<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Are you using certificate profiles for Azure SAML authentication? in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/are-you-using-certificate-profiles-for-azure-saml-authentication/m-p/515549#M1668</link>
    <description>&lt;P&gt;Setting up SAML authentication for the first time from a new Azure instance and having multiple issues. I had an idea how it would work, that Azure would provide an internal CA and SAML gateway (IDP) certificate, and then assign us a certificate (w/private key) to use on the firewall. However, we are only getting a self-signed certificate for the IDP. This makes all the certificate loading/profiles on the PA fail (can't manually load a self-signed certificate, have no CA to assign to a profile, etc.).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do people normally run Azure SAML with a CA chain and certificates for endpoints? Or do you normally run with certificate signing and validation to the IDP turned off?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The default settings when setting up a SAML server is for "&lt;SPAN&gt;Validate Identity Provider Certificate", but the PA documentation shows the authentication profile as have "none" for "Certificate for signing Requests" and "Certificate Profile", which causes a confusing error on trying to save. There is a brief, easy to miss note in the PA documentation and this previous post that explain it:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/global-protect-azure-saml-authentication/m-p/309222/highlight/true#M80155" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-topics/global-protect-azure-saml-authentication/m-p/309222/highlight/true#M80155&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 21 Sep 2022 03:31:17 GMT</pubDate>
    <dc:creator>Adrian_Jensen</dc:creator>
    <dc:date>2022-09-21T03:31:17Z</dc:date>
    <item>
      <title>Are you using certificate profiles for Azure SAML authentication?</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/are-you-using-certificate-profiles-for-azure-saml-authentication/m-p/515549#M1668</link>
      <description>&lt;P&gt;Setting up SAML authentication for the first time from a new Azure instance and having multiple issues. I had an idea how it would work, that Azure would provide an internal CA and SAML gateway (IDP) certificate, and then assign us a certificate (w/private key) to use on the firewall. However, we are only getting a self-signed certificate for the IDP. This makes all the certificate loading/profiles on the PA fail (can't manually load a self-signed certificate, have no CA to assign to a profile, etc.).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do people normally run Azure SAML with a CA chain and certificates for endpoints? Or do you normally run with certificate signing and validation to the IDP turned off?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The default settings when setting up a SAML server is for "&lt;SPAN&gt;Validate Identity Provider Certificate", but the PA documentation shows the authentication profile as have "none" for "Certificate for signing Requests" and "Certificate Profile", which causes a confusing error on trying to save. There is a brief, easy to miss note in the PA documentation and this previous post that explain it:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/global-protect-azure-saml-authentication/m-p/309222/highlight/true#M80155" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-topics/global-protect-azure-saml-authentication/m-p/309222/highlight/true#M80155&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Sep 2022 03:31:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/are-you-using-certificate-profiles-for-azure-saml-authentication/m-p/515549#M1668</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2022-09-21T03:31:17Z</dc:date>
    </item>
  </channel>
</rss>

