<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure  SAML Authentication with multiple PAs in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/470674#M2547</link>
    <description>&lt;P&gt;I have added different identifier and still not working,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sat, 05 Mar 2022 11:39:11 GMT</pubDate>
    <dc:creator>BalaBWV</dc:creator>
    <dc:date>2022-03-05T11:39:11Z</dc:date>
    <item>
      <title>Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/386281#M927</link>
      <description>&lt;P&gt;Hey,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a GP configuration with 8 GP Gateways and 2 of them are acting as a GP Portal for backup.&lt;/P&gt;&lt;P&gt;We are using SAML authentication with Azure and wanted to know how to you deploy GP with SAML authentication in large scale.&lt;/P&gt;&lt;P&gt;Currently I have configured 3 SAML apps on Azure one for each PA device but I think it is not the right configuration since now I am getting that each SAML App's domain need to be unique and the Portal domain is for example: vpn.company.com and I need to deploy it to 2 SAML Apps.&lt;/P&gt;&lt;P&gt;My assumptions are that because we only use SP Initiated SAML authentication meaning that the authentication process starts at the PA device I can just add all of the domains that are relevant on a single SAML App and install that Metadata file on all of the Pas. Am I right ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="screenshot.png" style="width: 595px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29960i982BD3DCD7C83607/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="screenshot.png" alt="screenshot.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 05:18:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/386281#M927</guid>
      <dc:creator>minow</dc:creator>
      <dc:date>2021-02-17T05:18:18Z</dc:date>
    </item>
    <item>
      <title>Re: Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/386309#M928</link>
      <description>&lt;P&gt;I just have installed 2 standalone Palo Alto's with SAML. With only 1 Enterprise App in Azure.&lt;/P&gt;&lt;P&gt;So i don't think you need more apps.&lt;/P&gt;&lt;P&gt;Why would you need 2 Apps ?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 11:35:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/386309#M928</guid>
      <dc:creator>sebastianvd</dc:creator>
      <dc:date>2021-02-17T11:35:46Z</dc:date>
    </item>
    <item>
      <title>Re: Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/386317#M929</link>
      <description>&lt;P&gt;probably my missunderstanding.&lt;/P&gt;&lt;P&gt;so you have put both of the PA's URLs on the SAML App on Azure ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;and import the metadata to both of the PAs ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 12:05:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/386317#M929</guid>
      <dc:creator>minow</dc:creator>
      <dc:date>2021-02-17T12:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/386362#M930</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes i've add both PA URL's in Azure in the same app, see below.&lt;/P&gt;&lt;P&gt;In our case we use an Azure Loadbalancer for the balanced portal configuration.&lt;/P&gt;&lt;P&gt;That portal points to the direct addresses of the firewall for the gateway connectivity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="sebastianvd_1-1613568045808.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/29971iFEC4044C03F6C2FF/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="sebastianvd_1-1613568045808.png" alt="sebastianvd_1-1613568045808.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The whole point of SSO/SAML is to use a single identity provider/authentication provider (Azure AD in this case) and have multiple serviceproviders (GP Portal and Gateways in this case) use it.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 13:22:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/386362#M930</guid>
      <dc:creator>sebastianvd</dc:creator>
      <dc:date>2021-02-17T13:22:06Z</dc:date>
    </item>
    <item>
      <title>Re: Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/387752#M952</link>
      <description>&lt;P&gt;Did you manage to get it working ?&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2021 08:26:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/387752#M952</guid>
      <dc:creator>sebastianvd</dc:creator>
      <dc:date>2021-02-25T08:26:09Z</dc:date>
    </item>
    <item>
      <title>Re: Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/457464#M2272</link>
      <description>&lt;P&gt;with single enterprise agent deployed you should be fine.&lt;/P&gt;&lt;P&gt;You just need to add multiple Identifier ( each fw for example ) and reply URL&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jan 2022 08:41:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/457464#M2272</guid>
      <dc:creator>fatboy1607</dc:creator>
      <dc:date>2022-01-07T08:41:27Z</dc:date>
    </item>
    <item>
      <title>Re: Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/470673#M2546</link>
      <description>&lt;P&gt;Hi, is this working? I'm trying to implement the same&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2022 11:38:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/470673#M2546</guid>
      <dc:creator>BalaBWV</dc:creator>
      <dc:date>2022-03-05T11:38:02Z</dc:date>
    </item>
    <item>
      <title>Re: Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/470674#M2547</link>
      <description>&lt;P&gt;I have added different identifier and still not working,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Mar 2022 11:39:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/470674#M2547</guid>
      <dc:creator>BalaBWV</dc:creator>
      <dc:date>2022-03-05T11:39:11Z</dc:date>
    </item>
    <item>
      <title>Re: Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/470745#M2548</link>
      <description>&lt;P&gt;yes it is working as i described, 1 enterprise SAML application with all the domains that your PA are using by the way if you have a lot i thing your can use *.my.domain for example (although i don't think it is best practice)&lt;/P&gt;&lt;P&gt;if you have problems you can try the "miniOrange SAML Tracer" extention maybe you will see the SAML Assertions&lt;/P&gt;</description>
      <pubDate>Sun, 06 Mar 2022 09:12:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/470745#M2548</guid>
      <dc:creator>minow</dc:creator>
      <dc:date>2022-03-06T09:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/470815#M2550</link>
      <description>&lt;P&gt;Thank you for the reply,&amp;nbsp; I use the Globalprotect portal in Azure, like this, "vpn-xxx.domain.com" and it's working fine.&amp;nbsp; For gateway , its running in on-prem firewall "vpn-yyy.domain.com" ,&amp;nbsp; I have added&amp;nbsp; vpn-yyy.domain.com in the "vpn-xxx.domain.com" ( same Azure Enterprise app) and imported metadata. Still not working. I'll try the fresh installation.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Mar 2022 07:36:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/470815#M2550</guid>
      <dc:creator>BalaBWV</dc:creator>
      <dc:date>2022-03-07T07:36:24Z</dc:date>
    </item>
    <item>
      <title>Re: Azure  SAML Authentication with multiple PAs</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/472234#M2561</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/119093"&gt;@BalaBWV&lt;/a&gt;&amp;nbsp;, if AAD responds with "invalid identifier" make sure you've included the port in the Entity ID in the Enterprise app like in&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/3467"&gt;@sebastianvd&lt;/a&gt;'s screenshot, i.e. &lt;A href="https://vpn-yyy.domain.com:443/SAML20/SP" target="_blank"&gt;https://vpn-yyy.domain.com:443/SAML20/SP&lt;/A&gt; as that is what the auth profile presents to the client / SP in the request. As long as you have both identities and ACS included in the app it should work for both portal and gateway.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Mar 2022 04:29:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azure-saml-authentication-with-multiple-pas/m-p/472234#M2561</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2022-03-11T04:29:33Z</dc:date>
    </item>
  </channel>
</rss>

