<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SAML with ADFS and GP in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/333825#M198</link>
    <description>&lt;P&gt;Hi Everyone&lt;/P&gt;&lt;P&gt;We are currently using GP with LDAP as an authentication method. This works like charm.&lt;/P&gt;&lt;P&gt;Now, we want to start using the AZURE MFA option that we have configured on our ADFS servers.&lt;BR /&gt;I’ve managed to setup the SAML between the ADFS servers (2016) and the palo alto but I can’t seem to get the VPN working.&lt;/P&gt;&lt;P&gt;I’ve followed this guide to setup the SAML authentication.&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/authentication/configure-saml-authentication.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/authentication/configure-saml-authentication.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, after following this guide, it didn’t work. I didn’t get any assertation values. I then removed the certificate from the ADFS server in the relaying party trust.&lt;BR /&gt;Now I’m seeing the incoming claims but still no luck.&lt;BR /&gt;Then I found this article: &lt;A href="https://www.reddit.com/r/paloaltonetworks/comments/8gsp9b/saml_sso_with_microsoft_adfs/" target="_blank" rel="noopener"&gt;https://www.reddit.com/r/paloaltonetworks/comments/8gsp9b/saml_sso_with_microsoft_adfs/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and this:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/adfs-saml-configuration/td-p/144886/page/2" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-topics/adfs-saml-configuration/td-p/144886/page/2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I added the 5 claims and set my user attributes.&lt;BR /&gt;Hooray I’m able to login to the portal now. However, if I try to login with the global protect client, I get the question to login to my ADFS but then the client hangs on connecting. If I check the authd log, I see that it uses a username consisting of letters and numbers.&lt;/P&gt;&lt;P&gt;Next step. I removed the all the claims and I’m now sending samaccountname as a claim and I changed the username attribute also to samaccountname on the palo alto.&lt;/P&gt;&lt;P&gt;I see the username name now in the authd log, but login does not work. The reason was that on the gateway, I configured to only allow only certain groups to be able to login to the gateway. If I set those users to any, the logon works!&lt;/P&gt;&lt;P&gt;The bad news is, now I’m unable to login to the portal.&lt;/P&gt;&lt;P&gt;I guess I’m having a problem setting the correct claims but I’m not sure to what exactely.&lt;/P&gt;&lt;P&gt;Anyone that has a similar setup that wants to share their configuration please? &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Wed, 17 Jun 2020 14:29:29 GMT</pubDate>
    <dc:creator>ASinfrastructure</dc:creator>
    <dc:date>2020-06-17T14:29:29Z</dc:date>
    <item>
      <title>SAML with ADFS and GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/333825#M198</link>
      <description>&lt;P&gt;Hi Everyone&lt;/P&gt;&lt;P&gt;We are currently using GP with LDAP as an authentication method. This works like charm.&lt;/P&gt;&lt;P&gt;Now, we want to start using the AZURE MFA option that we have configured on our ADFS servers.&lt;BR /&gt;I’ve managed to setup the SAML between the ADFS servers (2016) and the palo alto but I can’t seem to get the VPN working.&lt;/P&gt;&lt;P&gt;I’ve followed this guide to setup the SAML authentication.&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/authentication/configure-saml-authentication.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/authentication/configure-saml-authentication.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Unfortunately, after following this guide, it didn’t work. I didn’t get any assertation values. I then removed the certificate from the ADFS server in the relaying party trust.&lt;BR /&gt;Now I’m seeing the incoming claims but still no luck.&lt;BR /&gt;Then I found this article: &lt;A href="https://www.reddit.com/r/paloaltonetworks/comments/8gsp9b/saml_sso_with_microsoft_adfs/" target="_blank" rel="noopener"&gt;https://www.reddit.com/r/paloaltonetworks/comments/8gsp9b/saml_sso_with_microsoft_adfs/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;and this:&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/adfs-saml-configuration/td-p/144886/page/2" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-topics/adfs-saml-configuration/td-p/144886/page/2&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I added the 5 claims and set my user attributes.&lt;BR /&gt;Hooray I’m able to login to the portal now. However, if I try to login with the global protect client, I get the question to login to my ADFS but then the client hangs on connecting. If I check the authd log, I see that it uses a username consisting of letters and numbers.&lt;/P&gt;&lt;P&gt;Next step. I removed the all the claims and I’m now sending samaccountname as a claim and I changed the username attribute also to samaccountname on the palo alto.&lt;/P&gt;&lt;P&gt;I see the username name now in the authd log, but login does not work. The reason was that on the gateway, I configured to only allow only certain groups to be able to login to the gateway. If I set those users to any, the logon works!&lt;/P&gt;&lt;P&gt;The bad news is, now I’m unable to login to the portal.&lt;/P&gt;&lt;P&gt;I guess I’m having a problem setting the correct claims but I’m not sure to what exactely.&lt;/P&gt;&lt;P&gt;Anyone that has a similar setup that wants to share their configuration please? &lt;span class="lia-unicode-emoji" title=":smiling_face_with_smiling_eyes:"&gt;😊&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jun 2020 14:29:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/333825#M198</guid>
      <dc:creator>ASinfrastructure</dc:creator>
      <dc:date>2020-06-17T14:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: SAML with ADFS and GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/333978#M207</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Would it possible to pass the SAML attribute as domain\username? Where the domain will be the NetBIOS domain of your AD and username will be sAMAccountName&lt;BR /&gt;&lt;BR /&gt;If you're connected to a root domain controller via LDAP, we should retrieve a domain-map for all the Parent and child domains configured in the environment. Below you will see the example from my domain.&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;You can check the domain-map with the following command:&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&amp;gt; debug user-id dump domain-map&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;sus.sos.local : sus&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vsys1 dc=sus,dc=sos,dc=local&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;sos.local : sos&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vsys1 dc=sos,dc=local&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here my AD dns domain is&lt;EM&gt;&lt;STRONG&gt; 'sos.local'&lt;/STRONG&gt;&lt;/EM&gt; and Netbios&amp;nbsp; domain is '&lt;EM&gt;&lt;STRONG&gt;sos'&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;BR /&gt;You can check the user-id database to see what attributes are being pulled and normalized by the firewall, using the following command&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&amp;gt; show user user-attributes user all&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An example would be:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Primary: sos\testuser1 Email: testuser1@sos.local&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;Alt User Names:&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;1) sos\testuser1&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;2) testuser1@sos.local&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 01:59:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/333978#M207</guid>
      <dc:creator>khans</dc:creator>
      <dc:date>2020-06-18T01:59:43Z</dc:date>
    </item>
    <item>
      <title>Re: SAML with ADFS and GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/334005#M211</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;thank you for the reply!&lt;BR /&gt;I setup the settings again as in the reddit post above.&lt;/P&gt;&lt;P&gt;if I do:&lt;/P&gt;&lt;P&gt;&amp;gt; debug user-id dump domain-map&lt;BR /&gt;I get: wich is indeed our AD domain&lt;/P&gt;&lt;P&gt;my.domain.com : my&lt;BR /&gt;vsys1 dc=my,dc=domain,dc=com&lt;/P&gt;&lt;P&gt;if I do:&lt;BR /&gt;&amp;gt; show user user-attributes user all&lt;/P&gt;&lt;P&gt;Primary: global\test1&lt;BR /&gt;Alt User Names:&lt;BR /&gt;1) domainname2.com\test1&lt;BR /&gt;2) test1@domainname2.com&lt;BR /&gt;--&amp;gt; this is the user that I logged in with on the gp portal (with success)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if I check another user (one that I'm not testing with):&lt;BR /&gt;Primary: my\user2&lt;BR /&gt;Alt User Names:&lt;BR /&gt;1) my\user2&lt;BR /&gt;2) yuri.lupinov@domainname2.com&lt;/P&gt;&lt;P&gt;the thing is, we have the my.domain.com as our AD domain&lt;BR /&gt;but next to that, we have other domains the we use in our UPN&lt;BR /&gt;so user will logon with username@domainname2.com or username@domainname3.com depending on where they work.&lt;/P&gt;&lt;P&gt;so portal logon works.&lt;BR /&gt;if i want to connect with the gp client, it just hangs on connecting&lt;BR /&gt;authd last message is: find domain for auth profile: SAML; vsys vsys1&lt;/P&gt;&lt;P&gt;I also see:&lt;BR /&gt;Sent PAN_AUTH_SUCCESS SAML response:(authd_id: 6792859029119963731) (return username 'dh9FF4rL/1jWq/Pg+UoU6kqL10m3qVX8Qd5lEuZHq2w=') (auth profile 'SAML') (NameID 'dh9FF4rL/1jWq/Pg+UoU6kqL10m3qVX8Qd5lEuZHq2w=') (SessionIndex '_ca94283d-5144-49de-8602-31eccb617157') (Single Logout enabled? 'Yes')&lt;/P&gt;&lt;P&gt;so it's not sending me any domain\user info&lt;/P&gt;&lt;P&gt;I guess the next step would be to have the adfs send domain\user info?&lt;BR /&gt;any idea's on how to setup the claims then in ADFS?&lt;BR /&gt;I've tried testing with samaccountame, but it then send me test1,my\test1&lt;BR /&gt;so both versions while I was sending only 1 claim.&lt;/P&gt;&lt;P&gt;kind regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jun 2020 08:52:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/334005#M211</guid>
      <dc:creator>ASinfrastructure</dc:creator>
      <dc:date>2020-06-18T08:52:22Z</dc:date>
    </item>
    <item>
      <title>Re: SAML with ADFS and GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/334161#M215</link>
      <description>&lt;P&gt;Thank you for the information.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;So if you look at the authd logs it is picking the username from the Subject NameID, which tells me that no username attribute is being picked from the SAML response, so NameID is being used. Below is an example where no username attribute returns, so the Subject Name ID is being used.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;EM&gt;&amp;nbsp;2020-06-17 19:19:32.817 -0700 debug: _parse_sso_response(pan_authd_saml.c:1037): SAML SSO response from "&lt;A href="http://www.okta.com/exk3ot73ubmw1MhEn357" target="_blank"&gt;http://www.okta.com/exk3ot73ubmw1MhEn357&lt;/A&gt;" has &lt;STRONG&gt;no username attribute&lt;/STRONG&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;2020-06-17 19:19:32.817 -0700 debug: _parse_sso_response(pan_authd_saml.c:1040): SAML SSO response from "&lt;A href="http://www.okta.com/exk3ot73ubmw1MhEn357" target="_blank"&gt;http://www.okta.com/exk3ot73ubmw1MhEn357&lt;/A&gt;": &lt;STRONG&gt;Use saml:Subject NameID&lt;/STRONG&gt; "sahmed@sos.local" as username&lt;/EM&gt;&lt;BR /&gt;&amp;nbsp;&lt;BR /&gt;In your case, the same thing is occurring, but Subject NameID format is most likely transient, hence it has a randomly generated username and the username attribute is not being picked.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Sent PAN_AUTH_SUCCESS SAML response:(authd_id: 6792859029119963731) (return username '&lt;STRONG&gt;dh9FF4rL/1jWq/Pg+UoU6kqL10m3qVX8Qd5lEuZHq2w=&lt;/STRONG&gt;') (auth profile 'SAML') (NameID 'dh9FF4rL/1jWq/Pg+UoU6kqL10m3qVX8Qd5lEuZHq2w=') (SessionIndex '_ca94283d-5144-49de-8602-31eccb617157') (Single Logout enabled? 'Yes')&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;What is the username attribute configured in the authentication profile? the default should be the "username"&lt;BR /&gt;&lt;BR /&gt;I would suggest installing the SAML Devl Tool for chrome and then authenticating to the Portal via the browser to analyze the SAML response and checking to see what attributes are returned from your idP. See the KB link for SAML intro and where you download the SAML DevTools&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;SAML DevTools Extension&lt;BR /&gt;&lt;A href="https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio?hl=en-US" target="_blank"&gt;https://chrome.google.com/webstore/detail/saml-devtools-extension/jndllhgbinhiiddokbeoeepbppdnhhio?hl=en-US&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Introduction to SAML:&amp;nbsp;&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVvCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVvCAK&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 18 Jun 2020 18:57:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/334161#M215</guid>
      <dc:creator>khans</dc:creator>
      <dc:date>2020-06-18T18:57:50Z</dc:date>
    </item>
    <item>
      <title>Re: SAML with ADFS and GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/334971#M234</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;just wanted to update that I'm doing some more testing, so for it's either portal or gateway that's working, not both &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'll post the solution when I've found it&lt;/P&gt;&lt;P&gt;kind regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 09:31:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/334971#M234</guid>
      <dc:creator>ASinfrastructure</dc:creator>
      <dc:date>2020-06-24T09:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: SAML with ADFS and GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/336424#M258</link>
      <description>&lt;P&gt;Hi all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;this is how we got it to work:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ASinfrastructure_0-1593688769661.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26535iD521A603112BAE05/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ASinfrastructure_0-1593688769661.png" alt="ASinfrastructure_0-1593688769661.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="ASinfrastructure_1-1593688808295.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/26536iD5FE7327AC66CAD4/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="ASinfrastructure_1-1593688808295.png" alt="ASinfrastructure_1-1593688808295.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you Sakhan for the help!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;good luck&lt;BR /&gt;Roel&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jul 2020 11:21:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-adfs-and-gp/m-p/336424#M258</guid>
      <dc:creator>ASinfrastructure</dc:creator>
      <dc:date>2020-07-02T11:21:39Z</dc:date>
    </item>
  </channel>
</rss>

