Skip to main content
Skip table of contents

Palo Alto Administrator Access RADIUS Integration

This document explains how to implement Monosign with Palo Alto Administrator Access. Before you continue, it is better to start with Palo Alto’s Radius documentation.

Monofor has no responsibility to do Palo Alto configurations. If you need support please contact Palo Alto Support Services.

📑 Instructions

This documentation contains 5 main steps for integration.

  1. Creating an Application on Monosign

  2. Configuration Radius for Palo Alto

  3. Assign a user to the Palo Alto application

  4. Sign In Test

1- Creating an Application on Monosign

Create application on Monosign and configure your access policy. Once you create, click “Keys” and add a new Access Key for Radius Key for access.

This information will be necessary during the configuration of the Palo Alto application.

Property

Value

Options

Key Type

RADIUS

Rest API, OAuth 2.0, JWT, OIDC/OpenID, SAML, RADIUS, Access Gateway, LDAP, AuthN/Z Server

Expiration

Lifetime

Lifetime or Specific Date/Time - By Default Lifetime is Enabled.

Configuration details for the Palo Alto application are provided as follows:

Property

Value

Description

NAS-Identifier

Monosign-Radius-Auth-Profile

Palo Alto Networks devices use the Authentication Profile name as the NAS-Identifier in RADIUS requests

NAS-IP

192.168.50.120

NAS-IP of the Palo Alto Networks devices.

Shared Secret

secret

Shared secret it will configure on the Palo Alto Networks devices.

image-20240912-062600.png

To ensure that the application has access to user groups, follow these steps:

  1. If the application hasn't been configured yet, click the “Edit” option for the application.

  2. In the application settings, navigate to the “Source, Provider, and Profile” tab.

  3. Configure the “User Access Type“ and “User Group Access Type” as “Only Assigned Users.”

Configuring this setting will allow the application to access by user groups when users sign in.

Property

Description

Options

User Access Type

Defines which Users will access to this application.

Only Assigned Users
All Users

User Group Access Type

Defines application’s user group access

Only Assigned Users
Assigned Users and Defined Sources
All Users

Profile Access Type

Defines Application’s user’s profile access

Restricted - Only restricted user profile attributes
All - All user profile attributes

2- Configuration RADIUS for Palo Alto SSL-VPN

As it highlighted at the beginning of document, please check out the Palo Alto’s RADIUS configuration page first.

Please add your RADIUS settings to the application. The following information is needed for your configuration.

a. RADIUS Server Profile

Go to Device → Server Profiles → RADIUS on the Palo Alto Network devices management UI.

Click Add.

image-20240912-072507.png

Fill below values

Property

Value

Description

Profile Name

Monosign-Radius-Server

Name of the Radius Profile.

Timeout

120

Radius Timeout

Retries

3

 

Authentication Protocol

PAP

Monosign Radius Server only support PAP

In the servers provide below values

Property

Value

Description

NAME

monosign-server

Name of the Radius Server

RADIUS SERVER

radius.monofor.com

Monosign Radius Server FQDN or IP Address

SECRET

secret

Shared secret which is already configured in the Monosign Application Radius Key.

PORT

1812

Monosign Radius Server only support PAP

image-20240912-070148.png

Click OK.

b. Authentication Profile

Go to Device → Authentication Profile on the Palo Alto Network devices management UI.

Click Add.

image-20240912-072353.png

Fill below values

General

Property

Value

Description

Name

Monosign-Radius-Auth-Profile

This name used as a NAS-Identifier

Authentication

Property

Value

Description

Type

RADIUS

 

Server Profile

Monosign-Radius-Server

 

Advanced

Property

Value

Description

Allow List

all

 

image-20240912-073411.png

Authentication Profile - Authentication

image-20240912-073509.png

Authentication Profile - Advanced

Click OK.

c. Changing the Authentication Method

Two methods can be used for authentication.

User Base

Go to your firewall admin page and click Device → Administrators → Add

If you want to change the existing user authentication profile, click the username on the firewall and change Authentication Profile.

Global Authentication

After the Radius configuration, authentication can be changed globally in the device configuration.

Go to Palo Alto admin web GUI and click Device → Setup → Management → Authentication Settings and choose the Radius profile created in the previous steps.

Click OK, then Commit to save the changes.

3- Assign a user to the Palo Alto application

Please follow below instructions on how to assign a user to the Palo Alto application. In this example john.smith will assign to the application access.

4- Sign In Test

It’s done. Now you can test to log in to your Palo Alto firewall via Web GUI.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.