<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Azure SAML authentication from Prisma Access to Branch gateway in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/azure-saml-authentication-from-prisma-access-to-branch-gateway/m-p/554064#M550</link>
    <description>&lt;P&gt;I would like to set up Azure SAML on Prisma Access and a branch firewall that has its own Globalprotect portal. The Prisma access portion has been configured already and tested to be working properly with Azure. My set up is as follows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Prisma Access GP Portal &lt;BR /&gt;(Authentication configured on portal and gateway is Azure SAML)&lt;/P&gt;
&lt;P&gt;abc.domain.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Branch GP Portal&lt;/P&gt;
&lt;P&gt;(Authentication configured on portal and gateway is LDAP)&lt;/P&gt;
&lt;P&gt;xyz.domains.com&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;In the configuration on Prisma, I already have it configured to point to the Branch gateway as one of the options in the Prisma Portal gateway selection dropdown menu. The branch portal is not used that often directly where users just use the Prisma GP portal URL and from there jump to the gateway of the branch. &lt;BR /&gt;&lt;BR /&gt;The question is since I already have the MFA configured with a certificate on Prisma using the Prisma GP URL abc.domain.com, do I still need to create a separate certificate for the branch firewalls ? Does the difference in the Azure SAML configuration where Prisma uses a different URL and certificate than what is on the branch cause an issue for users jumping from Prisma portal to branch gateway. In other words, would it for example ask them to authenticate twice or the cached authentication information on Prisma portal login will be forwarded to branch gateway if it was selected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 17 Aug 2023 01:12:48 GMT</pubDate>
    <dc:creator>User868</dc:creator>
    <dc:date>2023-08-17T01:12:48Z</dc:date>
    <item>
      <title>Azure SAML authentication from Prisma Access to Branch gateway</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/azure-saml-authentication-from-prisma-access-to-branch-gateway/m-p/554064#M550</link>
      <description>&lt;P&gt;I would like to set up Azure SAML on Prisma Access and a branch firewall that has its own Globalprotect portal. The Prisma access portion has been configured already and tested to be working properly with Azure. My set up is as follows:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Prisma Access GP Portal &lt;BR /&gt;(Authentication configured on portal and gateway is Azure SAML)&lt;/P&gt;
&lt;P&gt;abc.domain.com&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Branch GP Portal&lt;/P&gt;
&lt;P&gt;(Authentication configured on portal and gateway is LDAP)&lt;/P&gt;
&lt;P&gt;xyz.domains.com&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;In the configuration on Prisma, I already have it configured to point to the Branch gateway as one of the options in the Prisma Portal gateway selection dropdown menu. The branch portal is not used that often directly where users just use the Prisma GP portal URL and from there jump to the gateway of the branch. &lt;BR /&gt;&lt;BR /&gt;The question is since I already have the MFA configured with a certificate on Prisma using the Prisma GP URL abc.domain.com, do I still need to create a separate certificate for the branch firewalls ? Does the difference in the Azure SAML configuration where Prisma uses a different URL and certificate than what is on the branch cause an issue for users jumping from Prisma portal to branch gateway. In other words, would it for example ask them to authenticate twice or the cached authentication information on Prisma portal login will be forwarded to branch gateway if it was selected.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Aug 2023 01:12:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/azure-saml-authentication-from-prisma-access-to-branch-gateway/m-p/554064#M550</guid>
      <dc:creator>User868</dc:creator>
      <dc:date>2023-08-17T01:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML authentication from Prisma Access to Branch gateway</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/azure-saml-authentication-from-prisma-access-to-branch-gateway/m-p/554818#M551</link>
      <description>&lt;P&gt;Not sure what the certificate is for you're referring to (hostname, client cert, authentication cert,..?)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you set up your branch gateway with a tls profile containing a valid public server certificate (so the hostname can be resolved without any certificate issues), you can add the additional gateway to your prisma access configuration.&lt;/P&gt;
&lt;P&gt;Next, you can add your gateway FQDN to the azure globalprotect enterprise application in the Single Sign-On &amp;gt;&amp;nbsp;&lt;SPAN&gt;Basic SAML Configuration as an identifier and reply URL&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;once that's done, you should be able to connect to the gateway using your prisma access portal config&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;if you were referring to the certificate as a client certificate: the gateway dictates the authentication requirements, so if you're using a client certificate in prisma access, but don't want to on the branch gateway, you can by setting the auth properties accordingly&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;hope this helps&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 09:06:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/azure-saml-authentication-from-prisma-access-to-branch-gateway/m-p/554818#M551</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-08-23T09:06:18Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML authentication from Prisma Access to Branch gateway</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/azure-saml-authentication-from-prisma-access-to-branch-gateway/m-p/554882#M552</link>
      <description>&lt;P&gt;That was very helpful, thank you! And in the Azure SAML configuration for the Globalprotect, besides adding the branch gateway as a new identifier as well as the branch Reply URL, do I need to also add the branch own Sign on URL as well or no need for that. The objective is basically to have any remote VPN user to be able to connect to the the branch from within the Prisma Access portal (by jumping to the gateway from dropdown menu) or just through the branch portal and still be using the same SAML authentication through Azure.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Aug 2023 16:25:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/azure-saml-authentication-from-prisma-access-to-branch-gateway/m-p/554882#M552</guid>
      <dc:creator>User868</dc:creator>
      <dc:date>2023-08-23T16:25:17Z</dc:date>
    </item>
    <item>
      <title>Re: Azure SAML authentication from Prisma Access to Branch gateway</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/azure-saml-authentication-from-prisma-access-to-branch-gateway/m-p/555067#M553</link>
      <description>&lt;P&gt;the signon URL is used for the portal bit, you can only have 1 in the enterprise app and this is going to be your prisma access portal URL.&lt;/P&gt;
&lt;P&gt;To have a similar SAML profile for the portal on your branch, you'll need a new enterprise application on azure for the other portal (which, if having prisma access neing your main portal, not necessary and you can basically remove the portal config from the branch)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;dont forget to like and subscribe !&lt;/P&gt;
&lt;P&gt;and mark as a solution and all that stuff :]&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Aug 2023 14:10:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/azure-saml-authentication-from-prisma-access-to-branch-gateway/m-p/555067#M553</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2023-08-24T14:10:26Z</dc:date>
    </item>
  </channel>
</rss>

