Palo Alto CBA

1. Introduction

SecureW2’s PKI services offer a robust and seamless integration with Palo Alto GlobalProtect VPN, elevating your network security by enabling user authentication through digital certificates.

To set up SecureW2’s Certificate-Based Authentication with Palo Alto GlobalProtect VPN, please follow the detailed instructions provided in our HelpGuide.

2. Prerequisites

The following are the prerequisites to integrate SecureW2 PKI with Palo Alto GlobalProtect VPN for Certificate Based Authentication.

  1. An active subscription with JoinNow PKI services.
  2. An Active subscription with PaloAlto GlobalProtect VPN.

3. Configuring SecureW2

3.1 Exporting CA Certificates

The CA Certificates from the JoinNow Management portal must be exported and uploaded to the Palo Alto GlobalProtect VPN to create a Chain of Trust. This will help the GlobalProtect VPN to authenticate client devices against the issuing Certificate Authorities.

  1. Log in to the JoinNow Management Portal.
  2. Navigate to Dynamic PKI > Certificate Authorities.
  3. In the Certificate Authorities section, click the Download link for the Root CA and intermediate CA issued to your organization. An example of this is explained in the screenshot below:

3.2 Creating a Client Certificate

Palo Alto GlobalProtect necessitates a signing certificate to securely sign custom configuration profiles and software packages. Once signed, these profiles and packages are automatically trusted upon installation on managed devices. This streamlines deployment and enhances security by eliminating the need for manual trust verification.

A signing certificate can be generated with the JoinNow Management Portal by utilizing the “Create Certificate” function.

To create a Client certificate

  1. Navigate to Dynamic PKI > Create Certificate. 
  2. In the Device Info section, from the Operating System drop-down list, select an operating system
  3. For User Description, enter a suitable description. 
  4. For MAC Address, enter a unique MAC address.

  5. In the Certificate Signing Request section, select the Generate Keypair and CSR option to generate a keypair and CSR file, and create client certificates.
  6. From the Algorithm drop-down list, select RSA.
  7. From the Key Size drop-down, select 2048.
  8. For the Subject field, enter the common name (the recommended name format for the certificate is “VPN Signing Certificate”). This helps in the easy identification of the CA.
  9. In the Other Name field, enter the same value as in the Subject field (Without the “CN” attribute.

  10. In the Certificate Issuance Policy section, from the Certificate Authority drop-down list, select the intermediate CA created for issuing certificates to clients.
  11. From the Use Certificate Template drop-down list, select the “DEFAULT CREATE CERTIFICATE TEMPLATE”.
  12. Select the Include Entire Certificate Chain checkbox. This is mandatory. 
  13. In the Distribution section, for the Format field, select PKCS12.
  14. In the Receive via field, select Download.

  15. Click the Create button, and a Password for private key pop-up window opens. Enter the password for the certificate file and click Submit.

4. Configuring Palo Alto GlobalProtect

4.1 Importing Certificates

Importing the Root and Intermediate CA certificates to Palo Alto VPN helps to create a chain of trust that helps in authenticating the client devices of an organization.

To Import CA certificates to GlobalProtect VPN, follow the steps below:

  1. Log in to the Palo Alto GlobalProtect portal.
  2. Click on the Device tab.

  3. Navigate to Certificate Management > Certificates.
  4. Click Import.
  5. For the Certificate Type option, select the required Radio button. 
  6. In the Certificate Name field, enter a name for the certificate.
  7. For the Certificate File, click Browse. Select the Root CA profile downloaded from the JoinNoe Management portal earlier.
  8. From the File Format drop-down list, select the Base64 Encoded Certificate (PEM) option.
  9. Click OK.
    NOTE: Follow the same steps as above to import the Intermediate Certificate

4.1.1 Creating a Certificate Profile

  1. Click on Certificate Profile option in the side menu.
  2. Click Add.
  3. In the Name field, enter a name for the Certificate Profile.
  4. From the Username Field drop-down list, select Subject Alt. Click on the Principal Name field as the type of Subject Alternative name.
  5. In the CA Certificates section, click Add.
  6. From the CA Certificate drop-down list, select the Root CA certificate uploaded in the certificate store earlier.
  7. Click OK.

  8. Perform the same steps to upload the Intermediate Certificate.
  9. Click on the check-box of the selected certificates (Root and Intermediate) to add them to the certificate profile.
  10. Check the Use CRL checkbox.
  11. Click OK.

4.2 Configuring Network Portal in Palo Alto

  1. Click on the Network tab.

  2. Navigate to GlobalProtect > Portals.
  3. Click Add.
  4. In the General section, for the Name field, enter a name for the network portal configuration.
  5. From the Interface drop-down list, select the required type of network interface.
  6. From the IP Address Type drop-down list, select the required type of IP Address.
  7. From the IP Address drop-down list, select the required IP Address configured in Palo Alto VPN.

  8. Under Server Authentication, from the SSL/TLS Service Profile drop-down list, select the SSL/TLS certificate profile .
  9. Click Add.

  10. From the Certificate Profile drop-down list, select the certificate profile created in Creating a Certificate Profile section.
  11. Click OK.