Configure Mobile Users using Cloud Identity Engine (Recommended)
You first configure SAML in Azure AD, then
import the metadata XML file (the file that contains SAML registration
information) from Azure AD and upload it to a
SAML Identity
Provider
you create in Prisma Access. You then create
an Authentication Profile
that references
the IdP server profile, add the authentication profile into the
Explicit Proxy or GlobalProtect configuration, and commit and push
your changes. We recommend using Cloud Identity
Engine to set up the Azure AD SAML authentication.If
you are a GlobalProtect mobile user, upgrade your GlobalProtect
app to 6.0 version or to a later version.
- From Prisma Access, open the Cloud Identity Engine app associated with your tenant.
- Go to.Prisma AccessTenants and ServicesCloud Identity Engine
- Download the SP Metadata in the Cloud Identity Engine app.
- Go to.AuthenticationAuthentication TypesAdd New
- Set Upa SAML 2.0 authentication type.
- Download SP Metadata.
- Log in to the Azure Portal and selectAzure Active Directory.Make sure you complete all the necessary steps in the Azure portal.If you have more than one directory,Switch directoryto select the directory you want to use with the Cloud Identity Engine.
- SelectEnterprise applicationsand clickNew application.
- Search forPalo Alto Networks Cloud Identity Engine - Cloud Authentication Serviceand create the Azure AD single-sign on integration.Customize the app name if required while creating the application.
- After the application loads, selectUsers and groups, thenAdd user/grouptoAssignthem to this application.Select the users and groups you want to have use the Azure IdP in the Cloud Identity Engine for authentication.Be sure to assign the account you are using so you can test the configuration when it is complete. You may need to refresh the page after adding accounts to successfully complete the test.
- Set up single sign-onthen selectSAML.
- Upload Metadata Fileby browsing to the metadata file that you downloaded from the Cloud Identity Engine app in 2.c and clickAdd.
- After the metadata uploads, enter your regional endpoint as theSign-on URLusing the following format: https://<RegionUrl>.paloaltonetworks.com/sp/acs (where <RegionUrl> is your regional endpoint).Alternatively, copy the reply URL to the sign on URL.
- Saveyour configuration.
- DownloadtheFederation Metadata XMLunderSAML Certificates.
- Add Azure as an authentication type in the Cloud Identity Engine app.
- In Cloud Identity Engine app, select.AuthenticationAuthentication TypesAdd New
- Set Upa SAML 2.0 authentication type.
- Enter aProfile Name.
- SelectAzureas yourIDP Vendor.
- Click to Upload.
- Test SAML Setupto verify the profile configuration.
- Select the SAML attributes you want Prisma Access to use for authentication andSubmitthe IdP profile.
- Add an authentication profile.
- Select.AuthenticationAuthentication ProfilesAdd Authentication Profile
- Enter aPROFILE NAME.
- Select anAuthentication Mode.
- Add the authentication profile from Cloud Identity Engine to Prisma Access.
- In Prisma Access, select.ManageConfigurationIdentity ServicesAuthenticationAuthentication ProfilesEnsure to set the scope toGlobalProtectorExplicit Proxymobile users.
- Add Profile.
- SelectCloud Identity Engineas yourAuthentication Method.
- Enter aProfile Name.
- Select theProfileyou added in the Cloud Identity Engine app from 4.
- Savethe changes.
- Attach the authentication to mobile users.
- For GlobalProtect mobile users
- Select.ManageService SetupGlobalProtectInfrastructureAdd Authentication
- Select all required fields and theProfileyou added to Prisma Access in 5.
- Savethe changes.
- Move the authentication to the top of the list to prioritize it.
- For explicit proxy mobile users
- Select.ManageService SetupExplicit Proxy
- Edit theUser Authenticationsettings.
- Create Newprofile.
- Select theCloud Identity Engineauthentication method.
- Enter a profile name.
- Select theProfileyou added to Prisma Access in 5.
- Savethe changes.
- Move the authentication to the top of the list to prioritize it.
- (For GlobalProtect mobile users only) Edit the default browser settings for the GlobalProtect app.
- Select theDefaultapp settings.
- Go to.App ConfigurationShow Advanced OptionsAuthentication
- Select theUse Default Browser for SAML Authentication.
- Savethe changes.
- Pushthe changes.
- (Optional) Verify the user authentication.
- For GlobalProtect mobile users
- Log in to a Windows machine and connect to the GlobalProtect app.The default browser takes you to SAML authentication.
- Enter the credentials and sign in.
- ViewSettingsin the GlobalProtect app to see the connection details.
- Log in to Prisma Access and select.ActivityLogsLog ViewerYou can see that the authentication is successful.
- For explicit proxy mobile users
- Copy the PAC file URL to the endpoint.Go toto view the PAC file URL.ManageService SetupExplicit ProxyInfrastructure Settings
- Log in to a Windows machine.
- Edit theProxy Settingsand paste the PAC file URL to theScript Address.
- Access a URL that requires authentication.
- Enter the credentials.
- In Prisma Access, view the user mapping information by running theshow user ip-user-mapping allcommand.
- (Optional) In Prisma Access, select.InsightsMobile Users - Explicit ProxyView details about mobile users connected for a time range you select.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.