<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure AD GlobalProtect Clientless Portal / SAML Domain issue in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415717#M1986</link>
    <description>&lt;P&gt;Ah...I see thank you for the responce. I'll let you know if it worked.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 28 Jun 2021 19:23:46 GMT</pubDate>
    <dc:creator>Pasquale01</dc:creator>
    <dc:date>2021-06-28T19:23:46Z</dc:date>
    <item>
      <title>Azure AD GlobalProtect Clientless Portal / SAML Domain issue</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415684#M1981</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hi All, I am able to authenticate users against the portal with SAML and Azure AD all good. Since I can't pull groups from Azure I'm using LDAP for the portal and policies also working. The issue is that the user from Azure is coming down to the firewall as doman.local\user while on prem LDAP is just domain\user. Any way to drop the .local at the firewall or has it to be done in Azure?&amp;nbsp; and if Azure how&amp;nbsp;&lt;/SPAN&gt;&lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;SPAN&gt;&amp;nbsp; Thanks&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 18:33:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415684#M1981</guid>
      <dc:creator>Pasquale01</dc:creator>
      <dc:date>2021-06-28T18:33:09Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD GlobalProtect Clientless Portal / SAML Domain issue</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415703#M1982</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/138583"&gt;@Pasquale01&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This has to be done in azure.&lt;/P&gt;
&lt;P&gt;I need to search the details on how to configure this ...&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 18:46:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415703#M1982</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-06-28T18:46:48Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD GlobalProtect Clientless Portal / SAML Domain issue</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415709#M1983</link>
      <description>&lt;P&gt;There it is &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In the azure SAML config for global protect you need to alter the claim for username to the following:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;username = Join (user.netbiosname, "\", user.onpremisessamaccountname)&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This can be done by editing the usename claim details and choosing this from the various options that are presented there.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 18:58:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415709#M1983</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-06-28T18:58:44Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD GlobalProtect Clientless Portal / SAML Domain issue</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415714#M1984</link>
      <description>&lt;P&gt;That's great, can you point me to where that is documented?&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 19:16:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415714#M1984</guid>
      <dc:creator>Pasquale01</dc:creator>
      <dc:date>2021-06-28T19:16:16Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD GlobalProtect Clientless Portal / SAML Domain issue</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415716#M1985</link>
      <description>&lt;P&gt;I have no idea where this is documented right now. I was told this by TAC support. In my situation the user was showing up correctly in the logs and so the machting for security policy rules was working fine but in the global protect configuration when I tried to create userbased configs I had to add the users in domain.local\username format and so the AD groups were not working. Then in TAC proposed this solution (as they found out this in another case from another customer) and this did the trick for me - and almost certainly will also do for you.&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 19:21:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415716#M1985</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2021-06-28T19:21:26Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD GlobalProtect Clientless Portal / SAML Domain issue</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415717#M1986</link>
      <description>&lt;P&gt;Ah...I see thank you for the responce. I'll let you know if it worked.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 19:23:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/415717#M1986</guid>
      <dc:creator>Pasquale01</dc:creator>
      <dc:date>2021-06-28T19:23:46Z</dc:date>
    </item>
    <item>
      <title>Re: Azure AD GlobalProtect Clientless Portal / SAML Domain issue</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/442159#M1987</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;hi, I have same issue and want to control user sessions by user group.&lt;/P&gt;&lt;P&gt;I want to ask you is that you have on-premise AD on your site and sync with AAD?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/graph/api/resources/user?view=graph-rest-1.0" target="_blank"&gt;https://docs.microsoft.com/en-us/graph/api/resources/user?view=graph-rest-1.0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;According to the link above (section is for "onPremisesSamAccountName"), it sounds I need on-premise AD, but I don't have..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If we only have AAD, do you know any other solution? (Maybe I should try CIE, new from palo alto. though not sure it retrieves user group from AAD)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Oct 2021 09:50:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-ad-globalprotect-clientless-portal-saml-domain-issue/m-p/442159#M1987</guid>
      <dc:creator>emr_1</dc:creator>
      <dc:date>2021-10-20T09:50:02Z</dc:date>
    </item>
  </channel>
</rss>

