is a tradeoff between tighter security (less time between authentication prompts) and the user experience (more time between authentication prompts). More frequent authentication is often the right choice for access to critical systems and sensitive areas such as a data center. Less frequent authentication is often the right choice at the network perimeter and for businesses for which the user experience is key.
Click OK to save the rule.
(MFA only) Customize the MFA login page.
The firewall displays this page so that users can authenticate for any additional MFA factors.
Verify that the firewall enforces Authentication policy.
Log in to your network as one of the source users specified in an Authentication policy rule.
Request a service or URL category that matches one specified in the rule.
The firewall displays the Authentication Portal web form for the first authentication factor. For example:
If you configured the firewall to use one or more MFA services, authenticate for the additional authentication factors.
End the session for the service or URL you just accessed.
Start a new session for the same service or application. Be sure to perform this step within the Timeout period you configured in the Authentication rule.
The firewall allows access without re-authenticating.
Wait until the Timeout period expires and request the same service or application.
The firewall prompts you to re-authenticate.
(Optional) Redistribute Data and Authentication Timestamps to other firewalls that enforce Authentication policy to ensure they all apply the timeouts consistently for all users.
When users fail to authenticate to a Palo Alto Networks firewall or Panorama, or the Authentication process takes longer than expected, analyzing authentication-related information can help you determine whether the failure or delay resulted from:
The following CLI commands display information that can help you troubleshoot these issues:
Task | Command |
---|---|
Display the number of locked user accounts associated with the authentication profile (auth-profile), authentication sequence (is-seq), or virtual system (vsys).
To unlock users, use the following operational command: > request authentication [unlock-admin | unlock-user] |
PA-220> show authentication locked-users
{ vsys | auth-profile | is-seq {yes | no} {auth-profile | vsys} } |
Use the debug authentication command to troubleshoot authentication events.
Use the show options to display authentication request statistics and the current debugging level: - show displays the current debugging level for the authentication service (authd). - show-active-requests displays the number of active checks for authentication requests, allow lists, locked user accounts, and Multi-Factor Authentication (MFA) requests. - show-pending-requests displays the number of pending checks for authentication requests, allow lists, locked user accounts, and MFA requests. - connection-show displays authentication request and response statistics for all authentication servers or for a specific protocol type. Use the connection-debug options to enable or disable authentication debugging: - Use the on option to enable or the off option to disable debugging for authd. - Use the connection-debug-on option to enable or the connection-debug-off option to disable debugging for all authentication servers or for a specific protocol type. |
PA-220> debug authentication
{ on {debug | dump | error | info | warn} | show | show-active-requests | show-pending-requests | connection-show | { connection-id | protocol-type { Kerberos connection-id | LDAP connection-id | RADIUS connection-id | TACACS+ connection-id | } connection-debug-on | { connection-id | debug-prefix | protocol-type { Kerberos connection-id | LDAP connection-id | RADIUS connection-id | TACACS+ connection-id | } connection-debug-off | { connection-id | protocol-type { Kerberos connection-id | LDAP connection-id | RADIUS connection-id | TACACS+ connection-id | } connection-debug-on } |
Test the connection and validity of the certificate profile . | PA-220> test authentication authentication-profile auth-profile username password |
Troubleshoot a specific authentication using the Authentication ID displayed in MonitorLogsAuthentication. | PA-220> grep |