How to Set up PingIdentity/Ping Federated Identity/PingOne SSO on Prisma Cloud

How to Set up PingIdentity/Ping Federated Identity/PingOne SSO on Prisma Cloud

9908
Created On 12/18/21 23:50 PM - Last Modified 02/09/23 16:54 PM


Objective


  • Configure PingIdentity SSO on Prisma Cloud without Just in Time Provisioning (JIT).
  • Configure PingIdentity SSO on Prisma Cloud with Just in Time Provisioning (JIT) with single/multi role.


Environment


  • Prisma Cloud
  • PingIdentity


Procedure


Setup PingIdentity for SSO
 

1. Log in to PingIdentity console > Add Environment
Add Environment

2. Select Environment > Next

Select Environment

3. Select Next

Create Environment

4. Type Environment Name > Finish

Create Environment

5. Click on Connections
Connections

6. Create a new Application by clicking on +

Create a new Application by clicking on +

7. Select an application type > Configure 
Select an application type

8. Type Application Name "Prisma Cloud SSO" > Next
Create App Profile

9. Select 'Manually Enter'. To Configure SAML Connection, specify the ACS URLS.

Note: The format for ACS URLS uses the URL for Prisma Cloud, but you must replace app with api and add saml at the end. For example, if you access Prisma Cloud at https://app2.prismacloud.io, your Sign-On URL should be https://api2.prismacloud.io/saml and if it is https://app.eu.prismacloud.io, it should be https://api.eu.prismacloud.io/saml

10. For ENTITY ID - copy Audience URI (SP Entity ID) from Prisma Cloud Console > Settings > SSO and paste it here. 

Audience URI (SP Entity ID)


11. Download Signing Certificate. Make sure IdP Certificate is in the standard X.509 format.

Download certificate

12. Map Attribute saml_subject > Email Address and click on Save and Close
SAML ATTRIBUTE

13. Enable Prisma Cloud SSO application. Copy Issuer ID we'll use it in Prisma Cloud > Settings > SSO  

Enable SSO

14. Select Identities > Users > Add User 

add user

15. Following Users details should be the same on Prisma Cloud

  • GIVEN NAME
  • FAMILY NAME
  • EMAIL ADDRESS
  • USERNAME    (Note: Enter email in USERNAME)
       Save your changes.
 

User-added image
User-added image
User-added image

16. (Optional) Just in Time (JIT) Provisioning (16 to 21 are only for JIT)

  • Click on Identities > Groups > Add Group 
 

Add new group

17. Create at least two Groups for multi roles

Enter Group Name
  • System Admin
  • Auditor
            Finish & Save

Note: Make sure to have same roles in Prisma Cloud > Settings > Roles

Roles

18. Single Role:

Select System AdminSelect Users > Add Users Manually > Click on + sign to add a user to System Admin Group >Save
 

single role

19. (Optional) Muti Role:

Select Auditor > Select Users > Add Users Manually > Click on + sign to add a user to Auditor Group >Save
 

multi role


20. Go to Connections >Application > Select Prisma Cloud SSO application > Attribute Mappings > Edit
 

Attribute Mappings

 

21. Add Attributes

  • First Name
  • Last Name
  • Email
  • Role
      Save the changes.

Attribute Mappings


 

STEP 2 >> Configure SSO on Prisma Cloud.

1. Log in to Prisma Cloud and select Settings > Users > Add New > Save

Add User

2. Select Settings > SSO.
3. Enter the value for your Identity Provider Issuer from above STEP 1 >> 13 > Issuer ID. 
4. (Optional) Enter the Identity Provider Logout URL to which a user is redirected to, when Prisma Cloud times out or when the user logs out.
5. Enter your IdP Certificate in the standard X.509 format. 
    Just copy and paste this from your IdP downloaded certificate.

certificate

6. Select Allow select users to authenticate directly with Prisma Cloud to configure some users to access Prisma Cloud directly using their email address and password registered with Prisma Cloud, in addition to logging in via the SSO provider.

Before enabling SSO, make sure to select a few users who can also access Prisma Cloud directly using the email and password that is registered locally on Prisma Cloud to ensure that you are not locked out of the console in the event you have misconfigured SSO and need to modify the IdP settings. For accessing data through APIs, you need to authenticate directly to Prisma Cloud. 


7. Select the Users who can access Prisma Cloud either using local authentication credentials on Prisma Cloud or using SSO.

Bypass user

8. Click on the toggle button to Turn ON "Allow select users to authenticate directly with Prisma Cloud" Setting 

  •     Save your changes.
 

    Allow select users to authenticate directly with Prisma Cloud

    9. (Optional) Just in Time (JIT) Provisioning

    We create two roles to demonstrate multi roles.

    Under Settings > Roles > Add Roles

    • System Admin
    • Auditor
     
     

    Muti roles

    10. (Optional) Just in Time (JIT) Provisioning

    Under Settings > SSO
    • Email
    • Role
    • First Name
    • Last Name
                 Enable JIT Provisioning

    JIT Provisioning

    11. Enable SSO and Save again.

    Enable SSO

    12. Verify access using SSO.

    •       Copy Initiate Single Sign-On URL from PingIdentity Application
     

    Initiate Single Sign-On URL



    Actions
    • Print
    • Copy Link

      https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000004MbSCAU&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

    Choose Language