Mirket Help Center
  • Mirket Help Center
    • End User License Agreement
    • Privacy Policy
    • Mirket On Premise
      • Mirket Installation
        • Mirket MFA Installation Requirements
        • Mirket Installation Steps
      • Mirket Admin Panel
        • Dashboard
        • Admin Accounts Configuration
        • User Management
          • Local Users Configuration
          • Local Group Configuration
          • Ldap Users
          • LDAP Group Configuration
        • Rules
          • Radius Rules
            • Radius Clients
            • Radius Rules
            • Authorization Profiles
          • RDP Rules
          • OWA Rules
          • API Rules
            • API Docs
        • Providers
          • Approve / Deny
          • Mirket OTP
          • TOTP
          • SMS Providers
          • Pauth
          • Pauth or Approve/Deny
          • Bypass
        • Logging
          • Radius Logging
          • RDP Logging
          • OWA Logging
          • API Logging
        • Reports
        • Settings
          • General Settings
          • Syslog Settings
          • Notification Settings
          • License
        • Mirket Upgrade Process
      • Mirket Agents
        • Mirket RDP Agent
        • Mirket OWA Agent
      • Mirket MFA App
      • Integrations
        • Array Networks SSL VPN Integration
        • Barracuda CloudGen Firewall Integration
        • Citrix Integration
        • Cisco ASA Integration
        • Cisco ISE RADIUS Integration
        • Checkpoint SSL VPN Integration
        • CyberArk Integration
        • Dell SonicWall Network Security Appliance Integration
        • Fortigate MFA for admin accounts
        • Fortigate SSL VPN Integration
        • F5 integration
        • Ivanti Pulse Secure Connect Integration
        • Palo Alto MFA for admin accounts
        • Palo Alto SSL VPN Integration
        • Sophos SSL VPN Integration
        • Watchguard SSL VPN Integration
        • Ubuntu Server 22.0.4 SSH connections
        • XLOG Integration
        • VMware Horizon 8 RADIUS Integration
      • Knowledge Base
        • User not found on logs even user exist
        • Global Protect authentication happened two time while using RADIUS
        • User is not withdrawn from LDAP.
        • Fortigate SSL VPN timeout
        • Provider not found error
        • How to install SSL certificate to Mirket
        • Can a Palo Alto be set up to forward client IP addresses to Mirket?
        • SMS not sent to the phone number
      • Release Notes
        • Mirket Version 4.1.2
        • Mirket Version 4.0.6
        • Mirket Version 4.0.0
        • Mirket Version 3.9.2
    • Mirket SAAS Platform
      • Mirket Gateways Installation Requirements
      • Mirket Portal
        • Dashboard
        • Administration
        • Users
          • LDAP Users
          • Local Users
        • Groups
        • External Sources
        • Authentication
          • Radius Rules
          • Proxy Rules
          • OWA Rules
          • ADFS
            • ADFS Management
            • ADFS Agent
          • Custom API
          • OS Logon
            • OS Logon Management
            • OS Logon Agent
        • User Portal
          • User Portal Management
          • User Portal Login Page
          • User Portal Dashboard
        • Connector
          • Radius Gateways
          • LDAP Gateways
          • Proxy Gateways
        • SMS Providers
        • Settings
          • General Settings
          • Syslog
          • Attribute Profiles
      • Monitor
        • Audit Logs
        • Radius Logs
        • Proxy Logs
        • OWA Logs
        • User Portal
        • ADFS Logs
        • OS Logon Logs
      • Mirket Mobile App
      • Integrations
        • Array Networks SSL VPN Integration
        • Barracuda CloudGen Firewall Integration
        • Citrix Integration
        • Cisco ASA Integration
        • Cisco ISE RADIUS Integration
        • Checkpoint SSL VPN Integration
        • CyberArk Integration
        • Dell SonicWall Network Security Appliance Integration
        • Fortigate MFA for admin accounts
        • Fortigate SSL VPN Integration
        • F5 integration
        • Ivanti Pulse Secure Connect Integration
        • Palo Alto MFA for admin accounts
        • Palo Alto SSL VPN Integration
        • Sophos SSL VPN Integration
        • Watchguard SSL VPN Integration
        • Ubuntu Server 22.0.4 SSH connections
        • XLOG Integration
        • VMware Horizon 8 RADIUS Integration
      • Knowledge Base
      • Release Notes
Powered by GitBook
On this page
  • General Overview
  • Preparation Steps
  • Configuring Palo Alto
  • RADIUS Service Configuration
  • Authentication Profile Configuration
  • GlobalProtect Portal Configuration
  • GlobalProtect Gateway Configuration
  • Configure Mirket
  • Add a Palo Alto as Resource in Mirket with Mirket Radius Gateway
  • User and Group configuration on Mirket
  • Add a Radius Rules to Mirket
  • Test the Integration
  1. Mirket Help Center
  2. Mirket On Premise
  3. Integrations

Palo Alto SSL VPN Integration

PreviousPalo Alto MFA for admin accountsNextSophos SSL VPN Integration

Last updated 1 month ago

Palo Alto Networks GlobalProtect Integration

General Overview

This guide explains the instructions on configuring Mirket multi-factor authentication for Palo Alto Networks GlobalProtect. Prior configuration and deployment of GlobalProtect are required before setting up MFA with Mirket.

Preparation Steps

Before proceeding with these procedures, ensure the following:

  • You've completed the installation and configuration of the Mirket (go to Mirket Installation Steps).

  • You've completed the initial setup (included vpn settings) of your Palo Alto NGFW.

  • You've installed Palo Alto GlobalProtect on your client PC.

Configuring Palo Alto

Follow these steps to configure Palo Alto:

RADIUS Service Configuration

  • Select the Device tab and go to Service Profiles > Radius from the menu.

  • Click on Add to create a new profile.

Enter a name in the Profile Name field; for instance, "MirketRadius".

  • Input "60" in the Timeout field.

  • Input "1" in the Retries field.

  • Choose PAP option from the Authentication Protocol dropdown list.

  • Click on Add to add a Radius server, in the Servers section.

  • Enter a name for the Radius server; for instance "MirketGW".

  • Input the IP address of the server where the "Mirket Radius" is installed in the RADIUS Server field.

  • Input "1812" in the Port field. You should define your own port here. Then click on OK to confirm settings.

  • Return to the Device tab and go to Setup, from the menu. Then select the Services tab.

  • Click on Service Route Configuration under the Service Feature.

  • Check the IP address Palo Alto connect for radius request and make sure radius packets (Udp 1812 and Udp 1813) are allowed between Palo Alto and Mirket.

Authentication Profile Configuration

  • Select the Device tab and go to Authentication Profile, from the menu.

  • Then, click on Add to create a new profile.

  • Enter a name for the authentication profile; for instance, RadiusMirketProfile.

  • Choose "RADIUS" option from the Type dropdown list.

  • Enter a domain name in the User Domain field. If the username formats used in policies are domain\username then select '%USERDOMAIN%\%USERINPUT%', in the Username Modifier.

  • Click on the Advanced tab.

  • Then, choose "all" option in the Allow List.

  • Then, click on OK to confirm settings.

  • Go to Authentication Sequence, from the menu. Then click on Add to create a new sequence.

  • Enter a name for the authentication sequence; for instance, VPN_Authentication_Sequence.

  • Then click on the Add option to add the authentication profile that you created from the Authentication Profiles dropdown list.

  • Priorities of the profiles progress from top to bottom. To move a profile upwards, hover over it, hold it, and drag it upwards. The same process is applied to move the rule profile downwards.

  • Then click on OK to confirm settings.

GlobalProtect Portal Configuration

  • Select the Network tab and go to GlobalProtect > Portals, from the menu. Edit Portal Configuration and go to the Agent tab.

  • Check the "Generate cookie for authentication override" checkbox.

  • Click on OK to confirm settings.

GlobalProtect Gateway Configuration

  • Select the Network tab and go to GlobalProtect > Gateways, from the menu. Go to the Agent Tab.

  • Select the Agent tab and then select the Client Settings tab.

  • Edit client settings. Then select the Authentication Override tab.

  • Check the "Accept cookie for authentication override" checkbox.

  • In the Cookie Lifetime section, choose the "Minutes" option from the dropdown list and input "1".

  • Choose the certificate that you created from the Certificate to Encrypt/Decrypt Cookie dropdown list.

  • Click on OK to confirm settings.

  • Make sure you allow VPN users in the firewall policy.

  • Click on OK.

  • Access the administration shell of the PA device via SSH and activate the transmission of the PaloAlto-Client-Source-IP attribute for client IP addresses by comment below.

set authentication radius-vsa-on client-source-ip

  • Then click on Commit to save settings on the top right side.

Configure Mirket

To enable Mirket to receive authentication requests from GlobalProtect, follow these steps:

Add a Palo Alto as Resource in Mirket with Mirket Radius Gateway

Before starting, ensure that you have installed Mirket Radius Gateway. To add a Radius Client to the Mirket Radius Gateway, follow these steps:

  • First, navigate to the directory C:\MirketRadius and open the config.json file.

  • Fill in the gateway and radiusClientList fields according to the provided specifications to ensure accurate and secure network configuration.

    • samName: Enter the SAM name of the gateway. In Mirket, user identification is done using the SAM (Security Account Manager) name. This is preferred over the standard username. This username is used for authentication and access controls. Please provide your domain name, such as 'mirket'.

    • authenticationPort: Enter the authentication port value you set for the gateway. The default value is 1812.

    • accountingPort: Enter the accounting port value you specified for the gateway. The default value is 1813.

    • gatewayIp: Enter the IP address of the server where the Mirket is installed.

    • ipAddress: Enter the IP address of your firewall.

    • secretKey: Enter your secret key. This secret key is used to link your radius client and radius server, so ensure they are identical.

  • Once you've made the necessary changes to the config.json file, save and close it. Note: You can add multiple RADIUS clients.

  • After completing the configuration, restart the 'Mirket Radius Gateway Service'.

User and Group configuration on Mirket

To set up multifactor authentication, make sure you have at least one user group in Mirket.

If it is preferred to use a local user, first create a local group and then create a local user and make the user a member of the group.

If it is preferred to use LDAP users, the priority LDAP group is created by pulling users from Active Directory or OpenLDAP in Mirket.

Add a Radius Rules to Mirket

Radius Rules define user access to resources and the authentication methods available (such as SMS, Approve / Deny, OTP etc.).

First, you should follow these steps:

  • Select Rules > Radius Rules.

  • Click on Add New.

  • Enter a rule name in the Name field.

  • Enter the rule description in the Description field.

  • Select the group to which the rule applies from the Group dropdown list.

  • Select the provider to which the rule applies from the Provider dropdown list.

  • Click on Save to confirm settings.

Test the Integration

To validate the integration between Mirket MFA and your Palo Alto GlobalProtect, perform authentication using a mobile token on your mobile device. For RADIUS resources, available authentication methods include Approve/Deny authentication.

In this example, we illustrate the use of the Approve/Deny authentication method.

  • Launch the GlobalProtect App.

  • Input the IP address of your Palo Alto ethernet interface. Then click on Connect.

  • Enter your Mirket username in the Username field.

  • Input your password in the Password field.

  • Click on Connect. Then, select the 'Approve' option(found in the Mirket mobile app) immediately and make sure it doesn't time out.

Related Topics

Input a shared secret key to communicate with the RADIUS server in the Secret field (Mirket Radius). In Mirket use this same secret key when .

Choose the previously created profile from the Server Profile dropdown list(e.g., Mirket Radius profile).

To begin, download and install the GlobalProtect App. For guidance, please refer to .

configuring a RADIUS client resource
RADIUS service
Create a Local Group to add users manually.
Add local Mirket users manually.
Create a LDAP group to include LDAP users.
Sync users from an external user database.
https://docs.paloaltonetworks.com/globalprotect/5-1/globalprotect-app-user-guide
Palo Alto MFA for Admin Accounts
Radius Clients
Radius Rules
Local Group Configuration
Local Users Configuration
LDAP Group Configuration
LDAP Users