|
| 1 | +--- |
| 2 | +title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Palo Alto Networks - GlobalProtect | Microsoft Docs' |
| 3 | +description: Learn how to configure single sign-on between Azure Active Directory and Palo Alto Networks - GlobalProtect. |
| 4 | +services: active-directory |
| 5 | +documentationCenter: na |
| 6 | +author: jeevansd |
| 7 | +manager: mtillman |
| 8 | +ms.reviewer: barbkess |
| 9 | + |
| 10 | +ms.assetid: 03bef6f2-3ea2-4eaa-a828-79c5f1346ce5 |
| 11 | +ms.service: active-directory |
| 12 | +ms.subservice: saas-app-tutorial |
| 13 | +ms.workload: identity |
| 14 | +ms.tgt_pltfrm: na |
| 15 | +ms.devlang: na |
| 16 | +ms.topic: tutorial |
| 17 | +ms.date: 08/23/2019 |
| 18 | +ms.author: jeedes |
| 19 | + |
| 20 | +ms.collection: M365-identity-device-management |
| 21 | +--- |
| 22 | + |
| 23 | +# Tutorial: Azure Active Directory single sign-on (SSO) integration with Palo Alto Networks - GlobalProtect |
| 24 | + |
| 25 | +In this tutorial, you'll learn how to integrate Palo Alto Networks - GlobalProtect with Azure Active Directory (Azure AD). When you integrate Palo Alto Networks - GlobalProtect with Azure AD, you can: |
| 26 | + |
| 27 | +* Control in Azure AD who has access to Palo Alto Networks - GlobalProtect. |
| 28 | +* Enable your users to be automatically signed-in to Palo Alto Networks - GlobalProtect with their Azure AD accounts. |
| 29 | +* Manage your accounts in one central location - the Azure portal. |
| 30 | + |
| 31 | +To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis). |
| 32 | + |
| 33 | +## Prerequisites |
| 34 | + |
| 35 | +To get started, you need the following items: |
| 36 | + |
| 37 | +* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/). |
| 38 | +* Palo Alto Networks - GlobalProtect single sign-on (SSO) enabled subscription. |
| 39 | + |
| 40 | +## Scenario description |
| 41 | + |
| 42 | +In this tutorial, you configure and test Azure AD SSO in a test environment. |
| 43 | + |
| 44 | +* Palo Alto Networks - GlobalProtect supports **SP** initiated SSO |
| 45 | +* Palo Alto Networks - GlobalProtect supports **Just In Time** user provisioning |
| 46 | + |
| 47 | +## Adding Palo Alto Networks - GlobalProtect from the gallery |
| 48 | + |
| 49 | +To configure the integration of Palo Alto Networks - GlobalProtect into Azure AD, you need to add Palo Alto Networks - GlobalProtect from the gallery to your list of managed SaaS apps. |
| 50 | + |
| 51 | +1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account. |
| 52 | +1. On the left navigation pane, select the **Azure Active Directory** service. |
| 53 | +1. Navigate to **Enterprise Applications** and then select **All Applications**. |
| 54 | +1. To add new application, select **New application**. |
| 55 | +1. In the **Add from the gallery** section, type **Palo Alto Networks - GlobalProtect** in the search box. |
| 56 | +1. Select **Palo Alto Networks - GlobalProtect** from results panel and then add the app. Wait a few seconds while the app is added to your tenant. |
| 57 | + |
| 58 | +## Configure and test Azure AD single sign-on for Palo Alto Networks - GlobalProtect |
| 59 | + |
| 60 | +Configure and test Azure AD SSO with Palo Alto Networks - GlobalProtect using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Palo Alto Networks - GlobalProtect. |
| 61 | + |
| 62 | +To configure and test Azure AD SSO with Palo Alto Networks - GlobalProtect, complete the following building blocks: |
| 63 | + |
| 64 | +1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature. |
| 65 | + 1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon. |
| 66 | + 1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on. |
| 67 | +1. **[Configure Palo Alto Networks - GlobalProtect SSO](#configure-palo-alto-networks---globalprotect-sso)** - to configure the single sign-on settings on application side. |
| 68 | + 1. **[Create Palo Alto Networks - GlobalProtect test user](#create-palo-alto-networks---globalprotect-test-user)** - to have a counterpart of B.Simon in Palo Alto Networks - GlobalProtect that is linked to the Azure AD representation of user. |
| 69 | +1. **[Test SSO](#test-sso)** - to verify whether the configuration works. |
| 70 | + |
| 71 | +## Configure Azure AD SSO |
| 72 | + |
| 73 | +Follow these steps to enable Azure AD SSO in the Azure portal. |
| 74 | + |
| 75 | +1. In the [Azure portal](https://portal.azure.com/), on the **Palo Alto Networks - GlobalProtect** application integration page, find the **Manage** section and select **single sign-on**. |
| 76 | +1. On the **Select a single sign-on method** page, select **SAML**. |
| 77 | +1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings. |
| 78 | + |
| 79 | +  |
| 80 | + |
| 81 | +1. On the **Basic SAML Configuration** section, enter the values for the following fields: |
| 82 | + |
| 83 | + a. In the **Sign on URL** text box, type a URL using the following pattern: |
| 84 | + `https://<Customer Firewall URL>` |
| 85 | + |
| 86 | + b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern: |
| 87 | + `https://<Customer Firewall URL>/SAML20/SP` |
| 88 | + |
| 89 | + > [!NOTE] |
| 90 | + > These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Palo Alto Networks - GlobalProtect Client support team](https://support.paloaltonetworks.com/support) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal. |
| 91 | + |
| 92 | +1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer. |
| 93 | + |
| 94 | +  |
| 95 | + |
| 96 | +1. On the **Set up Palo Alto Networks - GlobalProtect** section, copy the appropriate URL(s) based on your requirement. |
| 97 | + |
| 98 | +  |
| 99 | + |
| 100 | +### Create an Azure AD test user |
| 101 | + |
| 102 | +In this section, you'll create a test user in the Azure portal called B.Simon. |
| 103 | + |
| 104 | +1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**. |
| 105 | +1. Select **New user** at the top of the screen. |
| 106 | +1. In the **User** properties, follow these steps: |
| 107 | + 1. In the **Name** field, enter `B.Simon`. |
| 108 | + 1. In the **User name ** field, enter the [email protected]. For example, `[email protected]`. |
| 109 | + 1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box. |
| 110 | + 1. Click **Create**. |
| 111 | + |
| 112 | +### Assign the Azure AD test user |
| 113 | + |
| 114 | +In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Palo Alto Networks - GlobalProtect. |
| 115 | + |
| 116 | +1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**. |
| 117 | +1. In the applications list, select **Palo Alto Networks - GlobalProtect**. |
| 118 | +1. In the app's overview page, find the **Manage** section and select **Users and groups**. |
| 119 | + |
| 120 | +  |
| 121 | + |
| 122 | +1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog. |
| 123 | + |
| 124 | +  |
| 125 | + |
| 126 | +1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen. |
| 127 | +1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen. |
| 128 | +1. In the **Add Assignment** dialog, click the **Assign** button. |
| 129 | + |
| 130 | +## Configure Palo Alto Networks - GlobalProtect SSO |
| 131 | + |
| 132 | +1. Open the Palo Alto Networks Firewall Admin UI as an administrator in another browser window. |
| 133 | + |
| 134 | +2. Click on **Device**. |
| 135 | + |
| 136 | +  |
| 137 | + |
| 138 | +3. Select **SAML Identity Provider** from the left navigation bar and click "Import" to import the metadata file. |
| 139 | + |
| 140 | +  |
| 141 | + |
| 142 | +4. Perform following actions on the Import window |
| 143 | + |
| 144 | +  |
| 145 | + |
| 146 | + a. In the **Profile Name** textbox, provide a name e.g Azure AD GlobalProtect. |
| 147 | + |
| 148 | + b. In **Identity Provider Metadata**, click **Browse** and select the metadata.xml file which you have downloaded from Azure portal |
| 149 | + |
| 150 | + c. Click **OK** |
| 151 | + |
| 152 | +### Create Palo Alto Networks - GlobalProtect test user |
| 153 | + |
| 154 | +In this section, a user called B.Simon is created in Palo Alto Networks - GlobalProtect. Palo Alto Networks - GlobalProtect supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Palo Alto Networks - GlobalProtect, a new one is created after authentication. |
| 155 | + |
| 156 | +## Test SSO |
| 157 | + |
| 158 | +In this section, you test your Azure AD single sign-on configuration using the Access Panel. |
| 159 | + |
| 160 | +When you click the Palo Alto Networks - GlobalProtect tile in the Access Panel, you should be automatically signed in to the Palo Alto Networks - GlobalProtect for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction). |
| 161 | + |
| 162 | +## Additional resources |
| 163 | + |
| 164 | +- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list) |
| 165 | + |
| 166 | +- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis) |
| 167 | + |
| 168 | +- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview) |
| 169 | + |
| 170 | +- [Try Palo Alto Networks - GlobalProtect with Azure AD](https://aad.portal.azure.com/) |
0 commit comments