: Integrate Single Sign-on
Focus
Focus

Integrate Single Sign-on

Table of Contents

Integrate Single Sign-on

Integrate your organization’s SSO login flow with your Palo Alto Networks Customer Support Portal (CSP) account for your Azure Cloud NGFW subscription.
You can integrate your organization’s SSO login flow with your Palo Alto Networks Customer Support Portal (CSP) account for your Azure Cloud NGFW subscription.

Enable Third Party Identity Provider (IDP)

Enabling a third party identity provider (IDP) in the Customer Support Portal (CSP) allows you to log into the Palo Alto Networks Customer Support Portal (CSP) using your own corporate login credentials. Because you set up IDP at the domain level, members within the domain can log into multiple CSP accounts using corporate SSO login credentials. However,
domain administrator accounts
must continue to use Palo Alto Networks login credentials.
To enable third party IDP for your domain:
  • You must have the domain administrator role in the CSP to configure third-party IDP access for your account.
  • You must have administrator access on the identity provider to update the SSO configuration details provided by Palo Alto Networks.
  • You need one non-domain administrator account for verification.
  1. Log into the Azure Portal and search for
    Active Directory
    .
  2. In Active Directory, select
    Enterprise Application
    and select
    New Application
    .
  3. Enter the name for your SSO application (for example, panorama-sso) and click
    Create
    .
  4. In the
    Create your own application window
    , select
    Integrate any other application you don't find in the gallery (Non-gallery)
    .
  5. Click
    Create
    .
  6. In the
    Manage
    section, click
    Single sign-on
    .
  7. Select the
    SAML
    single sign-on method. The SAML-based sign-on page contains information you need to link your new SSO enterprise application to your Palo Alto Networks CSP account.
  8. In the SAML-based sign-on page, scroll down to locate URLs in the
    Set up [your SSO application name]
    section. Copy the
    Azure AD Identifier
    .
  9. Login to the CSP.
  10. In the CSP, select
    Account Management > Account Details
    .
  11. In the
    SSO
    section, click
    View Single Sign-On settings for your domain
    .
  12. In
    Accounts Configuration
    , paste the copied
    Azure AD identifier
    from step 8 into the
    Identifier Provider ID
    field.
  13. Return to the
    SAML-based Sign-on screen
    in the Azure portal. Scroll down to locate URLs in the
    Set up [your SSO application name]
    section. Copy the
    Login URL
    .
  14. Return to the
    Accounts Configuration
    page in the CSP. Paste the copied
    Login URL
    (from the previous step) into the
    Identity Provider SSO Service URL
    field.
  15. Use the same
    Identity Provider SSO Service URL
    address for the
    Identity Provider Destination URL
    field.
  16. Return to the
    SAML-based Sign-on
    screen in the Azure portal. Scroll down to locate the
    SAML Certificates
    section.
  17. In the SAML Certificates section, download the
    Certificate (Base64)
    .
  18. Return to the
    Account Management > Account Details
    page in the CSP. Paste the downloaded certificate (from the previous step) into the
    Identity Provider Certificate
    field.
  19. The
    Accounts Configuration
    page changes to display
    Palo Alto Service Provider Information
    . Copy the
    Entity ID
    URL.
  20. Return to the
    SAML-based Sign-on screen
    in the Azure portal.
  21. In the
    Basic SAML Configuration
    screen, click
    Edit
    .
  22. In the
    Identifier (Entity ID)
    field, click
    Add Identifier
    .
  23. Paste the Palo Alto Networks
    Entity ID
    (from step 21) into the
    Identifier
    field.
  24. Return to the
    Account Management > Account Details
    page in the CSP. Copy the
    ACS URL
    .
  25. Return to the
    SAML-based Sign-on screen
    in the Azure portal.
  26. In the
    Basic SAML Configuration
    screen, click
    Edit
    .
  27. Enter the ACS URL (copied from step 24) into the
    Reply URL (Assertion Consumer Service URL)
    .
  28. Return to the CSP
    Accounts Configuration
    page. Use the toggle button to
    Enable Identity Provider
    .
  29. Click
    Save
    .
  30. Return to the Azure Portal. In the
    Manage
    section of your SSO application, click
    Users and groups
    .
  31. Use the
    Add user/group
    option to enable use of SSO login for each specified user.

Verify SSO Login

After enabling the identity provider, all users (except domain administrators) are forced to login using SSO. To verify that SSO login is setup properly:
  • Provide an email address on the login page. Do not use domain administrator login credentials.
  • Verify that you’re redirected to the IDP login page for authentication.
  • After authentication, the Palo Alto Networks Customer Support Portal page appears.

Integrate SSO with CSP for a non-domain user using Azure Marketplace

To integrate a user with a CSP account using Azure Marketplace:
  1. Login to your Azure account.
  2. In
    Azure Services
    , select
    Cloud NGFWs by Palo Alto Networks
    .
  3. Select the firewall that you want to integrate with your CSP account.
  4. In the
    Support + troubleshooting
    section, click
    New Support Request
    . The Palo Alto Networks Support screen appears, displaying the
    Tenant ID
    and the
    Product serial number
    .
  5. Click
    Register User account and create a case at Customer Support Portal
    .
  6. On the
    Create New Account / Use Existing Account
    page, enter your email address and complete the authentication steps, then click
    Next
    .
  7. In the
    Device Registration
    section, select the
    Cloud Marketplace
    subscription from the drop-down menu. For example,
    Azure Cloud NGFW
    .
  8. Enter the
    Tenant ID
    and
    Serial Number
    for your Azure Marketplace subscription. You can copy this information from the Palo Alto Support page from Step 4. Click
    Next
    .
  9. Enter the
    Authentication code
    that was sent to your email address. Click
    Next
    .
  10. After authenticating using SSO, the CSP login page appears. Enter your email address and click
    Next
    .

Integrate SSO with CSP for a domain user using Azure Marketplace

To integrate a
domain user
with a CSP account using Azure Marketplace you’ll need your Palo Alto Networks login credentials:
  1. Login to your Azure account using
    domain user credentials
    .
  2. In
    Azure Services
    , select
    Cloud NGFWs by Palo Alto Networks
    .
  3. Select the firewall that you want to integrate with your CSP account.
  4. In the
    Support + troubleshooting
    section, click
    New Support Request
    . The Palo Alto Networks Support screen appears, displaying the
    Tenant ID
    and the
    Product serial number
  5. Click
    Register User account and create a case at Customer Support Portal
    .
  6. On the
    Create New Account / Use Existing Account
    page, enter your email address and complete the authentication steps, then click
    Next
    .
  7. In the
    Device Registration
    section, select the
    Cloud Marketplace
    subscription from the drop-down menu. For example,
    Azure Cloud NGFW
    .
  8. Enter the
    Tenant ID
    and
    Serial Number
    for your Azure Marketplace subscription. You can copy this information from the Palo Alto Support page from Step 4. Click
    Next
    .
  9. Enter the
    Authentication code
    that was sent to your email address. Click
    Next
    .
  10. After authenticating using SSO, the CSP login page appears. Enter your email address and click
    Next
    .

Recommended For You