<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article PANCast™ Episode 52: How to Set up SP-Initiated SSO in Prisma Cloud (SaaS) with OIDC using Okta (IdP) in PANCast™ Episodes</title>
    <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-52-how-to-set-up-sp-initiated-sso-in-prisma/ta-p/1220336</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F__m4FfnLpvs%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D__m4FfnLpvs&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F__m4FfnLpvs%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="PANCast™ Ep 52: How to Set up SP-Initiated SSO in Prisma Cloud (SaaS) with OIDC using Okta (IdP)" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;&lt;EM&gt;Episode Transcript:&lt;/EM&gt;&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John A.:&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Hello PANCasters, welcome back! Today we’re diving into another exciting topic about Prisma Cloud. We’ll be discussing how to set up SP-Initiated SSO in Prisma Cloud using OIDC with Okta as the Identity Provider. Joining us is our expert, Roshan. Welcome back, Roshan! Can you introduce yourself to our listeners?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Roshan T.:&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you, John! Hello, everyone. I’m Roshan, a Staff Technical Support Engineer for Prisma Cloud. I have several years of experience in&lt;span class="lia-inline-image-display-wrapper lia-image-align-right" image-alt="Roshan Tulsani is a Staff Technical Support Engineer for Prisma Cloud and Compute, and has a vast experience in the Support Environment. He is passionate about sharing his knowledge and expertise with customers." style="width: 239px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66125i085DA6D49374D68F/image-dimensions/239x371?v=v2" width="239" height="371" role="button" title="Roshan-T_palo-alto-networks.png.jpg" alt="Roshan Tulsani is a Staff Technical Support Engineer for Prisma Cloud and Compute, and has a vast experience in the Support Environment. He is passionate about sharing his knowledge and expertise with customers." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Roshan Tulsani is a Staff Technical Support Engineer for Prisma Cloud and Compute, and has a vast experience in the Support Environment. He is passionate about sharing his knowledge and expertise with customers.&lt;/span&gt;&lt;/span&gt; cybersecurity and cloud security solutions, and I’m thrilled to share insights on this topic with you today.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John A.:&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks, Roshan. Let’s start with the basics. What exactly is SP-Initiated SSO with OIDC?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Roshan T.:&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Great question, John. SP-Initiated SSO, or Service Provider-Initiated Single Sign-On, is like having a master key that grants access to various applications. Here, Prisma Cloud acts as the Service Provider (SP), and Okta serves as the Identity Provider (IdP).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;OIDC, or OpenID Connect, is the protocol used for authentication. It operates in the application layer of the OSI model and issues ID tokens and access tokens. These tokens carry user identity information and other attributes, enabling seamless and secure authentication.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John A.:&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That’s a helpful overview. Can you give us a fun analogy to understand this better?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Roshan T.:&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Absolutely! Imagine John Wick, the legendary assassin, trying to access a high-security network of assassin hotels. Normally, he’d need a unique key and password for each hotel. But with SSO, he uses a master coin from the High Table—the Identity Provider.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Each hotel (Service Provider) trusts the High Table’s authentication. So, instead of verifying John Wick directly, they rely on the High Table to confirm the validity of his coin, granting him seamless access. In our scenario, Prisma Cloud is the hotel, and Okta is the High Table.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John A.:&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Great analogy! Now, can you walk us through the OIDC authentication flow?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Roshan T.:&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Certainly! Here’s how it works:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Verification Request:&lt;/STRONG&gt;&lt;SPAN&gt; When a user attempts to access Prisma Cloud (SP), it sends a request to Okta (IdP) containing details like:&lt;/SPAN&gt;&lt;SPAN&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Client ID:&lt;/STRONG&gt;&lt;SPAN&gt; The unique identifier for Prisma Cloud.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Redirect URI:&lt;/STRONG&gt;&lt;SPAN&gt; The URL where Okta should send its response.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Scope:&lt;/STRONG&gt;&lt;SPAN&gt; The type of access requested, such as profile or email.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;State:&lt;/STRONG&gt;&lt;SPAN&gt; A token to prevent attacks.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Response Type:&lt;/STRONG&gt;&lt;SPAN&gt; Typically a verification code.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="2"&gt;&lt;STRONG&gt;Nonce:&lt;/STRONG&gt;&lt;SPAN&gt; A unique string to link the session with the ID token, preventing replay attacks&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;LI&gt;&lt;STRONG&gt;Authentication Process:&lt;/STRONG&gt;&lt;SPAN&gt; Here, the user is redirected to Okta, which validates their credentials and issues an ID token&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Access Granted:&lt;/STRONG&gt;&lt;SPAN&gt; Prisma Cloud receives the token, verifies it, and grants the user access.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John A.:&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thanks for breaking that down! So how do we configure Okta and Prisma Cloud at a high level?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Roshan T.:&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Setting up Okta and Prisma Cloud for SP-Initiated SSO involves two main steps:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG style="font-family: inherit;"&gt;Configuring Okta:&lt;/STRONG&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN&gt;Create a new application in Okta for Prisma Cloud using OIDC&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Add Prisma Cloud’s Callback URL in the application’s Sign-in Redirect URIs and enable Federation Broker Mode that allows users access to the application without explicit preassignment&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Retrieve essential metadata, such as the Client ID, Client Secret, and endpoints, from Okta's well-known URL&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;2. &lt;STRONG style="font-family: inherit;"&gt;Setting Up Prisma Cloud:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Enable OIDC under SSO settings in Prisma Cloud and input the Client ID, Client Secret, and endpoints retrieved from Okta&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Enable Just-in-Time (JIT) provisioning to auto-create user accounts when they log in.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Create a user with attributes matching those in Okta or let JIT provisioning handle it automatically&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John A.:&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That sounds straightforward. However, as we know, real-world setups don’t always go smoothly. Are there any common mistakes or missteps people should watch out for when implementing this setup?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Roshan T.:&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Absolutely, John. While the setup is relatively straightforward, there are some common misconfigurations to be mindful of. Thankfully, Prisma Cloud and Okta provide error messages that help pinpoint issues. For example, if the client secret copied from Okta to Prisma Cloud is incorrect, you might see an error like: &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;"The client secret supplied for a confidential client is invalid."&lt;/SPAN&gt;&lt;/I&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here are some of the common issues and how to address them:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Incorrect Client ID or Client Secret:&lt;/STRONG&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;SPAN&gt;Double-check that the Client ID and Client Secret are correctly copied from Okta and input into Prisma Cloud.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;Missing or Incorrect Callback URL:&lt;/STRONG&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;SPAN&gt;Ensure Prisma Cloud’s Callback URL is added under the Sign-in Redirect URIs in Okta.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;User Not Assigned to the Application in Okta: &lt;/STRONG&gt;&lt;SPAN&gt;Assign users to the application in Okta or enable Federation Broker Mode&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;STRONG&gt;User Not Present in Prisma Cloud: &lt;/STRONG&gt;&lt;SPAN&gt;Use Just-in-Time Provisioning or manually add users in Prisma Cloud&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;SPAN&gt;By keeping these points in mind, troubleshooting becomes much simpler, and you can resolve most issues quickly.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John A.:&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;That’s incredibly useful, Roshan. Are there any additional resources or best practices you’d recommend?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&lt;I&gt;Roshan T.:&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Yes, always refer to the &lt;/SPAN&gt;&lt;A href="https://docs.prismacloud.io/en/compute-edition/30/admin-guide/authentication/oidc" target="_self"&gt;&lt;SPAN&gt;Prisma Cloud&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; and Okta documentation for the most up-to-date information. Testing the integration in a staging environment before rolling it out to production is also a best practice&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John A.:&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Roshan, before we wrap up, can you share the key takeaways from today's discussion for our listeners?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Roshan T.:&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Here are the key takeaways:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;SPAN&gt;Use Prisma Cloud with Okta via OIDC for secure authentication&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Double-check credentials, callback URLs, and user assignments&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="font-weight: 400;" aria-level="1"&gt;&lt;SPAN&gt;Test the integration in staging environment while referring to documentation&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John A.:&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Fantastic insights, Roshan. Thank you for sharing this knowledge with our listeners today.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;Roshan T.:&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Thank you, John. It’s always a pleasure to be here. I look forward to joining another episode of PANCast soon.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John A.:&lt;/I&gt;&lt;/STRONG&gt;&lt;STRONG&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;PANCasters, if you have topics you’d like us to cover, please share your feedback through the Ideas Submission page on LIVEcommunity. Until next time, goodbye!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Related Content:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A title="How to Transfer Device or Spare Ownership" href="https://docs.prismacloud.io/en/enterprise-edition/content-collections/administration/setup-sso-integration-on-prisma-cloud/get-started-with-oidc-sso/get-started-with-oidc-sso" target="_blank" rel="nofollow noopener noreferrer"&gt;Get Started with OIDC SSO&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Prisma Cloud" id="Prisma_Cloud"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 19 Feb 2025 23:28:46 GMT</pubDate>
    <dc:creator>RoshanT</dc:creator>
    <dc:date>2025-02-19T23:28:46Z</dc:date>
    <item>
      <title>PANCast™ Episode 52: How to Set up SP-Initiated SSO in Prisma Cloud (SaaS) with OIDC using Okta (IdP)</title>
      <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-52-how-to-set-up-sp-initiated-sso-in-prisma/ta-p/1220336</link>
      <description>&lt;P&gt;This episode talks about how to set up SP-Initiated SSO in Prisma Cloud using OIDC with Okta as the Identity Provider.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PANCast Ep 52_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66127iA1EECD0B4A8E91B5/image-size/large?v=v2&amp;amp;px=999" role="button" title="PANCast Ep 52_palo-alto-networks.jpg" alt="PANCast Ep 52_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 19 Feb 2025 23:28:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-52-how-to-set-up-sp-initiated-sso-in-prisma/ta-p/1220336</guid>
      <dc:creator>RoshanT</dc:creator>
      <dc:date>2025-02-19T23:28:46Z</dc:date>
    </item>
  </channel>
</rss>

