Skip to main content
Skip table of contents

Palo Alto networks (PAN-OS 8.0) SAML integration


Prerequisite

This guide has been documented for integration on Palo Alto PAN-OS® 8.0.
In this scenario inWebo will act as an Identity Provider.

Configuration

Configure an inWebo SAML 2.0 connector

In your inWebo service, in the "Secures Sites" tab, add a new SAML 2.0 connector.

Name the connector and leave the other fields blank. Click "Add". This generates inWebo SAML metadata and certificate

Download inWebo IdP SAML 2.0 metadata in XML format

Create a SAML Identity Provider

In the Palo Alto GUI select the "Device" tab and go to Server Profiles > SAML Identity Provider

Click on "Import" and locate the metadata file downloaded from inWebo. Make sure the file name meets the naming requirements from Palo Alto or you'll not be able to click on Ok

Create a Certificate Profile

The previous operation automaticaly imports the inWebo certificate. You can check the 2 entries exists in Certificate Management>Certificates

Go to Certificate Management>Certificate Profiles and click "Add". Name the certificate profile and Add the CA Certificate previously imported.

Configure an Authentication profile

Within the Device tab click on the Authentication Profile menu

Click "Add", change the type to "SAML" then choose the Server Profile previously configured. Leave the "Factors" tab default configuration. In the "Advanced" tab make sure you allow your users to use this Authentication profile.

Use inWebo to authenticate your users

The user will connect using an OTP generated by an inWebo token or by receiving a push notification on his mobile.

Notice : if your firewall policies uses LDAP user groups you'll need to keep an LDAP authentication to retrieve the user group membership. inWebo doesn't know which LDAP user group your users are member of.

You may want to use MFA to control access to the GP Portal and/or the GP Gateway. If you choose to setup inWebo MFA for both Portal and Gateway then users will have to do MFA for both.

Typical setup enforce a login and password authentication on the GP Portal and inWebo MFA authentication on the GP Gateway.

Configure the Global Protect Portal to use inWebo MFA

  1. Go on the Network tab and choose Global Protect > Portals menu

  2. Add a Global Protect Portal configuration or edit an existing GlobalProtect Portal configuration

  3. In the Authentication tab, declare a Client Authentication and choose the Authentication Profile you created

Configure the Global Protect Gateway to use inWebo MFA

The GP Gateway authenticates the user after the GP Agent succesfully authenticated the user against the GP Portal.

  • Go on the Network tab and choose Global Protect > Gateways menu

  • Add a Global Protect Gateway configuration or edit an existing GlobalProtect Gateway configuration

  • In the Authentication tab, declare a Client Authentication and choose the Authentication Profile you created

Commit

Configure inWebo

In the Palo Alto GUI go to Device tab and select the Authentication Profile menu.

Locate the SAML authentication profile created previously and Click on Metadata in the column Authentication

Choose the Service global-protect.

Notice : an extra Commit is sometimes required to make the IP/Hostname appear.

Go on the inWebo Administration Console and open the SAML connector created previously. Open the file generated by the Palo Alto gateway and copy/paste its content in the Section 2 of the SAML connector.

You can choose to customise the connector behaviour.

  • Allow Push Authentication

  • Allow SIlent Authentication (for service without PIN)

  • etc

In Section 4 of the SAML connector add an extra attribute called "username" with the value "User login" and click on "Update"

Create a secure site

  • In your inWebo administration console, go to the Secure Sites tab.

  • Click on Add a secure site of type… and select the SAML connector name you previously configured.

  • Set the Called URL to point to your Palo Alto Internet address.

The Called URL setting is only used to set a bookmark for the user on their Myinwebo portal, it has no impact on the security.

  • Click on Add to create the secure site.

Extra configuration

If you want to adjust the user experience you may consider the following parameters

Browser Token Authentication

This parameter is available in the SAML connector configuration.

When set to Yes the user will be able to "enrol his GP Agent" and authenticate without mobile.

When set to No the user will be asked to enter his login so inWebo will send a push notification to his mobile.

Browser Silent Authentication

This parameter is available in the SAML connector configuration.

When set to Yes the inWebo Virtual Authenticator token will not need any user input. This requires to change the "Authentication mode" to "Without PIN" in your Service Parameter.

Since the PIN is not asked, you may want to add another authentication factor : you can change the Palo Alto authentication profile for the GP Portal or the GP Gateway to authenticate user with his LDAP credentials.

Push Authentication

This parameter is available in the SAML connector configuration.

When set to Yes the user will be able to connect via a Push notification on his mobile.


JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.