Obviously this is not a supported scenario just like the reverse proxy or load balancer setup https://blog.paessler.com/take-advantage-of-reverse-proxies-and-load-balancers-for-prtg-how-it-works but replacing the reverse proxy with a WAP server is basically the same concept. Possibly a little easier if you already have ADFS in the environment but the WAP requires ADFS unlike the reverse proxy being standalone.
On the ADFS server, make a new Relying Party Trust.
I chose Claims Aware because Non Claims Aware assumes Windows Integrated Authentication on the back end.
Enter the data manually.
Enter a display name like "PRTG" or whatever you wish.
Click through the options, don't select anything for WS-FED or SAML2.
Enter the PRTG server URL for the identifier with https if you have it set up on the PRTG server.
Choose an Access Control Policy with MFA if desired.
Finish.
I copied the same .pfx certificate from the PRTG server to the WAP. I imported it in the local cert store there.
Next, publish a new application through Remote Access Manager.
Choose ADFS Pre-authentication.
Choose the same Relying Party Trust created above.
Enter a name, the external URL you want to use, pick the certificate, http-to-https if desired, and the internal URL.
If the internal and external URLs are different there are some extra steps.
I used the same external and internal by having a CNAME in DNS point to the WAP server, then adding the same name to the hosts file on the WAP to point to the IP address of the PRTG server.
I have HTTPS for both URLs. It works perfectly so far.
If you have different URLs for external and internal, then you will need to run some powershell commands on the WAP.
Open an admin powershell prompt and run this command using the published application name you used.
Get-WebApplicationProxyApplication -Name "PRTG" | fl *
You should see two properties that need to change.
DisableTranslateUrlInRequestHeaders : False
DisableTranslateUrlInResponseHeaders : False
Run these commands to change them to True.
Get-WebApplicationProxyApplication -Name "PRTG" | Set-WebApplicationProxyApplication -DisableTranslateUrlInRequestHeaders:$true
Get-WebApplicationProxyApplication -Name "PRTG" | Set-WebApplicationProxyApplication -DisableTranslateUrlInResponseHeaders:$true
That is it so far. If anyone can figure out a better way I would definitely appreciate it but this will work for now until we see what PRTG does for MFA within the application.
Add comment