Palo Alto NGFW 10.1.7 - RADIUS Configuration - RSA Ready Implementation Guide
Originally Published: 2023-03-29
This section describes how to integrate Palo Alto NGFW with Authentication Manager using RADIUS.
Configure RSA Authentication Manager
Perform these steps to configure RSA Authentication Manager for RADIUS.
Procedure
- Log in to the RSA Security Console GUI > RADIUS > RADIUS Clients > Add new.
- Click on Save & Create Associated Agent > Save > Yes, Save Agent.
- If you are using RADIUS for Admin UI access, then if you haven’t created the specific users with their admin roles on Palo Alto or want to do authorization in general, you must configure RADIUS Profiles to return those admin roles. (You must Configure From Palo Alto Side Authentication Profile to have it to get the group from RSA).
- Go to Security Console > RADIUS > RADIUS Profiles > Add new. (Prerequisite: An Existing RADIUS Model “Palo Alto” must be in use by a RADIUS Client).
- Afterward, assign the needed values for the user group and admin role to match on Palo Alto configuration for authorization purposes.
- You can assign this profile per user, go to Identity > Users > Manage Existing > or on the Palo Alto RADIUS Client itself.
This section describes how to integrate Palo Alto NGFW with RSA Cloud Authentication Service or RSA Authentication Manager using RADIUS.
Configure Palo Alto NGFW
Perform these steps to configure Palo Alto NGFW for RADIUS.
Procedure
- Log in to the Palo Alto NGFW admin GUI > Device > RADIUS > Add.
- If you are using RSA Authentication Manager with no Cloud services using advanced authentications like Biometrics/Approve, then set the timeout to 30 seconds and retries to 1.
- If you are using RSA Cloud Authentication Services that has advanced authentications like Biometrics/Approve, then set the timeout to 60 seconds and retries to 1.
- Type the IP address of RSA Authentication Manager or Identity Router Management IP if it is Cloud Authentication.
- Sample Configuration is as per below (for RADIUS):
- Create an Authentication Profile by going to Device > Authentication Profile and associate the created RADIUS profile above to it.
- You can choose to retrieve the user groups from RSA or not, if you chose this and you have configured an allow list, then RSA must return those user groups in the DN format otherwise, Palo Alto will allow communication only if you are part of the allow list.
- You can input the user domain without having the user put it and choose the appropriate username modifier according to the need as well.
- Go to the Authentication Profile > Advanced tab, you can choose which users are permitted in this profile.
- Sample Configuration is as per below (RADIUS Authentication profile):
Configuration is complete.
Return to the main page .
Related Articles
Palo Alto NGFW 10.1.7 - SAML IDR SSO Configuration - RSA Ready Implementation Guide 26Number of Views Palo Alto NGFW Global Protect - RADIUS Configuration in Cloud Access Service- RSA Ready Implementation Guide 56Number of Views Palo Alto NGFW Global Protect - RSA Ready Implementation Guide 364Number of Views Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide 43Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?