Configure SAML Authentication
To configure SAML single sign-on (SSO) and single logout (SLO), you must register the firewall and the IdP with each other to enable communication between them. If the IdP provides a metadata file containing registration information, you can import it onto the firewall to register the IdP and to create an IdP server profile. The server profile defines how to connect to the IdP and specifies the certificate that the IdP uses to sign SAML messages. You can also use a certificate for the firewall to sign SAML messages. Using certificates is optional but recommended to secure communications between the firewall and the IdP.
Palo Alto Networks requires HTTPS to ensure the confidentiality of all SAML transactions instead of alternative approaches such as encrypted SAML assertions. To ensure the integrity of all messages processed in a SAML transaction, Palo Alto Networks strongly recommends requiring digital certificates to cryptographically sign all messages.
The following procedure describes how to configure SAML authentication for end users and firewall administrators. You can also configure SAML authentication for Panorama administrators.
SSO is available to administrators and to GlobalProtect and Captive Portal end users. SLO is available to administrators and GlobalProtect end users, but not to Captive Portal end users.
Administrators can use SAML to authenticate to the firewall web interface, but not to the CLI.
- (Recommended) Obtain the certificates that the IdP and firewall will use to sign SAML messages.If the certificates don’t specify key usage attributes, all usages are allowed by default, including signing messages. In this case, you can Obtain Certificates by any method.If the certificates do specify key usage attributes, one of the attributes must be Digital Signature, which is not available on certificates that you generate on the firewall or Panorama. In this case, you must import the certificates:
- Certificate the firewall uses to sign SAML messages—Import the certificate from your enterprise certificate authority (CA) or a third-party CA.
- Certificate the IdP uses to sign SAML messages—Import a metadata file containing the certificate from the IdP (see the next step). The IdP certificate is limited to the following algorithms:Public key algorithms—RSA (1,024 bits or larger) and ECDSA (all sizes). A firewall in FIPS/CC mode supports RSA (2,048 bits or larger) and ECDSA (all sizes).Signature algorithms—SHA1, SHA256, SHA384, and SHA512. A firewall in FIPS/CC mode supports SHA256, SHA384, and SHA512.
- Add a SAML IdP server profile.The server profile registers the IdP with the firewall and defines how they connect.In this example, you import a SAML metadata file from the IdP so that the firewall can automatically create a server profile and populate the connection, registration, and IdP certificate information.If the IdP doesn’t provide a metadata file, select,DeviceServer ProfilesSAML Identity ProviderAddthe server profile, and manually enter the information (consult your IdP administrator for the values).
- Export the SAML metadata file from the IdP to a client system that the firewall can access.The certificate specified in the file must meet the requirements listed in the preceding step. Refer to your IdP documentation for instructions on exporting the file.
- SelectandDeviceServer ProfilesSAML Identity ProviderImportthe metadata file onto the firewall.
- Enter aProfile Nameto identify the server profile.
- Browseto theIdentity Provider Metadatafile.
- (Recommended) SelectValidate Identity Provider Certificate(default) to have the firewall validate theIdentity Provider Certificate.Validation occurs only after you assign the server profile to an authentication profile andCommit. The firewall uses theCertificate Profilein the authentication profile to validate the certificate.Validate the certificate to ensure it hasn’t been compromised and to improve security.
- Enter theMaximum Clock Skew, which is the allowed difference in seconds between the system times of the IdP and the firewall at the moment when the firewall validates IdP messages (default is 60; range is 1 to 900). If the difference exceeds this value, authentication fails.
- ClickOKto save the server profile.
- Click the server profile Name to display the profile settings. Verify that the imported information is correct and edit it if necessary.
- Configure an authentication profile.The profile defines authentication settings that are common to a set of users.
- SelectandDeviceAuthentication ProfileAdda profile.
- Enter aNameto identify the profile.
- Set theTypetoSAML.
- Select theIdP Server Profileyou configured.
- Select theCertificate for Signing Requests.The firewall uses this certificate to sign messages it sends to the IdP. You can import a certificate generated by your enterprise CA or you can generate a certificate using the root CA that was generated on the firewall or Panorama.
- (Optional)Enable Single Logout(disabled by default).
- Select theCertificate Profilethat the firewall will use to validate theIdentity Provider Certificate.
- Enter theUsername Attributethat IdP messages use to identify users (defaultusername).When you predefine dynamic administrator roles for users, use lower-case to specify the role (for example, entersuperreader, notSuperReader). If you manage administrator authorization in the IdP identity store, specify theAdmin Role AttributeandAccess Domain Attributealso.
- SelectAdvancedandAddthe users and user groups that are allowed to authenticate with this authentication profile.
- ClickOKto save the authentication profile.
- Assign the authentication profile to firewall applications that require authentication.
- Assign the authentication profile to:
- Administrator accounts that you manage externally in the IdP identity store. Select, edit the Authentication Settings, and select theDeviceSetupManagementAuthentication Profileyou configured.
- Commityour changes.The firewall validates theIdentity Provider Certificatethat you assigned to the SAML IdP server profile.
- Create a SAML metadata file to register the firewall application (management access, Captive Portal, or GlobalProtect) on the IdP.
- Selectand, in the Authentication column for the authentication profile you configured, clickDeviceAuthentication ProfileMetadata.
- In theCommandsdrop-down, select the application you want to register:
- management(default)—Administrative access to the web interface.
- captive-portal—End user access to services and applications through Captive Portal.
- global-protect—End user access to services and applications through GlobalProtect.
- (Captive Portal or GlobalProtect only) for theVsysname Combo, select the virtual system in which the Captive Portal settings or GlobalProtect portal are defined.
- Enter the interface, IP address, or hostname based on the application you will register:
- management—For theManagement Choice, selectInterface(default) and select an interface that is enabled for management access to the web interface. The default selection is the IP address of the MGT interface.
- captive-portal—For theIP Hostname, enter the IP address or hostname of theRedirect Host(see).DeviceUser IdentificationCaptive Portal Settings
- global-protect—For theIP Hostname, enter the hostname or IP address of the GlobalProtect portal or gateway.
- ClickOKand save the metadata file to your client system.
- Import the metadata file into the IdP server to register the firewall application. Refer to your IdP documentation for instructions.
- Verify that users can authenticate using SAML SSO.For example, to verify that SAML is working for access to the web interface using a local administrator account:
- Go to the URL of the firewall web interface.
- ClickUse Single Sign-On.
- Enter the username of the administrator.
- ClickContinue.The firewall redirects you to authenticate to the IdP, which displays a login page. For example:
- Log in using your SSO username and password.After you successfully authenticate on the IdP, it redirects you back to the firewall, which displays the web interface.
- Use your firewall administrator account to request access to another SSO application.Successful access indicates SAML SSO authentication succeeded.
Configure SAML Authentication for Panorama Administrators
Configure SAML Authentication for Panorama Administrators You can use Security Assertion Markup Language (SAML) 2.0 for administrative access to the Panorama web interface (but not ...
Device > Server Profiles > SAML Identity Provider
Device > Server Profiles > SAML Identity Provider Use this page to register a Security Assertion Markup Language (SAML) 2.0 identity provider (IdP) with the ...
Configure SAML 2.0 Authentication (API)
Configure SAML 2.0 Authentication (API) Use the PAN-OS XML API to automate the configuration of SAML 2.0 single sign-on (SSO) and single logout (SLO). To ...
Set Up SAML Authentication
Set Up SAML Authentication Security Assertion Markup Language (SAML) is an XML-based, open-standard data format used to exchange authentication and authorization data between parties, specifically ...
Export SAML Meta data from an Authentication Profile
SAML Metadata Export from an Authentication Profile Device > Authentication Profile The firewall and Panorama can use a SAML identity provider (IdP) to authenticate users ...
Configure an Authentication Profile
Authentication Profile Device > Authentication Profile Select Device Authentication Profile or Panorama Authentication Profile to manage authentication profiles. To create a new profile, Add one ...
SAML You can use Security Assertion Markup Language (SAML) 2.0 to authenticate administrators who access the firewall or Panorama web interface and end users who ...
Device > Authentication Profile
Device > Authentication Profile Use this page to configure settings for authenticating administrators and end users. The firewall and Panorama support local, RADIUS, TACACS+, LDAP, ...
SAML SSO for GlobalProtect on Chromebooks
The GlobalProtect app for Chromebooks now supports SAML single sign-on. ...