To configure
SAML single
sign-on (SSO) and single logout (SLO), you must register the firewall
and the IdP with each other to enable communication between them.
If the IdP provides a metadata file containing registration information,
you can import it onto the firewall to register the IdP and to create
an IdP server profile. The server profile defines how to connect
to the IdP and specifies the certificate that the IdP uses to sign
SAML messages. You can also use a certificate for the firewall to
sign SAML messages. Using certificates is a requirement to secure
communications between the firewall and the IdP.
Palo Alto
Networks requires HTTPS to ensure the confidentiality of all SAML
transactions instead of alternative approaches such as encrypted
SAML assertions. To ensure the integrity of all messages processed
in a SAML transaction, Palo Alto Networks requires digital certificates
to cryptographically sign all messages.
SSO
is available to administrators and to GlobalProtect and Authentication
Portal end users. SLO is available to administrators and GlobalProtect
end users, but not to Authentication Portal end users.
Administrators
can use SAML to authenticate to the firewall web interface, but
not to the CLI.