Third Party IDP: Update SAML Request Signing Certificate

Third Party IDP: Update SAML Request Signing Certificate

0
Created On 12/08/22 16:42 PM - Last Modified 02/22/23 16:10 PM


Environment


Third Party IDP

Resolution


 

 
 
 

Summary

3rd party IdP (Identity Provider) integration allows customers to access Palo Alto Networks services using their own IdP. This document covers details on how to renew the SAML Request Signing certificate on the IDP. 

 

The Ping SAMLRequest signing certificate expires on December 9, 2022. If you are currently enrolled in the third-party IdP integration with configured signed assertions, please take one of the actions outlined below.

 

If you have configured signed assertions, there are two options available that will prevent you from losing access to Palo Alto Networks resources. Palo Alto Networks strongly encourages that you follow Option 1, as this will allow you to skip Option 2.

  1. Migrate to OKTA:  Please follow the step-by-step instructions found in this KB article. If this is performed, Option 2 is NOT required. 
  2. Update the PingFederate certificate. 
    1. Before December 9, 2022: You can schedule a working session to avoid any service interruptions. Please schedule a working session with our support team using this calendar link. 
    2. After December 9, 2022: Palo Alto Networks will renew the certificate on the service provider (Ping) for all the IDP connections. Download the certificate provided below and upload it on your identity provider
 

New Ping SAML Request Signing Certificate

 

Copy the certificate below and save it as .cer or .crt to upload on your Identity Provider. You can also copy and paste the contents of the certificate if your IDP allows it.

 

-----BEGIN CERTIFICATE-----

MIIDjDCCAnSgAwIBAgIGAYScTgZhMA0GCSqGSIb3DQEBCwUAMIGGMQswCQYDVQQGEwJVUzELMAkG

A1UECBMCQ0ExFDASBgNVBAcTC1NhbnRhIENsYXJhMR8wHQYDVQQKExZQYWxvIEFsdG8gTmV0d29y

a3MgSW5jMQswCQYDVQQLEwJJVDEmMCQGA1UEAxMdaWRlbnRpdHkucGFsb2FsdG9uZXR3b3Jrcy5j

b20wHhcNMjIxMTIxMjIyNzQ5WhcNMjUxMTIwMjIyNzQ5WjCBhjELMAkGA1UEBhMCVVMxCzAJBgNV

BAgTAkNBMRQwEgYDVQQHEwtTYW50YSBDbGFyYTEfMB0GA1UEChMWUGFsbyBBbHRvIE5ldHdvcmtz

IEluYzELMAkGA1UECxMCSVQxJjAkBgNVBAMTHWlkZW50aXR5LnBhbG9hbHRvbmV0d29ya3MuY29t

MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAp/Xe2s6hAlPelmn9zSeXSraEUdzBwZrJ

oDJpn8pVk3A9EnSL4FTrRcrVaaqg0R/m2DmnvRaM1yU4ifpf97SQhoXPkHEw/IzWwL/UpE7Xrm7G

NQD1bP99/I+WH6gctxd+OwtmPYEOrGTa4l7vNxJ2Ut+oRBbWykfqS8eMIJAUnhHE83JGfRUTT9HM

79EW6i7CY60yskEeiyDU09w7eJsJysY7Mfs4dMMa6IuncftW1kP55AHYJsN0//7aBE7WEAkkqpgN

XOBrc8XPffX+I6t4wUB7XPlnXJ4CNICE/O4xGHH79+US7IY+MJ0iaKaPV+w77nqUD+8loMrMTo4+

wrAE1QIDAQABMA0GCSqGSIb3DQEBCwUAA4IBAQCSr+cQaAEjASGCzAzqIrYWT1f13EJoITNpPJIQ

iMWDGviqK1yvBk3NkAs6h4S8P+80RqkKHMhE0ImPoF5n+71okEdNcYdlzFsG18/TLdFMnUEy3a2R

6zNLs86eViAnDRGhEPcmbk4ZB1zXu9GWBf6bMEoMV2h/prSOSYdbjkXwQWx3Ygo69Q8XOMnTaOmQ

/eiL1HpaPXFdQ8PZilo+S8Z+cJoDTzYyT52WlATgKd5V1DOC7hM7uTL38q0879CXdW2p1HYlbW5n

A6iU1dvJ3dz4uF0g7Vs5q5BB88cot6ufc32MpYUHCJmEhefcuoVcthC43sLNyeA2JjxDKcR2QGHA

-----END CERTIFICATE-----

 

FAQs

 

We have already migrated to Okta recently. Am I still required to renew the certificate? 

No. If you have already followed our KB article to migrate to Okta, no further action is required from you. You won’t be impacted.
 

We don’t verify SAML Authn Requests on the Idp. Am I still required to renew the certificate? 

No. If you are not verifying the SAML Authn Request signature, no further action is required from you. You won’t be impacted

 

We are verifying the SAML Authn Requests on IDP. Will there be any outage after December 9, 2022 if we don't renew it by then? 

Yes, if you don't renew the certificate by Dec 9th, 2022 you will not be able to login to Palo Alto Networks websites. 
 

Who do I contact if I run into SSO issues after migration?

If you have issues, please open a case at https://support.paloaltonetworks.com. If you are unable to log in, please use the “Need Help?” option.



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000kFXrCAM&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail