<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516063#M421</link>
    <description>&lt;P&gt;One other thing. If you have user certs that are not used from the same CA&amp;nbsp; and you delete them, the issue goes away too.&lt;/P&gt;</description>
    <pubDate>Tue, 27 Sep 2022 12:43:33 GMT</pubDate>
    <dc:creator>Carleton</dc:creator>
    <dc:date>2022-09-27T12:43:33Z</dc:date>
    <item>
      <title>Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/510609#M255</link>
      <description>&lt;P&gt;We have been able to configure the ADMIN UI to use SAML auth on the primary firewall to leverage MFA. The problem is the secondary firewall has a different URL, of course, to access it. We tried creating a second ADMIN UI, but you cannot assign a separate authentication profile to the two different management interfaces in a HA configuration. Has anyone had a workaround for this?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Aug 2022 17:38:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/510609#M255</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2022-08-02T17:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516046#M414</link>
      <description>&lt;P&gt;Hi Carleton - did you ever get around this issue?&lt;/P&gt;
&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Sep 2022 09:34:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516046#M414</guid>
      <dc:creator>CyberEng</dc:creator>
      <dc:date>2022-09-27T09:34:01Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516061#M419</link>
      <description>&lt;P&gt;I managed to resolve this by adding multiple entries in the Azure SAML Identifer and reply-urls within the azure application SSO properties.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Sep 2022 12:23:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516061#M419</guid>
      <dc:creator>CyberEng</dc:creator>
      <dc:date>2022-09-27T12:23:59Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516062#M420</link>
      <description>&lt;P&gt;I got it escalated to PA product development. When you use prelogin using a machine certificate authentication and SAML for user authentication, the SAML page on the firewall is what's causing the issue. We also are using a Windows OCSP responder to validate the certificate from a Windows server 2019 CA server.&amp;nbsp; What development came back with was it is an issue with TLS 1.2. They believe that TLS 1.3 will have support for checking for certificate OID. There is no ability to check OID of the certificate&amp;nbsp; in TLS1.2. If you have both user and machine certificates on the endpoint from the same CA, the embedded browser will prompt for a user certificate even though you are already authenticated. the workaround is to create a subordinate CA and only issue machine certificates from that CA. I found that if I used the public IP on the untrust side of the firewall and created a loopback interface using a nonroutable IP address and port 444, the issue didn't happen. You then need to nat to the untrust that loopback on 444 to port 443.&amp;nbsp; GP will only function on 443. The gotcha here is you cant use IPsec and have to use SSL VPN at the cost of about 20% or better on the performance. The more people that go to their account rep and create a request for enhancement, the more attention this will get. So far they said only 4 people have reported the issue. I see this as something more and more people are going to want to do.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Sep 2022 12:41:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516062#M420</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2022-09-27T12:41:55Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516063#M421</link>
      <description>&lt;P&gt;One other thing. If you have user certs that are not used from the same CA&amp;nbsp; and you delete them, the issue goes away too.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Sep 2022 12:43:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516063#M421</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2022-09-27T12:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516064#M422</link>
      <description>&lt;P&gt;I replied to the wrong thread, sorry. Yes we got this resolved by using a singe Enterprise app for both firelwalls&lt;/P&gt;</description>
      <pubDate>Tue, 27 Sep 2022 12:52:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516064#M422</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2022-09-27T12:52:44Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516069#M424</link>
      <description>&lt;P&gt;In the basic SAML Config, you add both firewalls as shown below&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Carleton_0-1664285656034.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/44200iB33FE2A3185709F7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Carleton_0-1664285656034.png" alt="Carleton_0-1664285656034.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Sep 2022 13:35:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516069#M424</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2022-09-27T13:35:55Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516199#M428</link>
      <description>&lt;P&gt;Thanks Carleton.&lt;/P&gt;</description>
      <pubDate>Wed, 28 Sep 2022 08:22:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/516199#M428</guid>
      <dc:creator>CyberEng</dc:creator>
      <dc:date>2022-09-28T08:22:18Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/1227375#M5824</link>
      <description>&lt;P&gt;I had same issue and support provided the following article:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boQTCAY" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boQTCAY&lt;/A&gt;&lt;BR /&gt;But since we are in Azure, I found another way to fix the issue:&amp;nbsp;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/enterprise-apps/configure-linked-sign-on" target="_blank"&gt;Add linked single sign-on to an application&lt;/A&gt;&lt;/P&gt;
&lt;DIV class="heading-wrapper" data-heading-level="h2"&gt;
&lt;H2 id="configure-linked-based-single-sign-on" class="heading-anchor"&gt;Configure linked-based single sign-on&lt;/H2&gt;
&lt;/DIV&gt;
&lt;OL&gt;
&lt;LI&gt;Sign in to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://entra.microsoft.com/" data-linktype="external" target="_blank"&gt;Microsoft Entra admin center&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;as at least a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://learn.microsoft.com/en-us/entra/identity/role-based-access-control/permissions-reference#cloud-application-administrator" data-linktype="relative-path" target="_blank"&gt;Cloud Application Administrator&lt;/A&gt;.&lt;/LI&gt;
&lt;LI&gt;Browse to&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Identity&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Applications&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Enterprise applications&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;All applications&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Search for and select the application that you want to add linked SSO.&lt;/LI&gt;
&lt;LI&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Single sign-on&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;and then select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Linked&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;LI&gt;Enter the URL for the sign-in page of the application.&lt;/LI&gt;
&lt;LI&gt;Select&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Save&lt;/STRONG&gt;.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Firewall do authenticate with the proper Authentication Profiles.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2025 18:03:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/1227375#M5824</guid>
      <dc:creator>K.Ivankova</dc:creator>
      <dc:date>2025-04-24T18:03:50Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML Authentication for Admin access - HA Pair - AZURE Enterprise APP ADMIN UI</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/1231606#M5984</link>
      <description>&lt;P&gt;Thanks K - thats good info on configuring the link-based SSO.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jun 2025 08:25:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/azure-saml-authentication-for-admin-access-ha-pair-azure/m-p/1231606#M5984</guid>
      <dc:creator>CyberEng</dc:creator>
      <dc:date>2025-06-12T08:25:33Z</dc:date>
    </item>
  </channel>
</rss>

