You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/paloaltoadmin-tutorial.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -69,7 +69,7 @@ To configure and test Azure AD single sign-on with Palo Alto Networks - Admin UI
69
69
***[Create Palo Alto Networks - Admin UI test user](#create-palo-alto-networks---admin-ui-test-user)** - to have a counterpart of B.Simon in Palo Alto Networks - Admin UI that is linked to the Azure AD representation of user.
70
70
1.**[Test SSO](#test-sso)** - to verify whether the configuration works.
71
71
72
-
### Configure Azure AD single sign-on
72
+
### Configure Azure AD SSO
73
73
74
74
In this section, you enable Azure AD single sign-on in the Azure portal.
75
75
@@ -167,7 +167,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
167
167
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
168
168
1. In the **Add Assignment** dialog, click the **Assign** button.
169
169
170
-
### Configure Palo Alto Networks - Admin UI Single Sign-On
170
+
### Configure Palo Alto Networks - Admin UI SSO
171
171
172
172
1. Open the Palo Alto Networks Firewall Admin UI as an administrator in a new window.
173
173
@@ -184,13 +184,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
184
184

185
185
186
186
a. In the **Profile Name** box, provide a name (for example, **AzureAD Admin UI**).
187
-
187
+
188
188
b. Under **Identity Provider Metadata**, select **Browse**, and select the metadata.xml file that you downloaded earlier from the Azure portal.
189
-
189
+
190
190
c. Clear the **Validate Identity Provider Certificate** check box.
191
-
191
+
192
192
d. Select **OK**.
193
-
193
+
194
194
e. To commit the configurations on the firewall, select **Commit**.
195
195
196
196
5. In the left pane, select **SAML Identity Provider**, and then select the SAML Identity Provider Profile (for example, **AzureAD Admin UI**) that you created in the preceding step.
@@ -256,7 +256,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
256
256
257
257
Palo Alto Networks - Admin UI supports just-in-time user provisioning. If a user doesn't already exist, it is automatically created in the system after a successful authentication. No action is required from you to create the user.
258
258
259
-
### Test single sign-on
259
+
### Test SSO
260
260
261
261
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
0 commit comments