Set Up Palo Alto Networks Firewall Authentication

Create a Palo Alto Networks Firewall record in order to authenticate to a firewall instance. Palo Alto authentication is supported for vulnerability scans and compliance scans using Qualys apps VM, PC, SCA.

Which technologies are supported?

For the most current list of supported authentication technologies and the versions that have been certified for VM and PC by record type, please refer to the following article: 

Authentication Technologies Matrix

What login credentials are required?

- The user account you provide for authentication must either have the predefined role "Superuser (read-only)" or a custom role with these XML API privileges enabled: Configuration and Operational Requests.

- We use the PAN-OS XML API to retrieve system information from Palo Alto Firewall on port 443 so this port must be open.

How do I get started?

- Go to Scans > Authentication.

- Go to New > Network and Security > Palo Alto Networks Firewall.

- Provide basic login credentials (username and password) or get your password from a supported password vault.

Vault support

We support integration with multiple third party password vaults. Just go to Scans > Authentication > Vaults and tell us about your vault system. Then choose Authentication Vault in your record and select your vault name. At scan time, we'll authenticate to hosts using the account name in your record and the password we find in your vault.

Using BeyondTrust PBPS vault? You must directly enter the system name in the Palo Alto Networks Firewall record because auto-discovery of the system name is not supported for this authentication type. Also, if the vault account name for which we need to query a password is different from the username defined in the Palo Alto Networks Firewall record, then it needs to be directly entered in the Account Name field. Learn more

Tell me about SSL Verify

By default, the scanner will verify the SSL certificate used by the Palo Alto Networks device to make sure the certificate is valid and trusted. You may want to clear this option to skip SSL verification if the device is not configured with a certificate, the certificate was not issued by a well-known certificate authority (CA) or the certificate is self-signed.

Which IPs should I add to my record?

Select the target hosts (IPs) to authenticate to. Each IP may be included in one Palo Alto Networks Firewall record.

 

Quick Links

Why use host authentication

Vault Support Matrix