<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Palo Alto Admin UI SAML authentication failures in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-admin-ui-saml-authentication-failures/m-p/999988#M5314</link>
    <description>&lt;P&gt;A few months ago, a failure occurred with SAML authentication configured between Azure and Palo Alto for firewall management. It is believed to have arisen from a flaw that occurred with Microsoft in late October and early November.&lt;/P&gt;&lt;P&gt;The issue is that the SSO works in even takes you to Microsoft authentication with their MFA and such and it redirects to the ACS URL (&lt;A href="https://my" target="_blank"&gt;https://my&lt;/A&gt; ip:443/SP/ACS) and shows that the page was not found with a 404 error. Tried reloading the configuration or the XML with the metadata to Palo Alto but still the same problem. Created a new SAML auth and authentication profile, but everything remains the same. From the Azure side it is seen that the authentication is allowed as well as the MFA validation with the mobile app used for it and following the Microsoft and Palo Alto documentation, the configuration is correct. The reason for the failure is unknown and from the Palo Alto side the traces are limited, only the client redirection to the Microsoft URL for validation via SAML is seen.&lt;/P&gt;&lt;P&gt;Translated with DeepL.com (free version).&lt;BR /&gt;&lt;BR /&gt;Does anybody know about this problem? The firmware in Palo Alto is&amp;nbsp;&lt;SPAN&gt;11.1.4-h1&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nportilla_0-1735839255571.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/65011i591E768955D06B9F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="nportilla_0-1735839255571.png" alt="nportilla_0-1735839255571.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nportilla_1-1735839291165.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/65012iFF0338668088E242/image-size/medium?v=v2&amp;amp;px=400" role="button" title="nportilla_1-1735839291165.png" alt="nportilla_1-1735839291165.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Thu, 02 Jan 2025 17:37:35 GMT</pubDate>
    <dc:creator>N.Portilla</dc:creator>
    <dc:date>2025-01-02T17:37:35Z</dc:date>
    <item>
      <title>Palo Alto Admin UI SAML authentication failures</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-admin-ui-saml-authentication-failures/m-p/999988#M5314</link>
      <description>&lt;P&gt;A few months ago, a failure occurred with SAML authentication configured between Azure and Palo Alto for firewall management. It is believed to have arisen from a flaw that occurred with Microsoft in late October and early November.&lt;/P&gt;&lt;P&gt;The issue is that the SSO works in even takes you to Microsoft authentication with their MFA and such and it redirects to the ACS URL (&lt;A href="https://my" target="_blank"&gt;https://my&lt;/A&gt; ip:443/SP/ACS) and shows that the page was not found with a 404 error. Tried reloading the configuration or the XML with the metadata to Palo Alto but still the same problem. Created a new SAML auth and authentication profile, but everything remains the same. From the Azure side it is seen that the authentication is allowed as well as the MFA validation with the mobile app used for it and following the Microsoft and Palo Alto documentation, the configuration is correct. The reason for the failure is unknown and from the Palo Alto side the traces are limited, only the client redirection to the Microsoft URL for validation via SAML is seen.&lt;/P&gt;&lt;P&gt;Translated with DeepL.com (free version).&lt;BR /&gt;&lt;BR /&gt;Does anybody know about this problem? The firmware in Palo Alto is&amp;nbsp;&lt;SPAN&gt;11.1.4-h1&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nportilla_0-1735839255571.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/65011i591E768955D06B9F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="nportilla_0-1735839255571.png" alt="nportilla_0-1735839255571.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="nportilla_1-1735839291165.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/65012iFF0338668088E242/image-size/medium?v=v2&amp;amp;px=400" role="button" title="nportilla_1-1735839291165.png" alt="nportilla_1-1735839291165.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Jan 2025 17:37:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-admin-ui-saml-authentication-failures/m-p/999988#M5314</guid>
      <dc:creator>N.Portilla</dc:creator>
      <dc:date>2025-01-02T17:37:35Z</dc:date>
    </item>
  </channel>
</rss>

