Integration Guide: Safenet Authentication Manager
Integration Guide: Safenet Authentication Manager
Integration Guide: Safenet Authentication Manager
Integration Guide
SAM using RADIUS Protocol with Palo Alto
GlobalProtect
Trademarks
All intellectual property is protected by copyright. All trademarks and product names used or referred to are the
copyright of their respective owners. No part of this document may be reproduced, stored in a retrieval system
or transmitted in any form or by any means, electronic, mechanical, chemical, photocopy, recording, or
otherwise, without the prior written permission of SafeNet, Inc.
Disclaimer
SafeNet makes no representations or warranties with respect to the contents of this document and specifically
disclaims any implied warranties of merchantability or fitness for any particular purpose. Furthermore, SafeNet
reserves the right to revise this publication and to make changes from time to time in the content hereof without
the obligation upon SafeNet to notify any person or organization of any such revisions or changes.
We have attempted to make these documents complete, accurate, and useful, but we cannot guarantee them to
be perfect. When we discover errors or omissions, or they are brought to our attention, we endeavor to correct
them in succeeding releases of the product.
SafeNet invites constructive comments on the contents of this document. These comments, together with your
personal and/or company details, should be sent to the address or email below.
Email [email protected]
Contents
Third-Party Software Acknowledgement ............................................................................................................... 4
Description............................................................................................................................................................. 4
Applicability............................................................................................................................................................ 4
Environment .......................................................................................................................................................... 4
Audience................................................................................................................................................................ 5
RADIUS-based Authentication using SAM ........................................................................................................... 5
RADIUS Authentication Flow using SAM .............................................................................................................. 5
RADIUS Prerequisites ........................................................................................................................................... 6
Configuring SafeNet Authentication Manager ....................................................................................................... 6
Synchronizing Users Stores to SafeNet Authentication Manager .................................................................. 6
Configuring SAM’s Connector for OTP Authentication ................................................................................... 7
Token Assignment in SAM ............................................................................................................................. 8
Adding Palo Alto GlobalProtect as a RADIUS Client in IAS/NPS .................................................................. 8
SAM’s OTP Plug-In for Microsoft RADIUS Client Configuration .................................................................. 10
Configuring Third Party Product .......................................................................................................................... 11
Configuring an Authentication Profile ............................................................ Error! Bookmark not defined.
Configuring Global Protect Gateway ............................................................. Error! Bookmark not defined.
Running the Solution ............................................................................................ Error! Bookmark not defined.
Support Contacts ................................................................................................................................................. 11
Description
SafeNet Authentication Manager (SAM) is a versatile authentication solution that allows you to match the
authentication method and form factor to your functional, security, and compliance requirements. Use this
innovative management service to handle all authentication requests and to manage the token lifecycle.
The Palo Alto GlobalProtect is a platform that safely enables applications, users, and content in your enterprise
branch offices. Dedicated computing resources for the functional areas of networking, security, content
inspection, and management ensure predictable firewall performance.
This document describes how to:
Deploy multi-factor authentication (MFA) options in Palo Alto GlobalProtect using SafeNet OTP tokens
managed by SafeNet Authentication Manager.
Configure Palo Alto GlobalProtect to work with SafeNet Authentication Manager in RADIUS mode.
It is assumed that the Palo Alto GlobalProtect environment is already configured and working with static
passwords prior to implementing multi-factor authentication using SafeNet Authentication Manager and that the
SafeNet Authentication Manager OTP plug-in for Microsoft RADIUS Client was installed as part of the simplified
installation mode of SAM. For more information on SafeNet Authentication Manager installation modes, refer to
SafeNet Authentication Manager 8.2 Administrator’s Guide.
Palo Alto GlobalProtect can be configured to support multi-factor authentication in several modes. The RADIUS
protocol will be used for the purpose of working with SafeNet Authentication Manager.
Applicability
The information in this document applies to:
SafeNet Authentication Manager - A server version of SAM that is used to deploy the solution on-
premises in the organization.
Environment
The integration environment that was used in this document is based on the following software versions:
SafeNet Authentication Manager 8.2 HF 539- A server version of SAM that is used to deploy the
solution on-premises in the organization.
Palo Alto GlobalProtect – version 6.0.3
RADIUS Protocol
Palo Alto
GlobalProtect IAS/NPS RADIUS with OTP Plug-in
SafeNet Authentication Manger
For more information on how to install and configure the SafeNet OTP plug-in for Microsoft RADIUS Client, refer
to SafeNet Authentication Manager 8.2 Administrator`s Guide.
4
GlobalProtect 3
NOTE: This document assumes that IAS/NPS policies are already configured
and working with static passwords prior to implementing multi-factor
authentication using SafeNet Authentication Manager.
The details below refer to NPS, and are very similar to IAS.
(The screen image above is from Microsoft® software. Trademarks are the property of their respective owners.)
3. On the New RADIUS Client window, complete the following fields on the Settings tab:
Address (IP or DNS) Enter the IP address or DNS of Palo Alto GlobalProtect.
Shared secret Enter the shared secret for the RADIUS client.
The value must be the same when configuring the RADIUS server in Palo Alto
GlobalProtect.
4. Click OK.
Palo Alto GlobalProtect is added as a RADIUS client in NPS.
(The screen image above is from Palo Alto Networks – GlobalProtect. Trademarks are the property of their respective owners.)
3. In the left pane, click Server Profile > RADIUS.
(The screen image above is from Palo Alto Networks – GlobalProtect. Trademarks are the property of their respective owners.)
SafeNet Authentication Manager: Integration Guide 11
SAM using RADIUS Protocol with
Document PN: 007-012719-001, Rev A., Copyright © 2014 SafeNet, Inc., All rights reserved.
4. In the right pane, click on Add at the bottom of the screen.
5. On the RADIUS Server Profile window, enter the following:
(The screen image above is from Palo Alto Networks – GlobalProtect. Trademarks are the property of their respective owners.)
6. Click OK.
(The screen image above is from Palo Alto Networks – GlobalProtect. Trademarks are the property of their respective owners.)
3. In the right pane, click on Add at the bottom of the screen.
4. On the Authentication Profile window, enter the following:
(The screen image above is from Palo Alto Networks – GlobalProtect. Trademarks are the property of their respective owners.)
5. Click on OK button.
(The screen image above is from Palo Alto Networks – GlobalProtect. Trademarks are the property of their respective owners.)
3. On the left pane, click GlobalProtect -> Gateways.
(The screen image above is from Palo Alto Networks – GlobalProtect. Trademarks are the property of their respective owners.)
4. Click on the gateway you created previously (it is assumed that you have a portal configured with
username/password authentication).
Click the General tab. Under Authentication section, in the Authentication Profile field, select the
authentication profile you created in the “
1. A user opens the GlobalProtect client, and then clicks File Connect.
(The screen image above is from Palo Alto Networks – GlobalProtect software. Trademarks are the property of their respective
owners.)
2. The user enters his LDAP credentials in the GlobalProtect Portal Authentication window and clicks the
Apply button.
(The screen image above is from Palo Alto Networks – GlobalProtect software. Trademarks are the property of their respective
owners.)
(The screen image above is from Palo Alto Networks – GlobalProtect software. Trademarks are the property of their respective
owners.)
4. The user clicks OK. The user is now connected to the VPN.
International 1-410-931-7520