Skip to content

Palo Alto GlobalProtect MFA Setup with Mideye

This guide describes how to configure Palo Alto GlobalProtect to use Mideye Server for multi-factor authentication via RADIUS.

Palo Alto acts as a RADIUS client toward Mideye Server.

ComponentVersions
PAN-OS9.x / 10.x / 11.x
Mideye Server5.x / 6.x
UserGlobalProtect GatewayMideye Server 1. Username + password2. RADIUS Access-Request (UDP 1812)3. Access-Challenge "Enter OTP"4. OTP prompt5. One-time password6. RADIUS Access-Request (OTP)7. Access-Accept ✓
  • Mideye Server 5 or 6 with RADIUS enabled (default UDP port 1812)
  • GlobalProtect Portal and Gateway already configured — refer to Palo Alto GlobalProtect documentation for initial setup
  • UDP port 1812 open from the Palo Alto firewall to Mideye Server
  • Administrative access to the PAN-OS web interface

1. Add Palo Alto as a RADIUS client in Mideye Server

Section titled “1. Add Palo Alto as a RADIUS client in Mideye Server”

On the Mideye Server, add the Palo Alto firewall IP address as a RADIUS client with a shared secret. This shared secret must be identical on both the Palo Alto firewall and in Mideye Server.

See RADIUS Clients in the reference guide.

To allow fallback to manual signature when the user’s phone is unreachable, reduce the Push delivery timeout in Mideye:

  1. Log in to the Mideye Server web interface.
  2. Navigate to RADIUS Servers and click the edit icon on the RADIUS server used by the Palo Alto RADIUS client.
  3. Open the Advanced tab.
  4. Change Push delivery timeout (seconds) from 17 to 11.
  5. Click Save.

GlobalProtect drops the RADIUS session at approximately 25 seconds. With an 11-second push delivery timeout, Mideye has enough time to detect that the phone is unreachable, fall back to manual signature, and complete the challenge-response exchange before PAN-OS closes the session.

Navigate to DeviceServer ProfilesRADIUS and click Add.

SettingValue
Profile NameMideye (or a descriptive name)
Timeout35 seconds
Retries1
Authentication ProtocolPAP

RADIUS server profile configuration

Click Add under Servers to define the Mideye RADIUS server:

SettingValue
Server NameMideye
RADIUS ServerMideye Server IP address
Port1812
SecretShared secret (must match Mideye Server)

Click OK.

Navigate to DeviceAuthentication Profile and click Add.

SettingValue
NameMideye-auth (or a descriptive name)
TypeRADIUS
Server ProfileSelect the RADIUS profile created in step 3

Click the Advanced tab to define which users or groups are allowed to authenticate with this profile.

Authentication profile configuration

Click OK.

5. Apply authentication profile to GlobalProtect gateway

Section titled “5. Apply authentication profile to GlobalProtect gateway”

Navigate to NetworkGlobalProtectGateways and edit your existing gateway.

Under AuthenticationClient Authentication, add:

  • Authentication Profile: select Mideye-auth

Authentication profile applied to GlobalProtect gateway

Click OK and Commit changes.

Connect using the GlobalProtect client or the web portal and verify the following scenarios:

ScenarioExpected result
Push approved in Mideye+Login succeeds
SMS OTP entered correctlyLogin succeeds
TOTP entered correctlyLogin succeeds
Wrong OTP enteredAuthentication fails
Phone unreachable (with timeout adjusted)Falls back to manual signature
SymptomCheck
Authentication times outGlobalProtect enforces ~25 second internal limit. Verify Mideye push delivery timeout is set to 11 seconds (step 2)
Push never arrives / falls back to manual signatureVerify Mideye+ app is activated and the phone has internet connectivity
”Authentication failed” with no detailsPalo Alto does not display dynamic RADIUS reject messages — this is a known limitation
OTP never arrivesVerify UDP port 1812 is open between the Palo Alto firewall and Mideye Server
Shared secret mismatchEnsure the secret in the PAN-OS RADIUS server profile matches the Mideye RADIUS client

Palo Alto does not display dynamic RADIUS reject messages to end users. If Mideye Server sends a descriptive reject message (for example, “Phone not reachable”), GlobalProtect will display a generic “Authentication failed” message instead.

  • The effective RADIUS timeout is approximately 25 seconds, regardless of the configured value.
  • This cannot be extended via the PAN-OS GUI or CLI.
  • Adjust the Mideye push delivery timeout as described in step 2.
SettingRecommended value
RADIUS ProtocolPAP
PAN-OS RADIUS Timeout35 seconds
PAN-OS RADIUS Retries1
Mideye Push Delivery Timeout11 seconds

You can define multiple RADIUS servers in the PAN-OS Server Profile. Palo Alto will attempt servers sequentially if the primary is unreachable.

For true high availability, consider using a load balancer in front of multiple Mideye Servers, or define primary and secondary RADIUS servers in the server profile.