Select the Advanced tab in the Authentication Profile, then chose the Allow List. IdP Server Profile: Select an IdP Server Profile created in step 4 as the IdP Server Profile from the dropdown.Ĭertificate for Signing Requests: Select None.Įnable Single Logout (optional): Check this option in order to enable SLO. Type: Select SAML from the dropdown menu. Name: Provide a name for the Authentication profile. Navigate to Device > Authentication Profile, click Add, then enter the following: Make sure the options Validate Identity Provider Certificate and Validate Metadata Signature are unchecked. Sign into the Okta Admin dashboard to generate this value. Then click Browse to locate and upload it to Palo Alto Networks GlobalProtect: Identity Provider Metadata: Download and save the following. Profile Name: Enter a preferred profile name. Navigate to Device > Server Profiles > SAML Identity Provider. Now that you have completed the set up in Okta, login to your Palo Alto Networks application as an administrator and follow the steps below to configure Okta as your IDP. Note: If global protect is configured on port 443, then the admin UI moves to port 4443.
In Okta, select the General tab for the Palo Alto Networks - GlobalProtect app, then click Edit:Įnter into the Base URL field. The Okta/Palo Alto Networks - GlobalProtect SAML integration currently supports the following features:įor more information on the listed features, visit the Okta Glossary.
For reference, here is documentation describing How to create a CA-signed certificate for Palo Alto Networks SAML Applications.