: Manage Third Party Identity Provider Integrations Through Common Services
Focus
Focus

Manage Third Party Identity Provider Integrations Through Common Services

Table of Contents

Manage Third Party Identity Provider Integrations Through Common Services

Learn how to manage Third Party Identity Provider Integrations through Common Services, such as: adding, updating, and deleting SAML identity providers.
Common Services: Identity and Access enables you to manage third party identity provider integrations.
Enabling third-party IDP federation affects applications and sites that get redirected to sso.paloaltonetworks.com for single sign-on.
  • Add an Identity Federation to integrate with a third party identity provider (IDP) to allow access to the platform, rather than adding users directly to the platform itself. Identity Federation enables users of different enterprises or domains to use the same digital identity to access all their applications.
  • After you add an identity federation, you can configure a Security Assertion Markup Language (SAML) provider in one of the following ways:
    SAML IDP-initiated flow is not supported for Strata Cloud Manager. Compared to SP-initiated SSO, IdP-Initiated SSO is less secure. It is susceptible to injected assertions, where an attacker steals a SAML assertion and injects it into the service provider.
  • After you add an identity federation, you can Add Additional Identity Federation Owners who can also manage the domain and the identity federation.
  • After adding identity federation owners, you can also Delete Identity Federation Owners who no longer need to manage the domain and the identity federation.
  • After you add an identity federation, you can Configure Palo Alto Networks as a Service Provider by downloading the service provider (SP) metadata from Common Services. The SP metadata helps you configure your identity provider integration with Palo Alto Networks as an SP, so that you don’t have to provide the details manually.
  • Delete an Identity Federation if you no longer need it.
  • If you want to grant authorization to your users by passing the login information through your Security Assertion Markup Language (SAML) provider, you can Map a Tenant for Authorization. By using the tenant mapping, you no longer have to add users and access directly through Common Services, but that option is still available.
  • After you map tenants for authorization, you can Update Tenant Mapping for Authorization if you need to make changes.
  • When assigning an access policy to a user or a service account (such as in mapping a tenant for SAML authorization purposes), the PAN Resource Name Mapping identifies the tenant or tenant service group (TSG) hierarchy where you are applying access policies.