Follow the steps below to add a DualShield SAML IDP configuration to Palo Alto

Create Identity Provider Server Profile.

Under Device tab go to Server Profiles > SAML Identity Provider and click on Import at the bottom

In the SAML Identity Provider Server Profile, enter the following information:

OptionValue
Profile NameEnter a descriptive name
IDP MetadataClick Browse  and upload the IDP metadata file you obtained from the DualShield Administration Console
Validatation check boxesUncheck Validate IDP Certificate and Metadata Signature boxes
Maximum Clock Skew60

Click on OK.

If import was successful the correct settings should display under the Identity Provider Service Profile:

Add Authetication Profile.

Remaining under the Device tab, navigate to Authentication Profile

Click ADD at the bottom of the page

In the Authentication Profile, enter the following information:

OptionValue
Profile NameEnter a descriptive name
TypeSAML
IdP Server ProfileSelect the IDP Server Profile created in previous section from the dropdown menu.
Certificate for Signing RequestsImport Root CA certificate
Enable Single Logout (optional)Check this option in order to enable SLO
Certificate ProfileNone
Username Attributeusername

Select the Advanced tab in the Authentication Profile, and add the users/groups that are allowed to authenticate:

Click OK to save the authentication profile.

 

Click on Commit to commit these changes.

  • No labels