Skip to content

Commit c09df7d

Browse files
committed
update
1 parent 5d248fa commit c09df7d

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

articles/active-directory/saas-apps/paloaltoadmin-tutorial.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ To configure and test Azure AD single sign-on with Palo Alto Networks - Admin UI
6969
* **[Create Palo Alto Networks - Admin UI test user](#create-palo-alto-networks---admin-ui-test-user)** - to have a counterpart of B.Simon in Palo Alto Networks - Admin UI that is linked to the Azure AD representation of user.
7070
1. **[Test SSO](#test-sso)** - to verify whether the configuration works.
7171

72-
### Configure Azure AD single sign-on
72+
### Configure Azure AD SSO
7373

7474
In this section, you enable Azure AD single sign-on in the Azure portal.
7575

@@ -167,7 +167,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
167167
1. If you're expecting any role value in the SAML assertion, in the **Select Role** dialog, select the appropriate role for the user from the list and then click the **Select** button at the bottom of the screen.
168168
1. In the **Add Assignment** dialog, click the **Assign** button.
169169

170-
### Configure Palo Alto Networks - Admin UI Single Sign-On
170+
### Configure Palo Alto Networks - Admin UI SSO
171171

172172
1. Open the Palo Alto Networks Firewall Admin UI as an administrator in a new window.
173173

@@ -184,13 +184,13 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
184184
![The "SAML Identify Provider Server Profile Import" window](./media/paloaltoadmin-tutorial/tutorial_paloaltoadmin_idp.png)
185185

186186
a. In the **Profile Name** box, provide a name (for example, **AzureAD Admin UI**).
187-
187+
188188
b. Under **Identity Provider Metadata**, select **Browse**, and select the metadata.xml file that you downloaded earlier from the Azure portal.
189-
189+
190190
c. Clear the **Validate Identity Provider Certificate** check box.
191-
191+
192192
d. Select **OK**.
193-
193+
194194
e. To commit the configurations on the firewall, select **Commit**.
195195

196196
5. In the left pane, select **SAML Identity Provider**, and then select the SAML Identity Provider Profile (for example, **AzureAD Admin UI**) that you created in the preceding step.
@@ -256,7 +256,7 @@ In this section, you'll enable B.Simon to use Azure single sign-on by granting a
256256

257257
Palo Alto Networks - Admin UI supports just-in-time user provisioning. If a user doesn't already exist, it is automatically created in the system after a successful authentication. No action is required from you to create the user.
258258

259-
### Test single sign-on
259+
### Test SSO
260260

261261
In this section, you test your Azure AD single sign-on configuration using the Access Panel.
262262

0 commit comments

Comments
 (0)