Palo Alto NGFW Global Protect - SAML My Page SSO Configuration - RSA Ready Implementation Guide
Originally Published: 2023-03-29
This article describes how to integrate Palo Alto NGFW Global Protect with RSA Cloud Access Service (CAS) using My page SSO.
Configure CAS
Perform these steps to configure CAS for My Page SSO.
Procedure
- Sign in to RSA Cloud Administration Console and browse to Applications > Application Catalog.
- Search for Palo Alto Networks - Captive Portal, and then click Add.
- On the Basic Information page, choose Cloud.
- Enter the name for the application and click Next Step.
- On the Connection Profile page, navigate to the Initiate SAML Workflow section and choose IdP-initiated.
- Under Data Input Method, choose Enter Manually.
- Scroll down to the Service Provider section. The following fields should be in the following format:
- Assertion Consumer Service (ACS) URL: https://<FQDN or IP>:443/SAML20/SP/ACS
- Service Provider Entity ID: https://<FQDN or IP>:443/SAML20/SP
- Under the Message Protection section, choose IdP signs assertion within response.
- Under the User Identity section, select unspecified as Identifier Type and mail as Property.
- In the Statement Attributes section, make sure to match the Attribute Name with what is configured in the Palo Alto NGFW SAML configuration. You can send adminrole to give authorization to the users, also group to return the groups the user is part of. You can also configure Access Domain Attribute if needed from the Palo Alto side.
- Click Next Step.
- On the User Access page, choose the access policy you want to use to determine which users can access the application, and then click Next Step.
- On the Portal Display page, configure the portal display and other settings.
- Click Next Step.
- On the Fulfillment page, configure your preferred settings or leave the Fulfillment toggle disabled as it is.
- Click Save and Finish.
- Click Publish Changes and wait for the operation to be completed.
Your application is now enabled for SSO. - Navigate to the newly created application from Application.
- In the Edit drop-down list, choose Export Metadata. This metadata will be used later in the Palo Alto configuration.
Configure Palo Alto NGFW Global Protect
Perform these steps to configure Palo Alto NGFW Global Protect.
Procedure
- Log in to the Palo Alto Admin UI and navigate to Device > SAML Identity Provider > Import.
- Import the metadata downloaded earlier from RSA and click OK.
- Click the imported Identity Provider Server profile and verify its details.
- Click OK.
- In the left pane, click Authentication Profile. A SAML Authentication Profile will be created and tied to the SAML Identity Provider Server created earlier.
- On the Authentication Profile section:
- In the Type drop-down list, choose SAML.
- In the IdP Server Profile drop-down list, choose the IdP Server Profile that was created earlier.
- Under User Attributes in SAML Messages from IDP, choose the same attributes used in RSA.
- Navigate to the Advanced tab.
It displays the users who will be permitted to use this profile. - To configure Global Protect, navigate to Network > Global Protect > Portals and click Add to add a new Global Protect Portal or open an existing portal and edit the Authentication settings of the portal.
- On the Global Protect Portal Configuration page, navigate to Authentication and click Add under Client Authentication.
- On the Client Authentication screen, choose a name, and in the Authentication Profile drop-down list, choose the profile that was created earlier.
- On the Allow Authentication with User Credentials OR Client Certificate drop-down list, choose Yes.
- To apply the RSA Authentication on the gateway also:
- Go to Network > Global Protect > Gateways > click Add to add a new Global Protect gateway or open an existing gateway and edit the Authentication settings of the gateway.
- On the Global Protect Gateway Configuration page, navigate to Authentication and click Add under Client Authentication.
- Choose a pre-created SSL/TLS Service profile created for the environment.
- On the Client Authentication page, choose a name, and in the Authentication Profile drop-down list, choose the profile that was created earlier.
- In the Allow Authentication with User Credentials OR Client Certificate drop-down list, choose Yes.
The configuration is complete.
Related Articles
Palo Alto NGFW Global Protect - RADIUS Configuration in Cloud Access Service- RSA Ready Implementation Guide 56Number of Views Palo Alto NGFW 10.1.7 - SAML IDR SSO Configuration - RSA Ready Implementation Guide 26Number of Views Palo Alto NGFW 10.1.7 - RADIUS Configuration - RSA Ready Implementation Guide 197Number of Views Palo Alto NGFW Global Protect - RSA Ready Implementation Guide 364Number of Views Palo Alto NGFW Global Protect - SAML Relying Party Configuration - RSA Ready Implementation Guide 110Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) How to install the jTDS JDBC driver on WildFly for use with Data Collections in RSA Identity Governance & Lifecycle RSA Authentication Manager 8.8 Setup and Configuration Guide Artifacts to gather in RSA Identity Governance & Lifecycle
Don't see what you're looking for?