Skip to content

Commit 9f1faef

Browse files
authored
Merge pull request #86374 from v-nagta/paloalto
Product Backlog Item 796609: SaaS App Tutorial: Palo Alto Networks - …
2 parents 3fded16 + 2e2352e commit 9f1faef

File tree

4 files changed

+176
-252
lines changed

4 files changed

+176
-252
lines changed

.openpublishing.redirection.json

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -7200,6 +7200,11 @@
72007200
"redirect_url": "/azure/active-directory/saas-apps/airwatch-tutorial",
72017201
"redirect_document_id": true
72027202
},
7203+
{
7204+
"source_path": "articles/active-directory/paloaltoglobalprotect-tutorial.md",
7205+
"redirect_url": "/azure/active-directory/saas-apps/palo-alto-networks-globalprotect-tutorial",
7206+
"redirect_document_id": true
7207+
},
72037208
{
72047209
"source_path": "articles/active-directory/active-directory-saas-alcumus-info-tutorial.md",
72057210
"redirect_url": "/azure/active-directory/saas-apps/alcumus-info-tutorial",
@@ -8735,11 +8740,6 @@
87358740
"redirect_url": "/azure/active-directory/saas-apps/paloaltoadmin-tutorial",
87368741
"redirect_document_id": true
87378742
},
8738-
{
8739-
"source_path": "articles/active-directory/active-directory-saas-paloaltoglobalprotect-tutorial.md",
8740-
"redirect_url": "/azure/active-directory/saas-apps/paloaltoglobalprotect-tutorial",
8741-
"redirect_document_id": true
8742-
},
87438743
{
87448744
"source_path": "articles/active-directory/active-directory-saas-paloaltonetworks-aperture-tutorial.md",
87458745
"redirect_url": "/azure/active-directory/saas-apps/paloaltonetworks-aperture-tutorial",
Lines changed: 170 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,170 @@
1+
---
2+
title: 'Tutorial: Azure Active Directory single sign-on (SSO) integration with Palo Alto Networks - GlobalProtect | Microsoft Docs'
3+
description: Learn how to configure single sign-on between Azure Active Directory and Palo Alto Networks - GlobalProtect.
4+
services: active-directory
5+
documentationCenter: na
6+
author: jeevansd
7+
manager: mtillman
8+
ms.reviewer: barbkess
9+
10+
ms.assetid: 03bef6f2-3ea2-4eaa-a828-79c5f1346ce5
11+
ms.service: active-directory
12+
ms.subservice: saas-app-tutorial
13+
ms.workload: identity
14+
ms.tgt_pltfrm: na
15+
ms.devlang: na
16+
ms.topic: tutorial
17+
ms.date: 08/23/2019
18+
ms.author: jeedes
19+
20+
ms.collection: M365-identity-device-management
21+
---
22+
23+
# Tutorial: Azure Active Directory single sign-on (SSO) integration with Palo Alto Networks - GlobalProtect
24+
25+
In this tutorial, you'll learn how to integrate Palo Alto Networks - GlobalProtect with Azure Active Directory (Azure AD). When you integrate Palo Alto Networks - GlobalProtect with Azure AD, you can:
26+
27+
* Control in Azure AD who has access to Palo Alto Networks - GlobalProtect.
28+
* Enable your users to be automatically signed-in to Palo Alto Networks - GlobalProtect with their Azure AD accounts.
29+
* Manage your accounts in one central location - the Azure portal.
30+
31+
To learn more about SaaS app integration with Azure AD, see [What is application access and single sign-on with Azure Active Directory](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis).
32+
33+
## Prerequisites
34+
35+
To get started, you need the following items:
36+
37+
* An Azure AD subscription. If you don't have a subscription, you can get a [free account](https://azure.microsoft.com/free/).
38+
* Palo Alto Networks - GlobalProtect single sign-on (SSO) enabled subscription.
39+
40+
## Scenario description
41+
42+
In this tutorial, you configure and test Azure AD SSO in a test environment.
43+
44+
* Palo Alto Networks - GlobalProtect supports **SP** initiated SSO
45+
* Palo Alto Networks - GlobalProtect supports **Just In Time** user provisioning
46+
47+
## Adding Palo Alto Networks - GlobalProtect from the gallery
48+
49+
To configure the integration of Palo Alto Networks - GlobalProtect into Azure AD, you need to add Palo Alto Networks - GlobalProtect from the gallery to your list of managed SaaS apps.
50+
51+
1. Sign in to the [Azure portal](https://portal.azure.com) using either a work or school account, or a personal Microsoft account.
52+
1. On the left navigation pane, select the **Azure Active Directory** service.
53+
1. Navigate to **Enterprise Applications** and then select **All Applications**.
54+
1. To add new application, select **New application**.
55+
1. In the **Add from the gallery** section, type **Palo Alto Networks - GlobalProtect** in the search box.
56+
1. Select **Palo Alto Networks - GlobalProtect** from results panel and then add the app. Wait a few seconds while the app is added to your tenant.
57+
58+
## Configure and test Azure AD single sign-on for Palo Alto Networks - GlobalProtect
59+
60+
Configure and test Azure AD SSO with Palo Alto Networks - GlobalProtect using a test user called **B.Simon**. For SSO to work, you need to establish a link relationship between an Azure AD user and the related user in Palo Alto Networks - GlobalProtect.
61+
62+
To configure and test Azure AD SSO with Palo Alto Networks - GlobalProtect, complete the following building blocks:
63+
64+
1. **[Configure Azure AD SSO](#configure-azure-ad-sso)** - to enable your users to use this feature.
65+
1. **[Create an Azure AD test user](#create-an-azure-ad-test-user)** - to test Azure AD single sign-on with B.Simon.
66+
1. **[Assign the Azure AD test user](#assign-the-azure-ad-test-user)** - to enable B.Simon to use Azure AD single sign-on.
67+
1. **[Configure Palo Alto Networks - GlobalProtect SSO](#configure-palo-alto-networks---globalprotect-sso)** - to configure the single sign-on settings on application side.
68+
1. **[Create Palo Alto Networks - GlobalProtect test user](#create-palo-alto-networks---globalprotect-test-user)** - to have a counterpart of B.Simon in Palo Alto Networks - GlobalProtect that is linked to the Azure AD representation of user.
69+
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
70+
71+
## Configure Azure AD SSO
72+
73+
Follow these steps to enable Azure AD SSO in the Azure portal.
74+
75+
1. In the [Azure portal](https://portal.azure.com/), on the **Palo Alto Networks - GlobalProtect** application integration page, find the **Manage** section and select **single sign-on**.
76+
1. On the **Select a single sign-on method** page, select **SAML**.
77+
1. On the **Set up single sign-on with SAML** page, click the edit/pen icon for **Basic SAML Configuration** to edit the settings.
78+
79+
![Edit Basic SAML Configuration](common/edit-urls.png)
80+
81+
1. On the **Basic SAML Configuration** section, enter the values for the following fields:
82+
83+
a. In the **Sign on URL** text box, type a URL using the following pattern:
84+
`https://<Customer Firewall URL>`
85+
86+
b. In the **Identifier (Entity ID)** text box, type a URL using the following pattern:
87+
`https://<Customer Firewall URL>/SAML20/SP`
88+
89+
> [!NOTE]
90+
> These values are not real. Update these values with the actual Sign on URL and Identifier. Contact [Palo Alto Networks - GlobalProtect Client support team](https://support.paloaltonetworks.com/support) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
91+
92+
1. On the **Set up single sign-on with SAML** page, in the **SAML Signing Certificate** section, find **Federation Metadata XML** and select **Download** to download the certificate and save it on your computer.
93+
94+
![The Certificate download link](common/metadataxml.png)
95+
96+
1. On the **Set up Palo Alto Networks - GlobalProtect** section, copy the appropriate URL(s) based on your requirement.
97+
98+
![Copy configuration URLs](common/copy-configuration-urls.png)
99+
100+
### Create an Azure AD test user
101+
102+
In this section, you'll create a test user in the Azure portal called B.Simon.
103+
104+
1. From the left pane in the Azure portal, select **Azure Active Directory**, select **Users**, and then select **All users**.
105+
1. Select **New user** at the top of the screen.
106+
1. In the **User** properties, follow these steps:
107+
1. In the **Name** field, enter `B.Simon`.
108+
1. In the **User name** field, enter the [email protected]. For example, `[email protected]`.
109+
1. Select the **Show password** check box, and then write down the value that's displayed in the **Password** box.
110+
1. Click **Create**.
111+
112+
### Assign the Azure AD test user
113+
114+
In this section, you'll enable B.Simon to use Azure single sign-on by granting access to Palo Alto Networks - GlobalProtect.
115+
116+
1. In the Azure portal, select **Enterprise Applications**, and then select **All applications**.
117+
1. In the applications list, select **Palo Alto Networks - GlobalProtect**.
118+
1. In the app's overview page, find the **Manage** section and select **Users and groups**.
119+
120+
![The "Users and groups" link](common/users-groups-blade.png)
121+
122+
1. Select **Add user**, then select **Users and groups** in the **Add Assignment** dialog.
123+
124+
![The Add User link](common/add-assign-user.png)
125+
126+
1. In the **Users and groups** dialog, select **B.Simon** from the Users list, then click the **Select** button at the bottom of the screen.
127+
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
128+
1. In the **Add Assignment** dialog, click the **Assign** button.
129+
130+
## Configure Palo Alto Networks - GlobalProtect SSO
131+
132+
1. Open the Palo Alto Networks Firewall Admin UI as an administrator in another browser window.
133+
134+
2. Click on **Device**.
135+
136+
![Configure Palo Alto Single Sign-on](./media/paloaltoglobalprotect-tutorial/tutorial_paloaltoadmin_admin1.png)
137+
138+
3. Select **SAML Identity Provider** from the left navigation bar and click "Import" to import the metadata file.
139+
140+
![Configure Palo Alto Single Sign-on](./media/paloaltoglobalprotect-tutorial/tutorial_paloaltoadmin_admin2.png)
141+
142+
4. Perform following actions on the Import window
143+
144+
![Configure Palo Alto Single Sign-on](./media/paloaltoglobalprotect-tutorial/tutorial_paloaltoadmin_admin3.png)
145+
146+
a. In the **Profile Name** textbox, provide a name e.g Azure AD GlobalProtect.
147+
148+
b. In **Identity Provider Metadata**, click **Browse** and select the metadata.xml file which you have downloaded from Azure portal
149+
150+
c. Click **OK**
151+
152+
### Create Palo Alto Networks - GlobalProtect test user
153+
154+
In this section, a user called B.Simon is created in Palo Alto Networks - GlobalProtect. Palo Alto Networks - GlobalProtect supports just-in-time user provisioning, which is enabled by default. There is no action item for you in this section. If a user doesn't already exist in Palo Alto Networks - GlobalProtect, a new one is created after authentication.
155+
156+
## Test SSO
157+
158+
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
159+
160+
When you click the Palo Alto Networks - GlobalProtect tile in the Access Panel, you should be automatically signed in to the Palo Alto Networks - GlobalProtect for which you set up SSO. For more information about the Access Panel, see [Introduction to the Access Panel](https://docs.microsoft.com/azure/active-directory/active-directory-saas-access-panel-introduction).
161+
162+
## Additional resources
163+
164+
- [ List of Tutorials on How to Integrate SaaS Apps with Azure Active Directory ](https://docs.microsoft.com/azure/active-directory/active-directory-saas-tutorial-list)
165+
166+
- [What is application access and single sign-on with Azure Active Directory? ](https://docs.microsoft.com/azure/active-directory/active-directory-appssoaccess-whatis)
167+
168+
- [What is conditional access in Azure Active Directory?](https://docs.microsoft.com/azure/active-directory/conditional-access/overview)
169+
170+
- [Try Palo Alto Networks - GlobalProtect with Azure AD](https://aad.portal.azure.com/)

0 commit comments

Comments
 (0)