<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Panorama admin UI - Okta SAML in Panorama Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/panorama-discussions/panorama-admin-ui-okta-saml/m-p/615436#M2602</link>
    <description>&lt;P&gt;Hi, we are trying to configure the Panorama SAML authentication within our Okta tenant, and we couldn't get it done due to an invalid sign-in certificate in the "Authentication profile" section.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have followed the following Palo Alto and Okta documents below, generated an authority certificate, and published it to the Okta app via the API call according to the Okta CSR generation process:&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXP#:~:text=updated%20it%20manually.-,Steps%20to%20configure%20CA%2Dissued%20certificate%20and%20enable%20Validate%20Identity%20Provider%20Certificate%20on%20PAN%2DOS%C2%A0,-Step%201%20%2D%20%C2%A0Add" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXP#:~:text=updated%20it%20manually.-,Steps%20to%20configure%20CA%2Dissued%20certificate%20and%20enable%20Validate%20Identity%20Provider%20Certificate%20on%20PAN%2DOS%C2%A0,-Step%201%20%2D%20%C2%A0Add&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-Admin-UI.html?baseAdminUrl=https://monday-admin.okta.com&amp;amp;app=paloaltonetworkssaml&amp;amp;instanceId=0oa158vs8abQAHd2q358" target="_blank"&gt;https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-Admin-UI.html?baseAdminUrl=https://monday-admin.okta.com&amp;amp;app=paloaltonetworkssaml&amp;amp;instanceId=0oa158vs8abQAHd2q358&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems like Palo Alto detects sign in certificates only if they are within a private key in the profile itself and not by request as Okta works (Every sign request generates a key)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm wondering how to make it work if we have a signed authority certificate that works great on Okta(the logs show it) but is not accepted by the Panorama console.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would be great if someone who is familiar with the process could give us some insights about connecting the Panorama admin UI within Okta SAML.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 28 Oct 2024 13:09:51 GMT</pubDate>
    <dc:creator>avivda</dc:creator>
    <dc:date>2024-10-28T13:09:51Z</dc:date>
    <item>
      <title>Panorama admin UI - Okta SAML</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/panorama-admin-ui-okta-saml/m-p/615436#M2602</link>
      <description>&lt;P&gt;Hi, we are trying to configure the Panorama SAML authentication within our Okta tenant, and we couldn't get it done due to an invalid sign-in certificate in the "Authentication profile" section.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We have followed the following Palo Alto and Okta documents below, generated an authority certificate, and published it to the Okta app via the API call according to the Okta CSR generation process:&lt;BR /&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXP#:~:text=updated%20it%20manually.-,Steps%20to%20configure%20CA%2Dissued%20certificate%20and%20enable%20Validate%20Identity%20Provider%20Certificate%20on%20PAN%2DOS%C2%A0,-Step%201%20%2D%20%C2%A0Add" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000008UXP#:~:text=updated%20it%20manually.-,Steps%20to%20configure%20CA%2Dissued%20certificate%20and%20enable%20Validate%20Identity%20Provider%20Certificate%20on%20PAN%2DOS%C2%A0,-Step%201%20%2D%20%C2%A0Add&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-Admin-UI.html?baseAdminUrl=https://monday-admin.okta.com&amp;amp;app=paloaltonetworkssaml&amp;amp;instanceId=0oa158vs8abQAHd2q358" target="_blank"&gt;https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-Admin-UI.html?baseAdminUrl=https://monday-admin.okta.com&amp;amp;app=paloaltonetworkssaml&amp;amp;instanceId=0oa158vs8abQAHd2q358&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It seems like Palo Alto detects sign in certificates only if they are within a private key in the profile itself and not by request as Okta works (Every sign request generates a key)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm wondering how to make it work if we have a signed authority certificate that works great on Okta(the logs show it) but is not accepted by the Panorama console.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It would be great if someone who is familiar with the process could give us some insights about connecting the Panorama admin UI within Okta SAML.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Oct 2024 13:09:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/panorama-admin-ui-okta-saml/m-p/615436#M2602</guid>
      <dc:creator>avivda</dc:creator>
      <dc:date>2024-10-28T13:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: Panorama admin UI - Okta SAML</title>
      <link>https://live.paloaltonetworks.com/t5/panorama-discussions/panorama-admin-ui-okta-saml/m-p/1000038#M2722</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/940477259"&gt;@avivda&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I propose you an alternative :&lt;/P&gt;
&lt;P&gt;- enroll the Panorama to CIE&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine&lt;/A&gt;&lt;BR /&gt;- link CIE to Okta&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-an-identity-provider-in-the-cloud-identity-engine/configure-okta-as-an-idp-in-the-cloud-identity-engine" target="_blank"&gt;https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-an-identity-provider-in-the-cloud-identity-engine/configure-okta-as-an-idp-in-the-cloud-identity-engine&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jan 2025 09:21:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/panorama-discussions/panorama-admin-ui-okta-saml/m-p/1000038#M2722</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2025-01-03T09:21:00Z</dc:date>
    </item>
  </channel>
</rss>

