Okta

How to Configure SAML 2.0 for Palo Alto Networks - GlobalProtect

Contents


Supported Features

The Okta/Palo Alto Networks - GlobalProtect SAML integration currently supports the following features:


Configuration Steps

  1. In Okta, select the General tab for the Palo Alto Networks - GlobalProtect app, then click Edit:

    • Enter [your-base-url] into the Base URL field.

      Note: If global protect is configured on port 443, then the admin UI moves to port 4443.

    • Click Next.

    paloaltonetworks1.png

  2. Now that you have completed the set up in Okta, login to your Palo Alto Networks application as an administrator and follow the steps below to configure Okta as your IDP.

  3. Navigate to Device > Server Profiles > SAML Identity Provider.

  4. Select Import, then enter the following:

    • Profile Name: Enter a preferred profile name.

    • Identity Provider Metadata: Download and save the following. Then click Browse to locate and upload it to Palo Alto Networks GlobalProtect:

      Sign into the Okta Admin dashboard to generate this value.

    • Make sure the options Validate Identity Provider Certificate and Validate Metadata Signature are unchecked.

    • Click OK:

    paloalto1.png

  5. Navigate to Device > Authentication Profile, click Add, then enter the following:

    • Name: Provide a name for the Authentication profile.

    • Type: Select SAML from the dropdown menu.

    • IdP Server Profile: Select an IdP Server Profile created in step 4 as the IdP Server Profile from the dropdown.

    • Certificate for Signing Requests: Select None.

    • Enable Single Logout (optional): Check this option in order to enable SLO.

    • Certificate Profile: Select None.

    • User Group Attribute: Enter groups.

    • Select the Advanced tab in the Authentication Profile, then chose the Allow List.

    • Click OK:

    paloalto2.png

  6. Once you have set up the Okta as IDP you need to create either a new Portal or a new Gateway or both for the GlobalProtect components.

  7. Follow the appropriate steps:

    1. For Portals:

      • Navigate to Network > GlobalProtect > Portals.

      • Open the Portal you created in step 6.

      • Navigate to Authentication, then click Add.

      • Enter the following:

        • Provide a Name.

        • Select the OS.

        • Select the Authentication Profile you configured in step 5.

        • Define an authentication message.

        globalprotect1.png

    2. For Gateways:

        • Navigate to Network > GlobalProtect > Gateways.

        • Open the Gateway you created in step 6.

        • Navigate to Authentication, then click Add.

        • Enter the following:

          • Provide a Name.

          • Select the OS.

          • Select the Authentication Profile you configured in step 5.

          • Define an authentication message.

          globalprotect2.png

  8. To send groups as a part of SAML assertion, in Okta select the Sign On tab for the Palo Alto Networks app, then click Edit:

    • Select the appropriate filter from the groups dropdown menu and type the preferred value into the field.

    • Click Save.

    panetworks_new3.png

  9. Done!


Notes

The following SAML attribute is supported:

SP-initiated SSO

panetworks_new5.png