Configure Palo Alto Cloud Identity Engine authentication with Azure Saml to connect to GP VPN

Поделиться
HTML-код
  • Опубликовано: 16 сен 2024

Комментарии • 28

  • @lyb777
    @lyb777 Год назад

    That's exactly what I was looking for. Thank you !

  • @NeetuSaini-jm5zf
    @NeetuSaini-jm5zf 2 месяца назад

    Exactly that's what I was looking for. thanks!!

  • @Eminchm
    @Eminchm Год назад

    It works 😊 i did it today! Thanks a lot for you!

    • @techfrapi
      @techfrapi  Год назад +1

      I am glad you manage it to work, Good job

    • @techfrapi
      @techfrapi  Год назад +1

      what was the issue

    • @Eminchm
      @Eminchm Год назад

      @@techfrapi the issue was that authentication couldn’t find users in azure profile I added like domain \ username, it can understand it after I added it like user @ domainname .

    • @Eminchm
      @Eminchm Год назад

      @@techfrapi because I didn’t select all users, I added some for testing manually

  • @Eminchm
    @Eminchm Год назад

    Did you install and use the Cloud Identity Agent on windows machine? or it must work without installed agent?

    • @techfrapi
      @techfrapi  Год назад

      You dont need to install CIE on your pc

  • @Eminchm
    @Eminchm Год назад

    Bro, i have one more question))) if I have more than 1 NGF Palo Alto with different configs, can i create/use different API on Azure for each NGF? because 1 of them have redirect port forward from 443 to 7755 to portal/gateway, another work with 443... what you recomend to do? separate api for each hardware nff or use one universal api for all?

    • @Eminchm
      @Eminchm Год назад +1

      It work’s also with redirect port, with the same api & profile👍 just test it today.

    • @techfrapi
      @techfrapi  Год назад +1

      One API is fine, i have done many firewalls with one, as i need all to have access to same Azure AD

  • @bachtiaradiguna7057
    @bachtiaradiguna7057 Год назад

    Dear Tech Frapi, do you mind to share which GP version is that? I have 6.1.1 but there's no Sign out button on the bottom left 😂 11:22
    Many thanks

    • @techfrapi
      @techfrapi  Год назад

      You might configure always-on and thats why you dont have a sign out. Please check and let me know.
      If thats not the case i will have look

  • @imtiyazhassan5398
    @imtiyazhassan5398 Год назад

    For CIE we don't require SAML identity provider

  • @Eminchm
    @Eminchm Год назад

    i have success log viewer on hub portall and Authentification error page inforrmation by firewall after successfully sign in with multifactor auth(((

    • @techfrapi
      @techfrapi  Год назад

      check if you have multifactor enabled in Azure

  • @Eminchm
    @Eminchm Год назад

    Hello good man))) Thank you for these guide. I did all these step by step but in the end i got error when global protect open his browser for azure sign in, its sign in but gp cant connect and its trying and trying but not conecting(((

    • @techfrapi
      @techfrapi  Год назад

      What OS of PA do you use. Also is very important to choose Single sign on (windows) NO, and Default browser for SAML auth ON

    • @Eminchm
      @Eminchm Год назад

      @@techfrapi one note: we have redirect in NAT rule and Policy port 443 to 7755 port

    • @Eminchm
      @Eminchm Год назад

      @@techfrapi we use PA-820 Software Version 10.2.0 GlobalProtect Agent 6.1.0, i have changed Single sign on (windows) to NO, and Default browser for SAML auth to ON

    • @techfrapi
      @techfrapi  Год назад

      @@Eminchm Did you redirect your GP to use 7755

    • @Eminchm
      @Eminchm Год назад

      @@techfrapi only in palo alto