<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prisma Access - User Mobile - Azure SAML - Wildcard in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/316223#M67</link>
    <description>&lt;P&gt;I have been told by Palo TAC there is an opened issue with Microsoft/Azure to find solution about the "wildcard" URL within the Azure SAML config (Identifier Entity ID)&amp;nbsp; that's look like no more supported in Azure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx.&lt;/P&gt;&lt;P&gt;D.&lt;/P&gt;</description>
    <pubDate>Fri, 13 Mar 2020 14:06:26 GMT</pubDate>
    <dc:creator>DLONGPRÉ</dc:creator>
    <dc:date>2020-03-13T14:06:26Z</dc:date>
    <item>
      <title>Prisma Access - User Mobile - Azure SAML - Wildcard</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/312830#M54</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hey guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Referring the Prisma Access Mobile User documentation&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/resources/guides/prisma-access-for-users-deployment-guide" target="_blank" rel="noopener"&gt;https://www.paloaltonetworks.com/resources/guides/prisma-access-for-users-deployment-guide&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Page-88&lt;/STRONG&gt; specify that wildcard must be used to configure the SAML Azure Enterprise Application (SSO config) :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="100%"&gt;Step 13: In the next Identifier (Entity ID) box, enter https://&lt;STRONG&gt;*&lt;/STRONG&gt;.gw.gpcloudservice.com:443/SAML20/SP.&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="100%"&gt;Step 14: In the Reply URL (Assertion Consumer Service URL) box, enter https://*.gpcloudservice.com:443/SAML20/&lt;BR /&gt;SP/ACS.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;BR /&gt;However, the wildcard utilization seems to not be supported (or not anymore supported) by Azure SAML configuration.&amp;nbsp; I tried using the APP Registration "manifest" tool, and adding the wildcard "URI" within the JSON with NO SUCCESS.&amp;nbsp; The only way that I make it worked, was by configuring the complete gateway URI, which is not scalable since "a lot of gateways" !!&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any clue on this, or have you heard something about it ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;D.&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 25 Feb 2020 16:42:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/312830#M54</guid>
      <dc:creator>DLONGPRÉ</dc:creator>
      <dc:date>2020-02-25T16:42:11Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - User Mobile - Azure SAML - Wildcard</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/312947#M55</link>
      <description>&lt;P&gt;Hi DLONGPRE,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked on Azure's documentation and unfortunately, they don't mention whether they support wildcards or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From their website:&lt;/P&gt;&lt;P&gt;Basic SAML Configuration setting SP-Initiated idP-Initiated Description&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="80px" height="113px"&gt;&lt;STRONG&gt;Identifier (Entity ID)&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="69px" height="113px"&gt;Required for some apps&lt;/TD&gt;&lt;TD width="69px" height="113px"&gt;Required for some apps&lt;/TD&gt;&lt;TD width="849px" height="113px"&gt;Uniquely identifies the application. Azure AD sends the identifier to the application as the Audience parameter of the SAML token. The application is expected to validate it. This value also appears as the Entity ID in any SAML metadata provided by the application. Enter a URL that uses the following pattern: 'https://.contoso.com'&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;You can find this value as the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;Issuer&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;element in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;AuthnRequest&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;(SAML request) sent by the application.&lt;/EM&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="80px" height="111px"&gt;&lt;STRONG&gt;Reply URL&lt;/STRONG&gt;&lt;/TD&gt;&lt;TD width="69px" height="111px"&gt;Required&lt;/TD&gt;&lt;TD width="69px" height="111px"&gt;Required&lt;/TD&gt;&lt;TD width="849px" height="111px"&gt;Specifies where the application expects to receive the SAML token. The reply URL is also referred to as the Assertion Consumer Service (ACS) URL. You can use the additional reply URL fields to specify multiple reply URLs. For example, you might need additional reply URLs for multiple subdomains. Or, for testing purposes you can specify multiple reply URLs (local host and public URLs) at one time.&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/configure-single-sign-on-non-gallery-applications" target="_blank" rel="noopener"&gt;https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/configure-single-sign-on-non-gallery-applications&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This seems to be an azure configuration limitation. Hence, I would encourage you to check with them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 02:19:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/312947#M55</guid>
      <dc:creator>SuperMario</dc:creator>
      <dc:date>2020-02-26T02:19:17Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - User Mobile - Azure SAML - Wildcard</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/312952#M56</link>
      <description>&lt;P&gt;I am also going to check with our deployment guide documentation team to double-check on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 02:39:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/312952#M56</guid>
      <dc:creator>SuperMario</dc:creator>
      <dc:date>2020-02-26T02:39:40Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - User Mobile - Azure SAML - Wildcard</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/312954#M57</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71113"&gt;@SuperMario&lt;/a&gt;&amp;nbsp; Great - thanks!!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/763"&gt;@GUIROY&lt;/a&gt;&amp;nbsp; FYI&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 02:50:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/312954#M57</guid>
      <dc:creator>Dominic_Longpre</dc:creator>
      <dc:date>2020-02-26T02:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - User Mobile - Azure SAML - Wildcard</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/313136#M58</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71113"&gt;@SuperMario&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My thought is that should be to Palo-Alto to validate with Microsoft and make sure that proposed solution still work as documented.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have open a CASE with Palo by the way...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 26 Feb 2020 15:23:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/313136#M58</guid>
      <dc:creator>DLONGPRÉ</dc:creator>
      <dc:date>2020-02-26T15:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - User Mobile - Azure SAML - Wildcard</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/316223#M67</link>
      <description>&lt;P&gt;I have been told by Palo TAC there is an opened issue with Microsoft/Azure to find solution about the "wildcard" URL within the Azure SAML config (Identifier Entity ID)&amp;nbsp; that's look like no more supported in Azure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thx.&lt;/P&gt;&lt;P&gt;D.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 14:06:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/316223#M67</guid>
      <dc:creator>DLONGPRÉ</dc:creator>
      <dc:date>2020-03-13T14:06:26Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - User Mobile - Azure SAML - Wildcard</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/316360#M70</link>
      <description>&lt;P&gt;Thank you for the update.&lt;/P&gt;</description>
      <pubDate>Sat, 14 Mar 2020 01:32:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/316360#M70</guid>
      <dc:creator>SuperMario</dc:creator>
      <dc:date>2020-03-14T01:32:35Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access - User Mobile - Azure SAML - Wildcard</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/333211#M110</link>
      <description>&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/guides/prisma-access-for-users-deployment-guide" target="_blank"&gt;https://www.paloaltonetworks.com/resources/guides/prisma-access-for-users-deployment-guide&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;FYI, I notice that new May 2020 documentation has been updated and SAML wildcard setting has been removed.from configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Dominic&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 16:55:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-user-mobile-azure-saml-wildcard/m-p/333211#M110</guid>
      <dc:creator>Dominic_Longpre</dc:creator>
      <dc:date>2020-06-12T16:55:03Z</dc:date>
    </item>
  </channel>
</rss>

