PAN-OS - SAML My Page SSO Configuration - RSA Ready Implementation Guide
This article describes how to integrate PAN-OS with RSA Cloud Access Service (CAS) using My Page SSO.
Configure CAS
Perform these steps to configure CAS using My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Click Create from Template and then click Select next to SAML Direct.
- On the Basic Information page, choose Cloud.
- Enter a name for the application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose IdP-initiated.
- Under Data Input Method, choose Enter Manually.
- Scroll down to the Service Provider section and enter the values in the following format:
- Assertion Consumer Service (ACS) URL: https://<PANOS-hostname OR IP address
- Service Provider Entity ID: Enter the same Service Provider Entity ID entered in PAN-OS.
- Under the Message Protection section, choose IdP signs entire SAML response.
- Under the User Identity section, provide the following values.
- Identifier Type: emailAddress
- Property: mail
- Click Next Step.
- On the User Access page, choose the access policy you want to use to determine which users can access the application, and click Next Step.
- On the Portal Display page, configure the portal display and other settings.
- Click Next Step.
- On the Fulfillment page, configure your preferred settings or leave the Fulfillment toggle disabled as it is, and click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
After publishing, your application is enabled for SSO. - Navigate to the newly created application from Applications > Applications and choose Export Metadata in the Edit drop-down list.
This metadata will be used later in the PAN-OS configuration.
Configure PAN-OS
Perform these steps to configure PAN-OS.
Procedure
- Log in to the PAN-OS admin web interface with the PAN-OS default admin user or any other admin https://IP-address-of-PANOS.
- Navigate to Device > Server Profiles > SAML Identity Provider.
- Click Import to create the SAML Identity Provider.
- Specify the Profile Name.
- Under the Identity Provider Configuration section:
- Browse the Identity Provider Metadata file, which we exported from CAS configuration.
- Clear the Validate Identity Provider Certificate checkbox.
- Click OK.
The SAML Identity Provider is created and displays the Identity Provider and SSO Service URL details as per the metadata file. - Navigate to Device > Authentication Profile and create a profile as follows:
- Under the Authentication Profile > Authentication section, specify the name.
- In the Type drop-down list, select SAML.
- In the IdP Service Profile drop-down list, select the SAML Identity Provider in the previous steps.
- Under User Attributes in SAML Messages, specify email as Username Attribute.
- Navigate to the Advanced tab and click Add.
- Select the user from the list and click OK to complete the Authentication Profile.
- Click Commit to save the configurations on PAN-OS.
The configuration is complete.
Related Articles
IDR SSO - Step 3: Deploy the Identity Router 562Number of Views How to obtain the version information for RSA Authentication Agent for PAM installed on Linux 389Number of Views Obtaining the RSA Authentication Manager License Serial Number from the CLI 368Number of Views The License/serial number being installed does not match the license/serial number stored on the server when installing an… 2.75KNumber of Views RSA Authentication Manager 8.8 upgrade fails with ERROR: auth_manager.rest_service.old_access_key is not found 1.93KNumber of Views
Trending Articles
Troubleshooting RSA SecurID Access Identity Router to RSA Authentication Manager test connection failures RSA SecurID Software Token 5.0.2 Downloads for Microsoft Windows RSA Authentication Manager 8.9 Release Notes (January 2026) Quick Setup Guide - Passwordless Authentication in Windows MFA Agent for Active Directory RSA Authentication Manager 8.8 Setup and Configuration Guide
Don't see what you're looking for?