This article describes how to enable Nexus OTP in Smart ID Digital Access component as two-factor authentication method for Palo Alto Firewall, to replace static passwords.
Nexus OTP can be either Nexus TruID Synchronized or Smart ID Mobile App OTP, or any other OATH-based mobile OTP application, such as Google Authenticator or Microsoft Authenticator.
With the setup described in this article, Digital Access functions as a RADIUS server and Palo Alto Firewall as a RADIUS client. Nexus TruID is used as an example below and is available for iOS, Android, and Windows.
Network schematic for Nexus OTP authentication
Network schematic with Nexus TruID Synchronized as an example.
The end user starts the TruID client and enters the PIN in TruID to generate an OTP.
Palo Alto Firewall request the end user to enter username, password and OTP.
The end user enters username, domain password and OTP.
The domain credentials are validated by the Active Directory.
The OTP authentication request is relayed to Digital Access Authentication Server via RADIUS.
The authentication server validates the OTP with the associated TruID token and PIN from the user database.
Upon successful validation, the authentication server responds with successful authentication to Palo Alto Firewall.
Palo Alto Firewall provides access to the end user.