1. Overview of Captive Portal Authentication
Captive Portal is a feature on Palo Alto Networks firewalls that prompts users to authenticate before granting access to network resources. When a user's traffic matches an Authentication Policy rule, the firewall intercepts the request and redirects the user to an authentication page. Upon successful authentication, the user's IP address is mapped to their username, enabling user-based policy enforcement.
2. Authentication Methods
The Captive Portal supports various authentication methods:
-
Web Form:
Users enter credentials into a web form. Supports integration with LDAP, RADIUS, TACACS+, SAML, and local user databases.
-
Kerberos SSO:
Enables single sign-on by obtaining user credentials from the browser. Requires a Kerberos infrastructure.
-
Client Certificate:
Authenticates users based on client certificates installed on their devices.
For more details, refer to the
Captive Portal Authentication Methods
documentation.
4. Constructing an Authentication Policy
To implement Captive Portal authentication, follow these steps:
-
Configure Authentication Profiles:
Define how the firewall authenticates users, specifying the authentication method and server profiles.
-
Create Authentication Enforcement Objects:
Associate authentication profiles with specific methods (e.g., web-form, browser-challenge).
-
Set Up Captive Portal:
Enable Captive Portal on the desired interfaces and specify the redirect host and SSL/TLS service profile.
-
Define Authentication Policy Rules:
Specify the source and destination zones, users, services, and the associated authentication enforcement object.
Detailed configuration steps are available in the
Configure Authentication Policy
documentation.