How to setup OneLogin SAML authentication for GlobalProtect

How to setup OneLogin SAML authentication for GlobalProtect

11476
Created On 03/24/23 13:00 PM - Last Modified 08/28/24 03:30 AM


Objective


  • To provide a basic GP configuration for SAML integration with OneLogin as the IDP.
  • Configure GP Portal and Gateway using one of the logon modes (On-Demand, Pre-logon, or User-logon).
  • Then follow the steps below for SAML configuration on the firewall and OneLogin dashboard.


Environment


  • Palo Alto Firewalls
  • Supported Pan-OS
  • OneLogin
  • SAML Global Protect


Procedure


  1. Log in to the OneLogin Dashboard.
  2. Navigate to the Applications and click Add Apps. Search for SAML, and select SAML Test Connector (IdP).

image.png

 

  1. When Prompted, change the Display Name of the App, Click Save

image.png

  1. Go to the SSO tab and copy IdP metadata values for Issuer URL, SAML 2.0 Endpoint (HTTP), and SLO Endpoint (HTTP), or SAML Metadata under More Actions to download the SAML IdP Metadata
  • Go to the SSO tab, and copy the IdP metadata values for Issuer URL, SAML 2.0 Endpoint (HTTP), and SLO Endpoint (HTTP) or click SAML Metadata under More Actions to download the SAML IdP Metadata.

image.png

5. Now, log in to the firewall and navigate to Device > Server Profiles > SAML Identity Provider.

 

image.png

 

6. Import the SAML IdP metadata XML downloaded in Step 4. Uncheck "Validate Identity Provider Certificate" and "Validate Metadata Signature" if selected after import. Click "OK"

image.png

7. Next, go to Device > Authentication Profile > Add to add a new profile. Specify the following

  • Authentication Tab > Type: SAML
  • Username Attribute > username
  • Authentication Tab > Idp Server Profile (profile created in step 6)
  • Advanced Tab > Allow List > Select Add > All
  • Select OK once done.

image.png

8. Commit the changes on the Firewall
9. Click on Metadata hyperlink under Authentication Column

image.png

Select the Metadata hyperlink and set the below settings

  • Service drop-down > Select "global-protect"
  • IP or Hostname > Select the hostname or ip of the portals/gateway where this is planned to be used
  • Select OK and the SP Metadata file will begin automatically downloading to your workstation.

 

image.png

10. Open the downloaded XML file and copy the EntiryID and ACL URL.

11. Navigate back to the Onelogin dashboard > Applications > SAML Test Connector (idP) > Configuration. Complete the settings as shown below

  • Audience (EntityID) > The Entity ID you copied in the Step 10.
  • ACS (Consumer) URL > The ACS URL you copied in the Step 10.
  • ACS (Consumer) URL Validator >  Provide a valid regular expression. For example:
  • [-a-zA-Z0-9@:%._\+~#=]{2,256}\.[a-z]{2,6}\b([-a-zA-Z0-9@:%_\+.~#?&//=]*)
  • Click Save.

image.png


12. The OneLogin SAML authentication profile is now ready for use. 

  • Go to the firewall web interface and specify the OneLogin_GP_Auth profile in your Portal/Gateway configuration.
  • For the Portal: Goto Network tab > Portal > Select Portal > Authentication > Client Authentication > Authentication Profile

image.png

  • For the Gateway: Goto Network tab > Portal > Select Portal > Authentication > Client Authentication > Authentication Profile

image.png

  • Commit the changes.
To test on the Client machine:

1. Launch the GlobalProtect application and click Connect.
2. Globalprotect App will redirect to the OneLogin IdP’s login page. Log in using OneLogin user credentials.

3. The user will be redirected back to the Service Provider (GP App in this case ) and the status will be displayed as connected after successful authentication.



Additional Information


Please refer to the following articles for configuring Globalprotect Portal and Gateway.

Basic GlobalProtect Configuration with On-Demand

Basic GlobalProtect Configuration with Pre-logon

Basic GlobalProtect Configuration with User-logon



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000kHUaCAM&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language