<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure SAML authentication:  validate identity provider certificate. (best pratices) in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-validate-identity-provider-certificate/m-p/575282#M2551</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;A id="link_7" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/211799" target="_self" aria-label="View Profile of zGomez"&gt;&lt;SPAN class=""&gt;ZGomez&lt;/SPAN&gt;&lt;/A&gt;, curious to know that did you checked the validate identity provider certificate. if so , then how did you get the&amp;nbsp;identity provider certificate ?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AgilysysNetOps_0-1706784054201.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57014iFFEF97FB0DE25081/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AgilysysNetOps_0-1706784054201.png" alt="AgilysysNetOps_0-1706784054201.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 01 Feb 2024 10:42:21 GMT</pubDate>
    <dc:creator>AgilysysNetOps</dc:creator>
    <dc:date>2024-02-01T10:42:21Z</dc:date>
    <item>
      <title>Azure SAML authentication:  validate identity provider certificate. (best pratices)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-validate-identity-provider-certificate/m-p/543325#M1310</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;We have configured SAML on our portal and gateway.&amp;nbsp; By default Microsoft generates a self signed certificate that is valid for 3 years for every Enterprise application you create.&lt;/P&gt;
&lt;P&gt;Is this secure enough to use the default self signed one and not validate it on my gateway/portal leave the check unmarked.&lt;/P&gt;
&lt;P&gt;According to this article it should be save if you are running the correct version of Panos.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXK" target="_blank"&gt;Securing your SAML Deployments - Knowledge Base - Palo Alto Networks&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://security.paloaltonetworks.com/CVE-2020-2021" target="_blank"&gt;CVE-2020-2021 PAN-OS: Authentication Bypass in SAML Authentication (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We could generate a certificate from our Internal PKI and upload this in Azure.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;What is the best pratice aroudn this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2023 10:18:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-validate-identity-provider-certificate/m-p/543325#M1310</guid>
      <dc:creator>zGomez</dc:creator>
      <dc:date>2023-05-25T10:18:29Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML authentication:  validate identity provider certificate. (best pratices)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-validate-identity-provider-certificate/m-p/543396#M1317</link>
      <description>&lt;P&gt;Hi there.. I think with today's modern PANOS, this not going to be an issue. We routinely do SAML cert setups in our PS organization and the Validate Cert is always disabled.&amp;nbsp; &lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 25 May 2023 22:39:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-validate-identity-provider-certificate/m-p/543396#M1317</guid>
      <dc:creator>S.Cantwell</dc:creator>
      <dc:date>2023-05-25T22:39:46Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML authentication:  validate identity provider certificate. (best pratices)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-validate-identity-provider-certificate/m-p/575282#M2551</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A id="link_7" class="lia-link-navigation lia-page-link lia-user-name-link" href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/211799" target="_self" aria-label="View Profile of zGomez"&gt;&lt;SPAN class=""&gt;ZGomez&lt;/SPAN&gt;&lt;/A&gt;, curious to know that did you checked the validate identity provider certificate. if so , then how did you get the&amp;nbsp;identity provider certificate ?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AgilysysNetOps_0-1706784054201.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/57014iFFEF97FB0DE25081/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AgilysysNetOps_0-1706784054201.png" alt="AgilysysNetOps_0-1706784054201.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2024 10:42:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-validate-identity-provider-certificate/m-p/575282#M2551</guid>
      <dc:creator>AgilysysNetOps</dc:creator>
      <dc:date>2024-02-01T10:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML authentication:  validate identity provider certificate. (best pratices)</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-validate-identity-provider-certificate/m-p/576424#M2598</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I ended up not checking the validity.&amp;nbsp; But on the Azure side you could generate, import your own certificate on the Application.&lt;/P&gt;
&lt;P&gt;Or you can download it from there (the self signed).&lt;/P&gt;
&lt;P&gt;On Entra-ID go to Enterprise applications search for you Global Protect Application, single sign-on , saml certificate here you could use your own or download the existing self signed.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You will have to import his on palo alto.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I believe it would be more safe to check the cert but also an overhead in administration.&amp;nbsp; The roll over happens every 3&amp;nbsp; years so you would also have te re-import it then on PANOS after roll over.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Feb 2024 10:16:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-validate-identity-provider-certificate/m-p/576424#M2598</guid>
      <dc:creator>zGomez</dc:creator>
      <dc:date>2024-02-07T10:16:14Z</dc:date>
    </item>
  </channel>
</rss>

