<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Prisma Access Custom Portal Name in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-custom-portal-name/m-p/1205255#M1058</link>
    <description>&lt;P&gt;Hello everyone!&lt;/P&gt;
&lt;P&gt;I am looking into setting up custom portal name in Prisma access GP VPN.&lt;/P&gt;
&lt;P&gt;Currently configured is&lt;BR /&gt;Paloalto CIE &amp;lt;&amp;gt; MS Azure AD (Entra ID) integration completed&lt;BR /&gt;GlobalProtect &amp;lt;&amp;gt; PA CIE SAML authentication integration completed&lt;BR /&gt;When accessing ~.gpcloudservice.com with GP Agent, connection established with Azure AD SAML authentication.&lt;/P&gt;
&lt;P&gt;I checked that there is a Saml signing cert method in the custom portal name &amp;gt; Portal Certificate setting.&lt;/P&gt;
&lt;P&gt;My question is this.&lt;/P&gt;
&lt;P&gt;Download SAML certificate from Azure AD and distribute and install it to the client &amp;gt; Is the GPcloudservice authentication method correct through the SAML certificate that the user has?&lt;/P&gt;
&lt;P&gt;When using the custom portal name method, I think it would be correct to distribute a SAML certificate to the client since it is a method for encrypting the connection between the user &amp;lt;&amp;gt; GP Cloud service.&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
    <pubDate>Fri, 24 Jan 2025 03:02:55 GMT</pubDate>
    <dc:creator>C.Seokgun</dc:creator>
    <dc:date>2025-01-24T03:02:55Z</dc:date>
    <item>
      <title>Prisma Access Custom Portal Name</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-custom-portal-name/m-p/1205255#M1058</link>
      <description>&lt;P&gt;Hello everyone!&lt;/P&gt;
&lt;P&gt;I am looking into setting up custom portal name in Prisma access GP VPN.&lt;/P&gt;
&lt;P&gt;Currently configured is&lt;BR /&gt;Paloalto CIE &amp;lt;&amp;gt; MS Azure AD (Entra ID) integration completed&lt;BR /&gt;GlobalProtect &amp;lt;&amp;gt; PA CIE SAML authentication integration completed&lt;BR /&gt;When accessing ~.gpcloudservice.com with GP Agent, connection established with Azure AD SAML authentication.&lt;/P&gt;
&lt;P&gt;I checked that there is a Saml signing cert method in the custom portal name &amp;gt; Portal Certificate setting.&lt;/P&gt;
&lt;P&gt;My question is this.&lt;/P&gt;
&lt;P&gt;Download SAML certificate from Azure AD and distribute and install it to the client &amp;gt; Is the GPcloudservice authentication method correct through the SAML certificate that the user has?&lt;/P&gt;
&lt;P&gt;When using the custom portal name method, I think it would be correct to distribute a SAML certificate to the client since it is a method for encrypting the connection between the user &amp;lt;&amp;gt; GP Cloud service.&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 24 Jan 2025 03:02:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-custom-portal-name/m-p/1205255#M1058</guid>
      <dc:creator>C.Seokgun</dc:creator>
      <dc:date>2025-01-24T03:02:55Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access Custom Portal Name</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-custom-portal-name/m-p/1219845#M1084</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/373103033"&gt;@C.Seokgun&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Hello everyone!&lt;/P&gt;
&lt;P&gt;I am looking into setting up custom portal name in Prisma access GP VPN.&lt;/P&gt;
&lt;P&gt;Currently configured is&lt;BR /&gt;Paloalto CIE &amp;lt;&amp;gt; MS Azure AD (Entra ID) integration completed&lt;BR /&gt;GlobalProtect &amp;lt;&amp;gt; PA CIE SAML authentication integration completed&lt;BR /&gt;When accessing ~.gpcloudservice.com with GP Agent, connection established with Azure AD SAML authentication.&lt;/P&gt;
&lt;P&gt;I checked that there is a Saml signing cert method in the custom portal name &amp;gt; Portal Certificate setting.&lt;/P&gt;
&lt;P&gt;My question is this.&lt;/P&gt;
&lt;P&gt;Download SAML certificate from Azure AD and distribute and install it to the client &amp;gt; Is the GPcloudservice authentication method correct through the SAML certificate that the user has?&lt;/P&gt;
&lt;P&gt;When using the custom portal name method, I think it would be correct to distribute a SAML certificate to the client since it is a method for encrypting the connection between the user &amp;lt;&amp;gt; GP Cloud service.&lt;/P&gt;
&lt;P&gt;Thank you.&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/373103033"&gt;@C.Seokgun&lt;/a&gt;&amp;nbsp;,&amp;nbsp;Yes, distributing and installing the SAML certificate from Azure AD to the client is the correct approach for ensuring secure authentication through the GP Cloud service. When using the custom portal name method, distributing the SAML certificate to the client ensures that the connection between the user and the GP Cloud service is encrypted and authenticated properly. Reference Document:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U48CAE" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U48CAE&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 09 Feb 2025 02:18:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-custom-portal-name/m-p/1219845#M1084</guid>
      <dc:creator>Vickynet</dc:creator>
      <dc:date>2025-02-09T02:18:07Z</dc:date>
    </item>
  </channel>
</rss>

