Follow the steps below to add a DualShield SAML IDP configuration to Palo Alto

Create Identity Provider Server Profile.

Under Device tab go to Server Profiles > SAML Identity Provider and click on Import at the bottom


In the SAML Identity Provider Server Profile, enter the following information:

OptionValue
Profile NameEnter a descriptive name
IDP MetadataClick Browse  and upload the IDP metadata file you obtained from the DualShield Administration Console
Validatation check boxesUncheck Validate IDP Certificate and Metadata Signature boxes
Maximum Clock Skew60


Click on OK.








If import was successful the correct settings should display under the Identity Provider Service Profile:





Add Authetication Profile.


Remaining under the Device tab, navigate to Authentication Profile





Click ADD at the bottom of the page


In the Authentication Profile, enter the following information:

OptionValue
Profile NameEnter a descriptive name
TypeSAML
IdP Server ProfileSelect the IDP Server Profile created in previous section from the dropdown menu.
Certificate for Signing RequestsImport Root CA certificate
Enable Single Logout (optional)Check this option in order to enable SLO
Certificate ProfileNone
Username Attributeusername









Select the Advanced tab in the Authentication Profile, and add the users/groups that are allowed to authenticate:

Click OK to save the authentication profile.



 



Click on Commit to commit these changes.

Related Articles