This article presents information about:
- Supported Okta features
- Configure Okta
- Configure the Palo Alto VPN device
- Test the connection
- End-user experience
- Additional resources
A version of this document exists on Okta's help portal.
Okta and Palo Alto virtual VPN devices interoperate through the Okta RADIUS Agent. The agent essentially translates the RADIUS authentication requests from the VPN device into Okta API calls.
How Palo Alto VPN works at a high level: For each GlobalProject gateway, one or more authentication providers can be assigned. Each authentication provides a map to an authentication server profile, such as RADIUS, TACAS+, or LDAP.
NOTE: This guide uses a Palo Alto VM-series device, a virtual form factor. The interfaces should be consistent, but Okta cannot guarantee Palo Alto VM products.
Supported Okta Features
|
Authentication with Okta Credentials via RADIUS |
Yes |
|
|
Authentication with Okta Credentials via SAML |
No |
Palo Alto VPN does not support SAML. |
|
Multi-Factor Authentication via RADIUS |
Yes |
Test utility fails, but the client succeeds. |
|
Multi-Factor Authentication via SAML |
No |
Palo Alto VPN does not support SAML. |
|
Group memberships/Attributes via RADIUS |
No |
|
- RADIUS Integrations
- Palo Alto VPN
- Multi-Factor Authentication (MFA)
- Okta Identity Engine (OIE)
- Okta Classic Engine
-
Configure Okta
Download and install the RADIUS agent as described in Installing the Okta RADIUS Agent.
-
Configure the Palo Alto VPN Device
-
Process Overview:
-
-
-
- Set up a RADIUS Server Profile to point to the Okta RADIUS Agent.
- Create an Okta Authentication Provider that uses the RADIUS Server Profile.
- Configure the GlobalProtect Gateway to use the Authentication Provider for login.
-
-
Procedure:
- Log in to the Palo Alto Admin interface as a user with admin rights.
- Go to Device > Server Profiles > RADIUS to create a RADIUS Server Profile.
- Click Add.
- Enter the information specific to the Okta RADIUS Agent, including the server IP or FQDN, shared secret, and port.
- Click OK.
- Go to Device > Authentication Profile to create one.
- Click Add.
- Enter a Name for the profile.
- Select RADIUS as the type, and select the RADIUS Server Profile that was created above.
- Uncheck "Retrieve user group from RADIUS."
- Leave defaults for the remainder of this screen.
- Click the Advanced tab.
- Add the groups that should have access, or add the "All" group.
- Click OK.
- Go to Network > Gateways to link the Authentication Profile to the GlobalProject Gateway.
- Select the Gateway that supports Okta RADIUS Authentication.
- Click the General tab.
- Change the Authentication Profile to the Okta RADIUS profile that was just created.
-
Test the configuration
Palo Alto provides an authentication test command.
- Log in to a terminal or SSH client such as Putty.
- SSH into the Palo Alto CLI as admin.
- Run the following command:
test authentication authentication-profile "authentication profile name" username <username> password
Successful command output:
NOTE: Palo Alto attempts CHAP first, then falls back to PAP. This is hardcoded - the integration should work just fine.
-
Multi-Factor Authentication with Palo Alto VPN
To turn on MFA for the RADIUS agent, use the Okta Sign-On Policy.
- In the Okta Admin UI, go to Security > Policies > Okta Sign-On Policy.
- Using the steps outlined in Configuring Sign-On Policies, create a policy with a rule that enforces MFA for RADIUS authentications.
-
End-user experience
- End-user experience: single-factor authentication
- Launch GlobalConnect.
- Select File > Connect.
- Enter the Okta username and password.
- Click Logon.
- End-user experience - Multi-Factor Authentication
- Launch GlobalConnect.
- Enter the Okta username and password.
- Click Logon.
-
Answer the request for a second authentication factor. This menu is dependent on the MFA factors that the end-user has selected (not which ones are active in the org.)
-
Perform the action associated with the MFA action chosen.
