Configure a Panorama Administrator with Certificate-Based Authentication for the Web Interface
Configure a Panorama Administrator with Certificate-Based Authentication for the Web Interface
html)
Table of Contents
End-of-Life (EoL)
As a more secure alternative to password-based authentication to the Panorama web interface, you can configure certificate-
based authentication for administrator accounts that are local to Panorama. Certificate-based authentication involves the
exchange and verification of a digital signature instead of a password.
Configuring certificate-based authentication for any administrator disables the username/password logins
for all administrators on Panorama and all administrators thereafter require the certificate to log in.
STEP 1 -
Generate a certificate authority (CA) certificate on Panorama.
You will use this CA certificate to sign the client certificate of each administrator.
0/pan-os-admin/certificate-management/obtain-certificates/import-a-certificate-and-private-
key) from your enterprise CA.
This site uses cookies essential to its operation, for analytics, and for personalized content and ads. By
continuing to browse this site, you acknowledge the use of cookies. Privacy statement ❯ Cookie Settings
continuing to browse this site, you acknowledge the use of cookies. Privacy statement ❯ Cookie Settings
(https://www.paloaltonetworks.com/legal-notices/privacy)
STEP 2 -
Configure a certificate profile for securing access to the web interface.
A Select Panorama > Certificate Management > Certificate Profile and click Add.
B Enter a Name for the certificate profile and set the Username Field to Subject.
C Select Add in the CA Certificates section and select the CA Certificate you just created.
STEP 3 -
Configure Panorama to use the certificate profile for authenticating administrators.
A Select the Panorama > Setup > Management and edit the Authentication Settings.
B Select the Certificate Profile you just created and click OK.
STEP 4 -
Configure the administrator accounts to use client certificate authentication.
If you have already deployed client certificates that your enterprise CA generated, skip to Step 8. Otherwise,
continue with Step 5.
STEP 5 -
Generate a client certificate for each administrator.
STEP 6 -
Export the client certificates.
This site uses cookies essential to its operation, for analytics, and for personalized content and ads. By
continuing to browse this site, you acknowledge the use of cookies. Privacy statement ❯
continuing to browse this site, you acknowledge the use of cookies. Privacy statement ❯
(https://www.paloaltonetworks.com/legal-notices/privacy)
A Export the certificates (https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/certificate-
management/export-a-certificate-and-private-key).
Panorama restarts and terminates your login session. Thereafter, administrators can access the web
interface only from client systems that have the client certificate you generated.
STEP 7 -
Import the client certificate into the client system of each administrator who will access the web interface.
STEP 8 -
Verify that administrators can access the web interface.
A Open the Panorama IP address in a browser on the computer that has the client certificate.
B When prompted, select the certificate you imported and click OK. The browser displays a certificate
warning.
D Click Login. The web interface should appear without prompting you for a username or password.
Yes No
Technical Documentation Co
(https://www.facebook.com/PaloAltoNetworks) (https://w
(https://www.youtube.com/channel/UCPRouchFt58TZnjoI65aelA)
This site uses cookies essential to its operation, for analytics, and for personalized content and ads. By
continuing to browse this site, you acknowledge the use of cookies. Privacy statement ❯