- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
10-30-2018 08:49 AM
We have configured global protect client 4.1.6.
We want to use MS Azure for MFA can we do this by using SAML?
10-31-2018 01:18 PM
... then uncheck the checkbox or create a cert profile with the root cert of the server certificate that microsoft uses 😉
10-30-2018 11:16 AM
In general yes it should be possible, but you did not share a lot of information to answer the question ...
Do you already have ADFS servers? Do you use Azure MFA there already? Do you use Azure MFA already for another service in your company or do you plan to implement it completely new?
10-30-2018 11:56 AM
No it brand new setup.
We have GP client running version 4.1.6
No we do not use Azure MFA.
What are ADFS?
How they are linked to SAML?
10-30-2018 03:23 PM
Hi @MP18
Does your company in this case already uses an Azure AD and/or Office 365 or other Microsoft Cloud Services? Or what is the exact reason to use Azure MFA if there are no prerequisites?
ADFS technically is a SAML Identity Provider (I assumed you use this one as it is probably the only SAML IdP with an Azure MFA Integration). Another way you can go is with a Microsoft NPS RADIUS Server with the Azure MFA Plugin.
10-30-2018 03:51 PM
Yes we have office 365 in cloud and also AD but not ADFS
10-30-2018 04:47 PM
Is it possible for you that you connect other cloudservices (salesforce, dropbox business, ...) with SAML (with the existing things that you already have with your microsoft subscriptions)? If yes, then I you should be able to configure GP the same way as other SAML cloud services ... if not, you probably need ADFS ...
10-30-2018 04:48 PM
... or A Microsoft RADIUS server as an ADFS server is the more complex way I think ...
10-30-2018 08:10 PM
Yes earlier today i exported the SAML xml file in PA.
Then i try to connect to the Client everytime i see the error message in system logs of PA
'SAML SSO authentication failed for user \'\'. Reason: SAML web single-sign-on failed. reply message \'Reason: SAML web single-sign-on failed.\'' ) |
10-30-2018 08:19 PM
Yes earlier today i exported the SAML xml file in PA.
Then i try to connect to the Client everytime i see the error message in system logs of PA
SAML SSO authentication failed for user Reason: SAML web single-sign-on failed. reply message \'Reason: SAML web single-sign-on failed.
10-31-2018 03:34 AM
Did you follow the help documents from paloalto and microsoft (https://docs.microsoft.com/en-us/azure/active-directory/manage-apps/configure-single-sign-on-non-gal...) to configure this?
This error message sounds very generic. When did it show up?
10-31-2018 06:48 AM
I did not do the Azure part.
Which documents of PA you refer to?
We get this error message after
saml-client-redirect
saml-signature validated
saml out of band massage
10-31-2018 06:55 AM
10-31-2018 10:43 AM
when i check the cert i get this error
10-31-2018 01:18 PM
... then uncheck the checkbox or create a cert profile with the root cert of the server certificate that microsoft uses 😉
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!