<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SAML with Microsoft ADFS and Group Mapping in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-microsoft-adfs-and-group-mapping/m-p/499118#M2844</link>
    <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we got an on prem domain and were using LDAP auth for GlobalProtect.&lt;/P&gt;&lt;P&gt;So everything configured, LDAP Profile, Auth Profile with userdomain and Group Mapping with userdomain.&lt;/P&gt;&lt;P&gt;In operation, a logged in user is recognized as netbios\samlaccountname - everything fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we want to utilize our ADFS on-prem server.&lt;/P&gt;&lt;P&gt;We used this guide to configure it (its for Prisma, but the same approach):&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-cloud-managed-admin/secure-mobile-users-with-prisma-access/enable-user-authentication-for-prisma-access/configure-saml-authentication-using-adfs-as-the-idp-for-mobile-users" target="_blank"&gt;https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-cloud-managed-admin/secure-mobile-users-with-prisma-access/enable-user-authentication-for-prisma-access/configure-saml-authentication-using-adfs-as-the-idp-for-mobile-users&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Even as we configured redirect on Palo side, the server retrieves Post request, so we changed that on ADFS side and now SAML SSO works - so good so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is:&lt;/P&gt;&lt;P&gt;There is no userdomain info, so our whole policyset is not matching, since the user is reported as "samaccountname" - we need "netbios\samaccountname" so that the configured LDAP group mapping is working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone has an idea how to do that with ADFS?&lt;/P&gt;&lt;P&gt;I haven't really found a good tutorial or documentation for it.&lt;/P&gt;&lt;P&gt;That relates to the settings shown in step 4 of the posting link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking really forward for any hints.&lt;/P&gt;&lt;P&gt;Windows Account Name as an outgoing claim looked good, but didn't work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Johannes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 03 Jun 2022 11:33:49 GMT</pubDate>
    <dc:creator>joschoenEXTA</dc:creator>
    <dc:date>2022-06-03T11:33:49Z</dc:date>
    <item>
      <title>SAML with Microsoft ADFS and Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-microsoft-adfs-and-group-mapping/m-p/499118#M2844</link>
      <description>&lt;P&gt;Hi Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we got an on prem domain and were using LDAP auth for GlobalProtect.&lt;/P&gt;&lt;P&gt;So everything configured, LDAP Profile, Auth Profile with userdomain and Group Mapping with userdomain.&lt;/P&gt;&lt;P&gt;In operation, a logged in user is recognized as netbios\samlaccountname - everything fine.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now we want to utilize our ADFS on-prem server.&lt;/P&gt;&lt;P&gt;We used this guide to configure it (its for Prisma, but the same approach):&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-cloud-managed-admin/secure-mobile-users-with-prisma-access/enable-user-authentication-for-prisma-access/configure-saml-authentication-using-adfs-as-the-idp-for-mobile-users" target="_blank"&gt;https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-cloud-managed-admin/secure-mobile-users-with-prisma-access/enable-user-authentication-for-prisma-access/configure-saml-authentication-using-adfs-as-the-idp-for-mobile-users&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Even as we configured redirect on Palo side, the server retrieves Post request, so we changed that on ADFS side and now SAML SSO works - so good so far.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is:&lt;/P&gt;&lt;P&gt;There is no userdomain info, so our whole policyset is not matching, since the user is reported as "samaccountname" - we need "netbios\samaccountname" so that the configured LDAP group mapping is working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does anyone has an idea how to do that with ADFS?&lt;/P&gt;&lt;P&gt;I haven't really found a good tutorial or documentation for it.&lt;/P&gt;&lt;P&gt;That relates to the settings shown in step 4 of the posting link.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking really forward for any hints.&lt;/P&gt;&lt;P&gt;Windows Account Name as an outgoing claim looked good, but didn't work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Johannes&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jun 2022 11:33:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/saml-with-microsoft-adfs-and-group-mapping/m-p/499118#M2844</guid>
      <dc:creator>joschoenEXTA</dc:creator>
      <dc:date>2022-06-03T11:33:49Z</dc:date>
    </item>
  </channel>
</rss>

