PCNSE Exam QuestionsBrowse all questions from this exam

PCNSE Exam - Question 46


Which three authentication services can an administrator use to authenticate admins into the Palo Alto Networks NGFW without defining a corresponding admin account on the local firewall? (Choose three.)

Show Answer
Correct Answer: CDE

The Palo Alto Networks NGFW (Next-Generation Firewall) allows administrators to authenticate using external authentication services without defining corresponding admin accounts locally. The three authentication services that enable this functionality are SAML, TACACS+, and RADIUS. These services can leverage attributes or vendor-specific attributes (VSAs) for both authentication and role mapping directly on the firewall, eliminating the need for local admin accounts. LDAP, PAP, and Kerberos, on the other hand, typically require local account configuration for full administrative access.

Discussion

17 comments
Sign in to comment
DabouncerOptions: CDE
Apr 13, 2019

The answer should be C, D, and E https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/manage-firewall-administrators/administrative-authentication

kerberosOptions: CDE
Aug 20, 2020

The administrative accounts are defined on an external SAML, TACACS+, or RADIUS server. The server performs both authentication and authorization. For authorization, you define Vendor-Specific Attributes (VSAs) on the TACACS+ or RADIUS server, or SAML attributes on the SAML server. PAN-OS maps the attributes to administrator roles, access domains, user groups, and virtual systems that you define on the firewall.

hpbdcbOptions: CDE
Nov 23, 2020

"...without defining a corresponding admin account on the local firewall?" so what?! it talks about "authenticate" only! So that means we do not talk about "authorization" here (i.e. role mapping). When it comes to authentication only all of them could be used: ACDEF but.. is that what they wanna see here? more likely they wanna know which can be used without any need to create a local account at all (i.e even authorization) and that leads to: CDE according to: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/manage-firewall-administrators/configure-administrative-accounts-and-authentication/configure-local-or-external-authentication-for-firewall-administrators.html#id7484db35-8218-421b-9847-eab796beea99 so most likely CDE is what they wanna see here - imho

lgkhanOptions: CDE
Nov 23, 2021

CDE are the correct answers.

confusionOptions: CDE
Feb 21, 2022

Without defining user only CDE

awtsuritacunaOptions: CDE
Dec 1, 2022

The administrative accounts are defined on an external SAML, TACACS+, or RADIUS server. The server performs both authentication and authorization. For authorization, you define Vendor-Specific Attributes (VSAs) on the TACACS+ or RADIUS server, or SAML attributes on the SAML server. PAN-OS maps the attributes to administrator roles, access domains, user groups, and virtual systems that you define on the firewall. https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/firewall-administration/manage-firewall-administrators/administrative-authentication

jin3209
Jul 2, 2020

what is the right answer for the exam alone? ACF or CDE?

DaveDKOptions: CDE
Sep 6, 2020

The administrative accounts are defined on an external SAML, TACACS+, or RADIUS server. The server performs both authentication and authorization. For authorization, you define Vendor-Specific Attributes (VSAs) on the TACACS+ or RADIUS server, or SAML attributes on the SAML server. PAN-OS maps the attributes to administrator roles, access domains, user groups, and virtual systems that you define on the firewall. For details, see:

kambataOptions: CDE
Oct 28, 2020

Correct answer is C, D and E, please !

lol1000Options: CDE
Oct 29, 2020

c, d, e https://docs.paloaltonetworks.com/pan-os/10-0/pan-os-admin/firewall-administration/manage-firewall-administrators/administrative-authentication.html

PacketFairyOptions: DEF
Nov 20, 2020

RADIUS does not need an admin configured. VSAs (Vendor specific attributes) would be used. I log in as Jack, RADIUS sends back a success and a VSA value. If that value corresponds to read/write administrator, I get logged in as a superuser. There are VSAs for read only and user (Global protect access but not admin). I am unsure what other Auth methods can use VSA or a similar mechanisim. If admin users are configured with RADIUS, no need for VSA.

rociohaOptions: CDE
Mar 19, 2021

C-D-E https://origin-docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/firewall-administration/manage-firewall-administrators/configure-administrative-accounts-and-authentication/configure-local-or-external-authentication-for-firewall-administrators.html

vj77Options: CDE
Apr 28, 2021

LDAP is also an answer. I don't understand why NOT, CDEF should be correct. I did LDAP for admin users myself. correct me if I'm wrong. https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/authentication/configure-ldap-authentication

eyelasers1
Feb 21, 2022

Per https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/firewall-administration/manage-firewall-administrators/administrative-authentication.html , LDAP can only be used for authentication. The authorization requires that there be a local admin account.

confusion
Feb 21, 2022

Ldap requires user to be defined on the FW for authentication and question asks without configuring user.

darcone23
Feb 5, 2024

no it doesn’t. I have LDAP and RADIUS auth profile and only local admin under administrators :)

1Adrian1Options: ACF
Apr 2, 2022

A,C.F is the correct answer

JRKhanOptions: CDE
Jan 9, 2024

CDE are correct. With LDAP, you have to define the admin user locally otherwise there is no other way to assign a role to the user. With Radius, tacacs and saml the firewall can utilise the received VSAs or SAML attributes to map to the roles locally defined on the firewall.

MarshpillowzOptions: CDE
Jan 23, 2024

C, D and E are correct

bing2021Options: CDE
Jul 5, 2024

ldap is not matching questions.