This message appears when uploading an external CA certificate to the sistem. "Only self signed CA certificates can have identical subject and issuer fields". It's a Microsoft-adfs autosigned CA certificate used to sign SAML messages and we can't not change that, you know if there's any way to upload this certificate to the system in order we can use it? thanks!
If you are configuring Microsoft SAML for MFA then you just need to
1>Export the XML file under SAML IDentity provider.
This will automatically create the certificate for you.
2>You do not need to check the CA under the certificates.
Have you tried it yourself ?
There is no "export" option under "SAML Identity Provider". I think you meant "Import". Even if you "Import" the XML from Azure, It doesn't set the CA flag.
You still get an error on commit as well. Only way around it that I've worked out is what I mentioned previously.
How have you defined your certificates under authentication profile ?
I have used a wildcard cert to sign SAML messages to IDP and the Azure Cert selected under "Certificate Profile".
The only way to select the Azure Cert for "Certificate Profile" is to ensure it has the CA flag set.
I can confirm that SAML response and assertion work.
How did you define it within the authentication profile, certificate profile and SSL/TLS Service Profile ?
You can only select certs which have the CA flag set under "Certificate Profiles" which is then referenced within the "authentication profile".
For the "SSL/TLS service profile" the same applies but I've used a signed wildcard cert instead and imported the chain under "Certificates" to complete the trust.
Using SAML for Global Protect VPN.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!