<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global protect saml using custome port number in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/530163#M3675</link>
    <description>&lt;P&gt;&amp;nbsp;we have configure the global products saml&amp;nbsp; authentication with 443 in azure AD but we need to configure with the custom port number 1194 is it possible&lt;/P&gt;</description>
    <pubDate>Tue, 07 Feb 2023 17:51:03 GMT</pubDate>
    <dc:creator>vasanth0611</dc:creator>
    <dc:date>2023-02-07T17:51:03Z</dc:date>
    <item>
      <title>Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/530163#M3675</link>
      <description>&lt;P&gt;&amp;nbsp;we have configure the global products saml&amp;nbsp; authentication with 443 in azure AD but we need to configure with the custom port number 1194 is it possible&lt;/P&gt;</description>
      <pubDate>Tue, 07 Feb 2023 17:51:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/530163#M3675</guid>
      <dc:creator>vasanth0611</dc:creator>
      <dc:date>2023-02-07T17:51:03Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577766#M4991</link>
      <description>&lt;P&gt;we encountered the same diffculty while trying to configure the GP port with a custom port number.&lt;/P&gt;
&lt;P&gt;what do we need to configure under every section if we want to use a custom port like '10443'?&lt;/P&gt;
&lt;P&gt;do i need to put ":10443" after the "test" and before the"/"?&lt;/P&gt;
&lt;P&gt;and if so do i need to do that under every section?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="naharm_0-1708442717468.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57740i58C30E7C5BA2F944/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="naharm_0-1708442717468.png" alt="naharm_0-1708442717468.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 15:25:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577766#M4991</guid>
      <dc:creator>n.major</dc:creator>
      <dc:date>2024-02-20T15:25:31Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577775#M4992</link>
      <description>&lt;P&gt;&lt;STRONG&gt;After authentication, packets from Azure's SAML requests are restricted to pass through Palo Alto firewalls only on port 443. If you require a custom port, you'll need to create two NAT policies: one for port 443 and another for the custom port.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 17:00:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577775#M4992</guid>
      <dc:creator>vasanth0611</dc:creator>
      <dc:date>2024-02-20T17:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577776#M4993</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/829494833"&gt;@n.major&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The MS doc for GP/Azure is missing the port numbers.&amp;nbsp; The PANW doc includes the port numbers (scroll down in red).&amp;nbsp; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U48CAE" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U48CAE&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The doc also answers your question.&amp;nbsp; Where do I put the port numbers and on which URLs?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 17:16:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577776#M4993</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-02-20T17:16:03Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577777#M4994</link>
      <description>&lt;P&gt;if i remember correctly i've configured it that way.&lt;BR /&gt;but as per what you say i dont need to change the SAML links on the palo alto firewall side, but i need to add a configuration of a&lt;/P&gt;
&lt;P&gt;source NAT and Destination NAT?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 17:22:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577777#M4994</guid>
      <dc:creator>n.major</dc:creator>
      <dc:date>2024-02-20T17:22:10Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577778#M4995</link>
      <description>&lt;P&gt;thank you for your reply!&lt;/P&gt;
&lt;P&gt;but in this link of KB that you sent me it is talked about as a 'regular' port and not a custom port.&lt;/P&gt;
&lt;P&gt;i have managed to make it work as expected with port number 443 (with integration to SAML).&lt;/P&gt;
&lt;P&gt;but when im changing it to a custom port on the GP-portal conf and on the azure side i get an error message.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 17:24:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577778#M4995</guid>
      <dc:creator>n.major</dc:creator>
      <dc:date>2024-02-20T17:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577779#M4996</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/829494833"&gt;@n.major&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That is what &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/229203"&gt;@vasanth0611&lt;/a&gt; said.&amp;nbsp; I haven't looked into changing the port on the PANW side, but you can use NAT to do it.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Create an outbound destination NAT rule to change the port from 443 to 10443, and it should work.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 17:28:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577779#M4996</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-02-20T17:28:49Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577780#M4997</link>
      <description>&lt;P&gt;maybe i wasn't so clear.&lt;BR /&gt;when putting the url of the portal in the webbrowser i get the correct result and i am getting a redirect to the SAML.&lt;/P&gt;
&lt;P&gt;on the SAML i get pass the credential part and get a 2FA which i approve.&lt;/P&gt;
&lt;P&gt;than my screen is getting loaded, and i get an error message.&lt;/P&gt;
&lt;P&gt;"AADSTS700016: Application with identifier '&lt;A href="https://test.com:443/SAML20/SP" target="_blank" rel="noopener"&gt;https://test.com:443/SAML20/SP&lt;/A&gt;' was not found in the directory 'test.test'. This can happen if the application has not been installed by the administrator of the tenant or consented to by any user in the tenant. You may have sent your authentication request to the wrong tenant"&lt;/P&gt;
&lt;P&gt;if you look carefully on the error you can see that it specify port number 443 and not 10443, so my feeling is that there is something wrong in the communication between the pafw and azure's SAML on the last handshake.&lt;/P&gt;
&lt;P&gt;so the network side of the configuration seems to work fine.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 20 Feb 2024 17:42:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/577780#M4997</guid>
      <dc:creator>n.major</dc:creator>
      <dc:date>2024-02-20T17:42:54Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/578067#M5007</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/829494833"&gt;@n.major&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you.&amp;nbsp; It may be best if we build a ladder diagram of the communication between the NGFW and Azure.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;NGFW initiates connection to Azure on tcp/1194.
&lt;OL&gt;
&lt;LI&gt;Put the port number in the SAML Server Profile after the domain name and before the 1st / for all 3 URLs (not tested)&lt;/LI&gt;
&lt;LI&gt;Or change the destination port with outbound NAT.&lt;/LI&gt;
&lt;LI&gt;Configure Azure to listen on that port.&lt;/LI&gt;
&lt;LI&gt;Azure replies in the same TCP session.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;LI&gt;Azure also authenticates to the public interface of the NGFW.
&lt;OL&gt;
&lt;LI&gt;GP listens on tcp/443.&lt;/LI&gt;
&lt;LI&gt;The ports in the URL I listed should be ":443" configured on the Azure side.&lt;/LI&gt;
&lt;/OL&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/229203"&gt;@vasanth0611&lt;/a&gt; , Did you get this working?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 14:37:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/578067#M5007</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-02-22T14:37:23Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/578102#M5013</link>
      <description>&lt;P&gt;Get to correct flow is this:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The user makes an authentication request to the equipment.&lt;BR /&gt;The equipment bounces and redirects the user to saml.&lt;BR /&gt;The user goes through an authentication and identification procedure with the SAML and receives a Token after successful authentication and identification.&lt;BR /&gt;With the identification token, the user returns to the equipment.&lt;BR /&gt;The equipment verifies the token against the cloud and allows access.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;so by this flow and the scenario I’m in, the failure happens when the FW verifies the token against the cloud.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Feb 2024 18:58:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/578102#M5013</guid>
      <dc:creator>n.major</dc:creator>
      <dc:date>2024-02-22T18:58:55Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/584324#M5266</link>
      <description>&lt;P&gt;I have the same problem, i think that the fw does not know how to return the authentication request to the changed port and only uses 443&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2024 10:42:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/584324#M5266</guid>
      <dc:creator>NachoR</dc:creator>
      <dc:date>2024-04-19T10:42:48Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/584403#M5270</link>
      <description>&lt;P&gt;i have not find any solution.&lt;BR /&gt;im doing it with the basic 443 port number when using SAML, so if you find a solution please&amp;nbsp;@ me.&lt;/P&gt;</description>
      <pubDate>Sun, 21 Apr 2024 11:09:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/584403#M5270</guid>
      <dc:creator>n.major</dc:creator>
      <dc:date>2024-04-21T11:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/592300#M5575</link>
      <description>&lt;P&gt;Hi Vasanth0611，&lt;/P&gt;
&lt;P&gt;I recently encountered this problem, but I don't quite understand the two NAT strategies you mentioned. Could you please explain it in more detail?&lt;/P&gt;</description>
      <pubDate>Wed, 17 Jul 2024 09:41:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/592300#M5575</guid>
      <dc:creator>liyimin</dc:creator>
      <dc:date>2024-07-17T09:41:29Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/1221896#M6520</link>
      <description>&lt;P&gt;Hello everyone,&lt;/P&gt;
&lt;P&gt;Did you manage to find a solution for custom port for the SAML Auth? &lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I am dealing with the same issue here with the error AADSTS700016.&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 09:51:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/1221896#M6520</guid>
      <dc:creator>A.Asimakopoulos</dc:creator>
      <dc:date>2025-02-25T09:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/1221934#M6523</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I don't think either my ladder diagram or &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/829494833"&gt;@n.major&lt;/a&gt;'s is correct.&amp;nbsp; I use Azure MFA for GP, and I see nothing under Monitor &amp;gt; Logs &amp;gt; Traffic between the outside interface and Azure.&amp;nbsp; Because of the URLs configured in Azure, I &lt;U&gt;assumed&lt;/U&gt; there was some communication between the two.&amp;nbsp; Right now, it looks like all the communication to Azure is from the GP client.&amp;nbsp; It looks like the GP client sends the identifier '&lt;A href="https://test.com:443/SAML20/SP" target="_blank" rel="noopener"&gt;https://test.com:443/SAML20/SP&lt;/A&gt;' to Azure.&amp;nbsp; A packet capture on the PC interface would confirm.&amp;nbsp; If that traffic does not go to or through the NGFW, we cannot use NAT to change the port.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Maybe we cannot solve this issue, but if anyone wants to do a packet capture on the PC and post the actual ladder diagram of the traffic, that would be very helpful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2025 16:59:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/1221934#M6523</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-02-25T16:59:04Z</dc:date>
    </item>
    <item>
      <title>Re: Global protect saml using custome port number</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/1238960#M7059</link>
      <description>&lt;PRE id="tw-target-text" class="tw-data-text tw-text-large tw-ta" dir="ltr" tabindex="-1" role="text" data-placeholder="Traducción" data-ved="2ahUKEwiY2I31nPyPAxUOUkEAHRTQLw0Q3ewLegQIChAV" aria-label="Texto traducido: Hello everyone, this option to change port 443 to another port and have SAML work, will not work because it uses that port by default in the SAM Identity provider server profile, there you should leave some fields that do not exist such as: entity-id, single-sign-on-url, ingle-logout-url, as long as that option does not exist it will always use 443. It would be good to consider modifying that option in some version. Regards"&gt;&lt;SPAN class="Y2IQFc"&gt;Hello everyone, this option to change port 443 to another port and have SAML work, will not work because it uses that port by default in the SAM Identity provider server profile, there you should leave some fields that do not exist such as: entity-id, single-sign-on-url, ingle-logout-url, as long as that option does not exist it will always use 443. It would be good to consider modifying that option in some version. Regards&lt;/SPAN&gt;&lt;/PRE&gt;</description>
      <pubDate>Sun, 28 Sep 2025 19:52:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-saml-using-custome-port-number/m-p/1238960#M7059</guid>
      <dc:creator>NachoR</dc:creator>
      <dc:date>2025-09-28T19:52:31Z</dc:date>
    </item>
  </channel>
</rss>

