Palo Alto NGFW - RSA Ready Implementation Guide
a day ago
Originally Published: 2023-03-29

Certified: December 25, 2025

    

Solution Summary

This article describes Palo Alto NGFW integration with RSA ID Plus. Use this information to determine which use case and integration type your deployment will employ. The supported use cases are Global Protect, Captive Portal, and Admin UI authentication.
     

Use Case

Palo Alto NGFW can be integrated with RSA, depending on the use case, using RADIUS, SAML My Page SSO, IDR SSO, SAML Relying Party, and RSA MFA API (REST). When integrated, users must authenticate with RSA to access the applied Palo Alto use case.
      

Integration Types 

RSA MFA API (REST) integrations can provide a rich user interface with all RSA ID Plus features within the partner application. Refer to the Supported Features section in this article to see which features this partner application has implemented.

RADIUS integrations provide a text-driven interface for RSA within Palo Alto NGFW. RADIUS provides support for most RSA authentication methods and flows.

Relying Party integrations use SAML 2.0 to direct users’ web browsers to CAS for authentication. With Relying Party integration, CAS can manage either additional authentication only or both primary authentication (for example, user ID and password) and additional authentication, depending on the service provider's capability.

SSO integrations use SAML 2.0 or HFED technologies to direct users' web browsers to Cloud Access Service (CAS) for authentication. SSO provides Single Sign-On using the IDR My Applications/My Page Portal. My Page SSO provides Single-Sign-On to Palo Alto NGFW users leveraging the RSA self-service portal, My Page. 

       

Existing SSO integrations using IDR My Applications continue to be supported and will be listed in this document as applicable.
Note: RSA will continue to maintain existing SAML SSO integrations using IDR My Applications. At a to-be-determined future date, RSA will announce the end-of-life (EOL) date for the SAML SSO support with the IDR. For more information Available Now: My Page SSO Enhancements.

                   

Supported Features 

This section shows all the supported features by integration type and by RSA components. Use this information to determine which integration type and RSA component your deployment will use. The next section in this guide contains the instruction steps for how to integrate RSA with Palo Alto NGFW using each integration type. 
    

Palo Alto NGFW with CAS

Authentication MethodsRSA MFA API (REST)RADIUSRelying PartySSO
Approve
LDAP Password--
SecurID OTP-
Authenticate OTP
Device Biometrics-
SMS OTP-
Voice OTP-
FIDO Security Key--
QR Code--
Emergency Access Code-

    

Palo Alto NGFW Integration with RSA Authentication Manager (AM)

Authentication MethodsRSA MFA API (REST)RADIUSAuthentication Agent
RSA SecurID--
On Demand Authentication---
Risk-Based Authentication---

 

Supported
-Not supported
n/tNot yet tested or documented, but may be possible
n/aNot applicable

    

Configuration Summary

This section contains instruction steps that show how to integrate Palo Alto NGFW with RSA using all of the integration types.
This document is not intended to suggest optimum installations or configurations. It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products to install the required components.
All RSA and Palo Alto NGFW components must be installed and working prior to the integration.
This section of the guide includes links to the appropriate sections for configuring both sides for each use case.
   

Integration Configuration

CAS

Global Protect

         

Captive Portal

  

Admin UI

      

AM

Global Protect

  

Admin UI

      

References

                 

        RSA Terminology Changes

        The following table describes the differences in the terminologies used in the different versions of RSA products and components. 

        Previous VersionNew VersionExamples/Comments
        Cloud Authentication ServiceCloud Access Service
        Token

        OTP CredentialSecurID OTP Credential
        AuthenticatorHardware Authenticator
        Tokencode

        OTPSecurID OTP, SMS OTP, Voice OTP
        Access CodeEmergency Access Code
        SecurID Authenticate appRSA Authenticator appRSA Authenticator app for iOS and Android, RSA Authenticator app for Windows
        DeviceAuthenticatorRegister an authenticator
        Company IDOrganization ID 
        AccountCredential 
        Device Serial NumberBinding ID 

                

        Certification Details

        CAS

        AM 8.7 Patch 1, Virtual Appliance or later

        Palo Alto NGFW 11.1.10
              

        Known Issues

        Multi-Factor Authentication (REST API) Authentication Methods.
        Palo Alto NGFW supports Authenticate Approve and Authenticate OTP authentication methods only. When you select an RSA assurance policy you must ensure that one or both methods will be available at the specified assurance level, or the user will not be able to authenticate.

        Configuration for Authentication Manager to have LDAP + Passcode.
        Palo Alto, in the Configuration used to enable LDAP on Portal and RADIUS in Gateway, in some versions, Palo Alto sends the LDAP password to the RSA AM in the RADIUS request as an extra packet + what it sends to the LDAP server, so you will get Passcode Format Error followed by succeeded after RADIUS is completed. It should not lock users, as there are no consecutive rejects if the RADIUS timeout is configured correctly.

        FIDO Authentication Not Working with Global Protect Embedded Browser.
        Palo Alto Global Protect VPN Client does not support FIDO using its own embedded browser; you must follow this Section to use your OS default web browser instead. You can also check this KB for further setup and scenarios.

        https://docs.paloaltonetworks.com/globalprotect/5-2/globalprotect-app-new-features/new-features-released-in-gp-app/default-browser-for-saml-authentication