Configure Mobile Users without Cloud Identity Engine
This procedure assumes that you have a Microsoft
Azure AD account, can create and modify enterprise applications,
can set up a SAML Service Provider in Azure AD, and can download
SAML metadata XML files in Azure.
- Log in to Azure AD and open the enterprise application for either GlobalProtect or Explicit Proxy, depending on the deployment type.GlobalProtect has its own app in Azure AD; for Explicit Proxy, Palo Alto Networks does not have an existing enterprise application for Explicit Proxy and you must create one.Palo Alto Networks does not control your Azure AD setup and the UI might be different than these examples. For more information, refer to the Microsoft Azure documentation.
- GlobalProtect Deployments—Select; then, search forHomeEnterprise ApplicationsPalo Alto Networks - GlobalProtectand select thePalo Alto Networks - GlobalProtectapplication. Rename the application if required.
- Explicit Proxy Deployments—Selectand create aHomeEnterprise ApplicationsNew application; then, selectCreate your own application, give it aName, selectIntegrate any other application you don’t find in the gallery, andCreateit.After you create the application, select it.
- Set up the Azure AD application.
- Assign Users and groupsandAdd user/groupthat require the Azure AD authentication.Alternatively, you can selectUsers and groupsfrom the left navigation pane toAdd user/group.
- SelectSet up single sign onfrom the button or selectSingle sign onfrom the left navigation pane.
- In theBasic SAML Configurationarea, clickEdit.
- Enter the parameters for your Explicit Proxy or GlobalProtect deployment.
- Mobile Users—GlobalProtect Deployments—Enter the following parameters:
- In theIdentifier (Entity ID)area, enter a URL ofhttps://, whereportal-name:443/SAML20/SPportal-nameis the Mobile Users—GlobalProtect portal name (in Prisma Access select), and select that as theManageService SetupGlobalProtectDefaultentity ID.In addition, enter all gateway names in the format ofhttps://.gateway-name:443/SAML20/SPIf you are configuring a standalone GlobalProtect deployment, you can use either the FQDN or IP address of the GlobalProtect portal as theportal-name.
- In theReply URL (Assertion Consumer Service URL), re-enter the portal and gateway names, appending ACS to the URL names (https://andportal-name:443/SAML20/SP/ACShttps://, respectively). Specify the portal name as the default.gateway-name:443/SAML20/SP/ACS
- Copy thehttps://as theportal-nameSign on URL.
- Explicit Proxy Deployments—Enter the following parameters:
- In theIdentifier (Entity ID)area, enter an Entity ID ofhttps://ACS URL/saml/metadata, where the ACS URL is explicit proxy mobile users name (in Prisma Access, select) and select that as theManageService SetupExplicit ProxyDefaultidentifier.
- In theReply URL (Assertion Consumer Service URL), enter a SAML Assertion Consumer Service URL ofhttps://global.acs.prismaaccess.com/saml/acsand select that as theDefaultentity ID.
- Copy thehttps://as theportal-nameSign on URL.
- In theSet Up Single Sign-On with SAMLpane, selectEditin theUser Attributes & Claimsarea.
- Enter the following values:
- Enteruser.userprincipalnameas theUnique User Identifier (Name ID).
- In theAdditional Claimsarea, add aClaim Nameofusernameand aValueofuser.userprincipalname.You must add this claim to ensure correct username-to-IP address mapping for authenticated users.
- Export the metadata XML file from Azure AD and save it to a client system from which you can upload it to Prisma Access by clickingDownloadin theFederation Metadata XMLarea.Prisma Access requires this XML file to retrieve the correct SAML attributes from Azure AD. You upload the file when you create the SAML IdP profile in Prisma Access.
- (For GlobalProtect mobile users only) In Prisma Access, configure an authentication profile for Azure AD.The profile defines authentication settings that are common to a set of users.
- Select.ManageConfigurationIdentity ServicesAuthenticationAuthentication ProfilesMake sure that you are creating the authentication profile for GlobalProtect or explicit proxy mobile users.
- Add Profile.
- Select theSAMLauthentication method.
- Enter a profile name andImport MetaDatathat you downloaded in 3.When you import the metadata, it fills other fields.Savethis authentication profile.
- Attach the authentication profile to the mobile users.The profile defines authentication settings that are common to a set of users.
- For GlobalProtect mobile users
- SelectandManageService SetupGlobalProtectAdd Authentication.
- Enter values.Make sure you select theSAMLauthentication method and profile you created in 4.
- Savethe authentication.
- Move the authentication to the top to prioritize it.
- For explicit proxy mobile users
- Select.ManageService SetupExplicit Proxy
- Edit theUser Authenticationsettings.
- Import Metadata.
- Choose filethat you downloaded in 3.
- Import.
- Enter a name andSave.
- Pushyour changes.
- CommitandPushyour changes.
- Verify that SAML authentication is working.
- From a mobile user’s endpoint, authenticate from a supported browser.
- GlobalProtect Deployments—Open the GlobalProtect app to find the GlobalProtectPortal; then, enter the portal URL in a supported browser.
- Explicit Proxy Deployments—Navigate from a supported browser to a website that is protected by Explicit Proxy.
- When you are challenged for authentication, verify that you are redirected to Azure AD and are presented with a login page.After you successfully authenticate to Azure AD, Azure AD redirects you to Prisma Access. Prisma Access then validates the SAML responses from Azure AD and the mobile user should be allowed to visit the website (for Explicit Proxy deployments) or you can successfully log in to the GlobalProtect portal (for GlobalProtect deployments).
- View the logs and verify that the mobile user’s username is displayed in the Traffic, URL Filtering, and Authentication logs.
Most Popular
Recommended For You
Recommended Videos
Recommended videos not found.