Skip to main content
Skip table of contents

Palo Alto SSL-VPN RADIUS Integration

This document explains how to implement Monosign with Palo Alto VPN. Before you continue, it is better to start with Palo Alto’s Radius documentation.

Monofor has no responsibility to do Palo Alto configurations. If you need support please contact Palo Alto Support Services.

📑 Instructions

This documentation contains 5 main steps for integration.

  1. Creating an Application on Monosign

  2. Configuration Radius for Palo Alto

  3. Assign a user to the Palo Alto application

  4. Sign In Test

  5. Additional Configuration

1- Creating an Application on Monosign

Create application on Monosign and configure your access policy. Once you create, click “Keys” and add a new Access Key for Radius Key for access.

This information will be necessary during the configuration of the Palo Alto application.

Property

Value

Options

Key Type

RADIUS

Rest API, OAuth 2.0, JWT, OIDC/OpenID, SAML, RADIUS, Access Gateway, LDAP, AuthN/Z Server

Expiration

Lifetime

Lifetime or Specific Date/Time - By Default Lifetime is Enabled.

Configuration details for the Palo Alto application are provided as follows:

Property

Value

Description

NAS-Identifier

Monosign-Radius-Auth-Profile

Palo Alto Networks devices use the Authentication Profile name as the NAS-Identifier in RADIUS requests

NAS-IP

192.168.50.120

NAS-IP of the Palo Alto Networks devices.

Shared Secret

secret

Shared secret it will configure on the Palo Alto Networks devices.

image-20240912-062600.png

To ensure that the application has access to user groups, follow these steps:

  1. If the application hasn't been configured yet, click the “Edit” option for the application.

  2. In the application settings, navigate to the “Source, Provider, and Profile” tab.

  3. Configure the “User Access Type“ and “User Group Access Type” as “Only Assigned Users.”

Configuring this setting will allow the application to access by user groups when users sign in.

Property

Description

Options

User Access Type

Defines which Users will access to this application.

Only Assigned Users
All Users

User Group Access Type

Defines application’s user group access

Only Assigned Users
Assigned Users and Defined Sources
All Users

Profile Access Type

Defines Application’s user’s profile access

Restricted - Only restricted user profile attributes
All - All user profile attributes

2- Configuration RADIUS for Palo Alto SSL-VPN

As it highlighted at the beginning of document, please check out the Palo Alto’s RADIUS configuration page first.

Please add your RADIUS settings to the application. The following information is needed for your configuration.

a. RADIUS Server Profile

Go to Device → Server Profiles → RADIUS on the Palo Alto Network devices management UI.

Click Add.

image-20240912-072507.png

Fill below values

Property

Value

Description

Profile Name

Monosign-Radius-Server

Name of the Radius Profile.

Timeout

120

Radius Timeout

Retries

3

Authentication Protocol

PAP

Monosign Radius Server only support PAP

In the servers provide below values

Property

Value

Description

NAME

monosign-server

Name of the Radius Server

RADIUS SERVER

radius.monofor.com

Monosign Radius Server FQDN or IP Address

SECRET

secret

Shared secret which is already configured in the Monosign Application Radius Key.

PORT

1812

Monosign Radius Server only support PAP

image-20240912-070148.png

Click OK.

b. Authentication Profile

Go to Device → Authentication Profile on the Palo Alto Network devices management UI.

Click Add.

image-20240912-072353.png

Fill below values

General

Property

Value

Description

Name

Monosign-Radius-Auth-Profile

This name used as a NAS-Identifier

Authentication

Property

Value

Description

Type

RADIUS

Server Profile

Monosign-Radius-Server

Advanced

Property

Value

Description

Allow List

all

image-20240912-073411.png

Authentication Profile - Authentication

image-20240912-073509.png

Authentication Profile - Advanced

Click OK.

This Authentication Profile can be assign to the GlobalProtect Gateway and Portal.

c. GlobalProtect Configuration

Go to Network → GlobalProtect → Portals Open existing portal configuration and edit Authentication on the Palo Alto Network devices management UI.

image-20240912-074601.png

image-20240912-075055.png

Click Ok

Go to Network → GlobalProtect → Gateways Open existing gateway configuration and edit Authentication on the Palo Alto Network devices management UI.

image-20240912-074917.png

image-20240912-075027.png

Click Commit on Palo Alto Network devices management UI to apply all changes.

Now, go back to Monosign and give access to your users and try login.

3- Assign a user to the Palo Alto application

Please follow below instructions on how to assign a user to the Palo Alto application. In this example john.smith will assign to the application access.

4- Sign In Test

Now try login. Navigate to the Palo Alto Global Protect Portal. Type Username and Password then click login.

a. Palo Alto GlobalProtect Portal

Monofor Identity

If everything is well configured user will get Push notification on mobile device then approve notification will successfully login to Palo Alto GlobalProtect Portal.

PaloAlto-GP-Radius-MonoforIdentitiy.gif

Google Authenticator

If everything is well configured user will get secondary password prompt after username password input. Then user will successfully login to Palo Alto GlobalProtect Portal.

PaloAlto-GP-Portal-Radius-GoogleAuth.gif

b. Palo Alto GlobalProtect Client

Monofor Identity

If everything is well configured user will get two(2) Push notification on mobile device then approve notifications will successfully login to Palo Alto GlobalProtect Client.

PaloAlto-GP-Client-mac-Radius-MonoforIdentitiy.gif

Google Authenticator

If everything is well configured user will get secondary password prompt two(2) times after username password input. Then user will successfully login to Palo Alto GlobalProtect Client.

PaloAlto-GP-Client-mac-Radius-GoogleAuth.gif

5- Additional Configuration

Palo Alto GlobalProtect Client connections authenticate user twice. This is normal behavior and this behavior is commonly hidden to the end user when using simple user/password authentication. But If RADIUS enabled after user entered username/password MFA option will prompted twice.

By default, the GP client caches the credentials entered by the user. When the user is prompted to authenticate to the Portal, the client stores these credentials and uses them when authentication to the Gateway is required. In cases where the Gateway employs the same authentication method (which is common), the user will be connected to the Gateway without being prompted for credentials again. However, in the background, a second authentication process does indeed occur. For more details please follow this link.

Palo Alto giving a solution for this behavior. GlobalProctect provide option about Authentication Override for this kind of situation.

GlobalProtect offers the option to generate an authentication cookie once the user has successfully authenticated. This cookie is stored on the user's computer and has a configurable lifespan. The purpose of this cookie is to authenticate the user using the cookie itself, rather than the authentication method configured for GlobalProtect. The process should follow these steps:

  1. Configure the GP Portal to generate an authentication cookie with a lifespan of 1 minute. (Ensure that only the generation of the cookie is enabled, without enabling the acceptance of the authentication cookie.)

  2. Configure the GP Gateway to accept the authentication cookie, without enabling its generation.

Below steps must be done by Palo Alto Experts.

a. Configure GP Portal

Go to Network → GlobalProtect → Portals → Portal Config → Agent → Agent Config → Authentication

Select Generate cookie for authentication override and Certificate to Encrypt/Decrypt Cookie

image-20240913-073056.png

b. Configure GP Gateway

Go to Network → GlobalProtect → Gateways → Gateway Config → Agent → Client Settings → Client Settings Config → Authentication Override

Select Accept cookie for authentication override, Cookie Lifetime 1 Min and Certificate to Encrypt/Decrypt Cookie

image-20240913-073314.png

Submit changes to apply on Palo Alto Devices.

Now MFA prompt will work only once.

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.