Okta

How to Configure SAML 2.0 for Palo Alto Networks - CaptivePortal

  1. In Okta, select the General tab for the Palo Alto Networks - CaptivePortal app, then click Edit:

    • Enter [your-base-url] into the Base URL field.

    • Click Next.

    captiveportal1.png

  2. Now that you have completed the set up in Okta, login to your Palo Alto Networks application as an administrator and follow the steps below to configure Okta as your IDP:

  3. Navigate to Device > Server Profiles > SAML Identity Provider.

  4. Select Import, then enter the following:

    • Profile Name: Enter a preferred profile name.

    • Identity Provider Metadata: Download and save the following. Then click Browse to locate and upload it:

      Sign into the Okta Admin dashboard to generate this value.

    • Click OK.

    captiveportal5.png

  5. Select your SAML Identity Provider Server Profile, uncheck Validate Identity Provider Certificate, check Sign SAML Message to IDP, then click OK:

    captiveportal6.png

  6. Navigate to Device > Authentication Profile, click Add, then enter the following:

    panetworks_new2.png

  7. Navigate to Device > Setup > Management > Authentication Settings, then select the gear icon.

    • Authentication Profile: Select the SAML Authentication profile you created in step 6 from the dropdown menu.

    • Click OK.

    captiveportal8.png

  8. Navigate to Objects > Authentication, click Add, then enter the following:

    • Name: Enter a preferred name.

    • Authentication Method: Select web-form from the dropdown menu.

    • Authentication Profile: Select the SAML Authentication profile you created in step 6 from the dropdown menu.

    • Click OK.

    captiveportal9.png

  9. Navigate to Policies > Authentication, click Add, then enter the following:

    • Provide a name.

    • Define the rules of the source user destination and service that you require (hint: User should probably be unknown).

    • Under the Actions tab select the authentication enforcement you created in step 8 as the Authentication Enforcement.

    • Click OK.

    captiveportal10.png

  10. Refer to the following Palo Alto Networks documentation for configuring a Captive Portal:

  11. To send the groups as a part of SAML assertion, in Okta select the Sign On tab for the Palo Alto Networks app, then click Edit:

    • Select the appropriate filter from the groups dropdown menu, then type the preferred value into the field.

    • Click Save.

    panetworks_new1.png

  12. Done!

Notes:

The following group attribute is supported:

SP-initiated flows are supported.

IdP-initiated flows and Just In Time (JIT) Provisioning are not supported.

For SP-initiated Flows

Go to [your-base-url].