<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Not able to normalize UPN name retrieved from SAML assertion in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/288977#M76910</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have configured SAML SSO authentication for Global protect. Microsoft Azure has the active directory we have configured it as identity provider and service provider as Palo alto global protect. Trust established between Idp and SP and we are able to authenticate portal using microsoft azure.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But the problem in allowing list in authentication profile and user/user group in Global protect gateway, When azure signs the SAML assertion from Palo alto it authenticates and sends the SAML response as UPN name from the username attribute in azure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Palo alto retived this UPN name and allowing the global protect portal and gateway configuraion only if we set the allowlist to any and user/user group to any. If we specify the username in UPN format or domain name format it is not able to validate the username and throws an error while connecting to gateway as "Matching client config not found".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;palo alto says&amp;nbsp;&lt;STRONG&gt;you cannot configure the firewall to modify the domain/username string that a user enters during SAML logins, the login username must exactly match an Allow List entry.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when I configure this UPN name as a match in allowlist or user/user group it is not matching and working. Group mapping also not working in this case as server profile will normalize only for AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to normalize UPN name to domain format or any other way to restrict the allowlist in authentication profile and user/user group in gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if you need more information.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Venky&lt;/P&gt;</description>
    <pubDate>Wed, 18 Sep 2019 18:09:00 GMT</pubDate>
    <dc:creator>Venkatesan_radhakrishnan</dc:creator>
    <dc:date>2019-09-18T18:09:00Z</dc:date>
    <item>
      <title>Not able to normalize UPN name retrieved from SAML assertion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/288977#M76910</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have configured SAML SSO authentication for Global protect. Microsoft Azure has the active directory we have configured it as identity provider and service provider as Palo alto global protect. Trust established between Idp and SP and we are able to authenticate portal using microsoft azure.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But the problem in allowing list in authentication profile and user/user group in Global protect gateway, When azure signs the SAML assertion from Palo alto it authenticates and sends the SAML response as UPN name from the username attribute in azure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Palo alto retived this UPN name and allowing the global protect portal and gateway configuraion only if we set the allowlist to any and user/user group to any. If we specify the username in UPN format or domain name format it is not able to validate the username and throws an error while connecting to gateway as "Matching client config not found".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;palo alto says&amp;nbsp;&lt;STRONG&gt;you cannot configure the firewall to modify the domain/username string that a user enters during SAML logins, the login username must exactly match an Allow List entry.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But when I configure this UPN name as a match in allowlist or user/user group it is not matching and working. Group mapping also not working in this case as server profile will normalize only for AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is there a way to normalize UPN name to domain format or any other way to restrict the allowlist in authentication profile and user/user group in gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if you need more information.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Venky&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 18:09:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/288977#M76910</guid>
      <dc:creator>Venkatesan_radhakrishnan</dc:creator>
      <dc:date>2019-09-18T18:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: Not able to normalize UPN name retrieved from SAML assertion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/289000#M76912</link>
      <description>&lt;P&gt;we also have similar issue.&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 19:38:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/289000#M76912</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-09-18T19:38:24Z</dc:date>
    </item>
    <item>
      <title>Re: Not able to normalize UPN name retrieved from SAML assertion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/289001#M76913</link>
      <description>&lt;P&gt;can we talk on this please?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;my email address is mahesh@shaw.ca&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2019 19:41:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/289001#M76913</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-09-18T19:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: Not able to normalize UPN name retrieved from SAML assertion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/303039#M78914</link>
      <description>&lt;P&gt;I ran into this issue as well and had to open a case with TAC. Turns out that you just have to specify the userPrincipalName as the primary username attribute within the Group Mapping profile. I also choose to specify the sAMAccountName as the alternate username attribute. Once this was configured, I could use AD groups in the GW client config.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Support for multiple username formats was added in 8.1:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/user-id-features/support-for-multiple-username-formats.html" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/user-id-features/support-for-multiple-username-formats.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="rgarcia565_0-1576007929434.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/22945i7F0C5BDF6C267234/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="rgarcia565_0-1576007929434.png" alt="rgarcia565_0-1576007929434.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Dec 2019 22:05:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/303039#M78914</guid>
      <dc:creator>rgarcia565</dc:creator>
      <dc:date>2019-12-10T22:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Not able to normalize UPN name retrieved from SAML assertion</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/303341#M78965</link>
      <description>&lt;P&gt;Thanks for letting us know.&lt;/P&gt;&lt;P&gt;Will test this in our environment.&lt;/P&gt;</description>
      <pubDate>Thu, 12 Dec 2019 05:24:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/not-able-to-normalize-upn-name-retrieved-from-saml-assertion/m-p/303341#M78965</guid>
      <dc:creator>MP18</dc:creator>
      <dc:date>2019-12-12T05:24:51Z</dc:date>
    </item>
  </channel>
</rss>

