02-24-2017 06:54 PM
Hi all
I need help to configure ADFS SAML with global-protect.
i have successfully imported the metadata.xml from adfs into palo.
But now i can't export the metadata from paloalto.
Whats the correct identifiers and endpoints urls for global-contect clientless? I have no idea, what i must configure in adfs.
Can anyone help?
I use panos 8.0
regards
Benjamin
10-24-2017 06:55 AM
I just recently was able to get GP to authenticate to ADFS using SAML with the help of support. Here are some hints that worked for me.
1. GP 4.0.3 has a bug, so I needed to use either GP 4.0.2 or GP 4.0.4
2. ADFS is configured with a Custom Claim Rule, a Transform rule to map SessionID to NameID (using transient identifier) and another Transform rule to map Windows Account Name to username
3. username is used for Username Attribute in the SAML auth profile
Let me know if that helps you.
Ian
11-03-2017 01:45 AM
Hi,
can you add a screenshot of your rules?
Thanks
11-10-2017 09:04 PM - edited 11-10-2017 09:55 PM
After a lot of trying I'm at the point that I can login via SAML to global protect. I'm using three rules in ADFS configuration:
1. Rule:
c1:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/windowsaccountname"] && c2:[Type == "http://schemas.microsoft.com/ws/2008/06/identity/claims/authenticationinstant"] => add(store = "_OpaqueIdStore", types = ("http://mycompany/internal/sessionid"), query = "{0};{1};{2};{3};{4}", param = "useEntropy", param = c1.Value, param = c1.OriginalIssuer, param = "", param = c2.Value);
2. Rule:
3. Rule:
I use sAMAccountName instead of username in my Authentication Profile.
For just logon to global protect via SAML that seems ok.
But I want to use Clientless VPN with apps that also do a SAML authentication. At the moment the situation is the following:
I open the global protect portal and get redirected to the ADFS logon site (external Form authentication). I logon and get redirected to the Clientless VPN portal.
Then I click on one app which also uses SAML authentication. I expect that the app will just open because I'm already authenticated via SAML BUT I get another ADFS authentication window (internal Windows Authentication) and have to logon again.
When I then open another app from clientless vpn portal then this works via SSO.
I think that happens because ADFS cannot map my session after I'm authenticated to the global protect portal so I think there is still missing something in the configuration of the rules.
(Another information: I had to delete encryption and signature info in ADFS for the Clientless VPN party. I don't know why but I will check this later.
)
Any ideas?
Thanks!
11-13-2017 06:42 AM
I'm sorry, but I don't have any ideas for use with clientless vpn. I've only been focusing on GP. Right now I'm working through issues with the signing certificate verification and the signing of SAML requests to the iDP. Maybe my eventual findings here might help you with your last comment.
11-13-2017 06:45 AM
But can you add screenshots of your ADFS rules?
Thanks!
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!