: Configure Entra ID SAML Integration for Authentication and Authorization
Focus
Focus

Configure Entra ID SAML Integration for Authentication and Authorization

Table of Contents

Configure Entra ID SAML Integration for Authentication and Authorization

Configure SAML integration where Microsoft Entra ID handles both user authentication and authorization, with roles and permissions defined in Entra ID.
This section describes how to configure a Security Assertion Markup Language (SAML) integration where Microsoft Entra ID acts as the identity provider and the SCM platform acts as the Service Provider (SP). In this setup, Entra ID is used for both user authentication and authorization—users sign in through Entra ID, and their roles and permissions are also defined and managed there.
  1. Add and verify your domain.
    This step establishes the trust boundary between your tenant and domain through DNS verification. You add your organization's domain and verify ownership by adding a DNS TXT record. This verification is required for creating an identity federation and is the foundation for all subsequent SSO configuration.
    1. Use one of the various ways to access Common ServicesIdentity & Access.
    2. Select Identity & Access.
    3. Select Identity & Access/Access ManagementIdentity FederationsAdd Identity Federation to add an identity federation.
    4. Add the Domain information for your enterprise.
      The character limit is 50. Special characters are not allowed, with the exception of "-" and "."
    5. Select Next.
    6. Follow the Instructions for Verification to add a DNS record within your domain name provider.
      1. Copy the TXT record from Common Services.
      2. Select Finish.
      3. Go to your domain provider's console and paste the TXT record, so that Palo Alto Networks can verify that you are an owner of the domain.
      4. (Optional) In the domain provider's console, revise your identity provider's time to live (TTL) setting if you need a faster refresh rate. The TTL setting impacts, for example, how long it takes to verify ownership of the identity federation.
    7. In Common Services, select Verify Now to verify ownership of the identity federation.
  2. Download the SAML metadata.
    After you add an identity federation, you can configure Palo Alto Networks as a service provider by downloading the service provider (SP) metadata from Common Services. The SP metadata helps you configure your identity provider integration with Palo Alto Networks as an SP, so that you don't have to provide the details manually.
    1. Use one of the various ways to access Common ServicesIdentity & Access.
    2. Select Identity & Access/Access ManagementIdentity Federations.
    3. Scroll to your identity federation and select Download SP Metadata.
    Save the metadata file in a secure location. You need this file to upload to Entra ID. The metadata file contains the Entity ID, Assertion Consumer Service (ACS) URL, and certificate that Entra ID needs to send SAML assertions.
  3. Create an enterprise application in Entra ID and configure it to use SAML for single sign-on.
    1. Log in to the Entra ID Portal with your Cloud Application Administrator or Application Administrator account.
    2. Select Enterprise applications.
    3. Select the application that you enabled for SAML authentication.
    4. In the enterprise application, go to Single sign-onSet up Single Sign-On and then select SAML.
    5. Select SAML.
    6. On the SAML configuration page, click Upload metadata file and select the metadata file you downloaded in the previous step.
    7. After uploading the metadata, verify that the following fields are correctly populated in the Basic SAML Configuration section:
      • Identifier (Entity ID)- The Entity ID from the metadata
      • Reply URL (ACS URL) - The SAML assertion consumer service endpoint
      • Logout URL- The logout endpoint
    8. If any field is incorrect, click Edit in the Basic SAML Configuration section and update the values to match the metadata.
  4. Create users and groups in Entra ID and map the user group to the enterprise application to authorize which users can access the platform.
    1. In the Entra ID portal, open the enterprise application that you created.
    2. Add new users to the application.
    3. Create a new user group and assign users to the group.
    4. Assign the user group to the enterprise application.
  5. Configure SAML claims and access policies in Entra ID to pass user role information based on group membership.
    1. In the Entra ID portal, open the enterprise application you created and select Single sign-onAttributes & Claims.
    2. Remove all existing claims and add the following new claims:
      Claim NameClaim Value
      firstNameuser.firstName
      lastNameuser.lastName
      emailuser.email
    3. Create a conditional claim with the source attribute pointing to the role and Tenant Service Group (TSG) ID.
      Scoped Group: Add the group whose members are authorized using the claim value that includes the role and TSG ID.
      Claim value format: <predefined_role_name or custom_role_id>@prn:<TSG_ID>:<app_id>:<region>:<instance>:<resource_scope>
      For the role-name or role-id in the claim value:
    4. Click Save to apply all changes.
    5. Click Download next to Federation Metadata XML to download the Entra ID metadata file.
      Save the metadata file in a secure location. You need this file to upload to the platform.
  6. Upload the Entra ID metadata to complete the integration.
    1. Use one of the various ways to access Common ServicesIdentity & Access.
    2. Select Common ServicesIdentity & AccessIdentity Federations.
    3. Select Configure Identity Provider.
    4. Select Upload Metadata and choose the file downloaded in the previous step.
    5. After the provider profile fields auto-populate, select Finish.
    6. The Configure Identity Provider button is replaced with the Login URL. Select ActionsEnable.
      The Login URL is how Palo Alto Networks knows where to send the user when they log in. This is disabled by default.
  7. Map a tenant for authorization.
    If you want to grant authorization to your users by passing the login information through your SAML provider, you can map your identity federation to a tenant or tenant service group (TSG) hierarchy. By using the tenant mapping, you no longer have to add users and access directly through Common Services, but that option is still available.
    After you add an identity federation and add an identity federation owner, the federation owner can map tenants for authorization. In addition to adding an admin as a federation owner, you must also give that admin a role that has permissions to assign and remove access policies on the given tenant, such as the following:
    • IAM Administrator
    • Multitenant IAM Administrator
    • Multitenant Superuser
    • Superuser
    • Custom role that includes iam.federation_mapping.update and iam.federation_mapping.delete
    1. Use one of the various ways to access Identity & Access.
    2. Select Identity & Access/Access ManagementIdentity Federations.
    3. Scroll or search to find your identity federation.
    4. Select Edit Tenant Mapping for Authorization.
    5. Select which tenants can map users to the identity federation users and Save.
      Inheritance applies the same way as it does in access management. If you map a tenant at the top level of the hierarchy, the child tenants nested below it inherit the mapping so that the parent can manage them.
    6. The identity federation owner can now manage the user access for all the selected tenant service groups.