The goal of this document is to configure SAML SSO with Okta to GlobalProtect Clientless VPN
Service Provider (SP) – Palo Alto Networks Firewall
Identity Provider (IdP) – Okta
Application – GlobalProtect Clientless VPN
Okta Documentation for SAML configuration for GlobalProtect
192.168.55.20 – GlobalProtect Portal and Clientless VPN Hostname
Search for the Palo Alto Networks GlobalProtect Application > Add
Base URL:
https://GlobalProtectPortalAddress/SAML20/SP/ACS
Download metadata to desktop
Import Okta metadata
(Note: When you have self signed Certificate from IDP, you won't be able to enable Validate Identity Provider Certificate. Please make sure that you are on PAN-OS 8.1.15, 9.0.9, 9.1.3 or later to mitigate exposure to https://security.paloaltonetworks.com/CVE-2020-2021 ).
GlobalProtect Portal Authentication = SAML
GlobalProtect Clientless VPN Configuration
Goto GlobalProtect Clientless VPN
Redirects to Okta to authenticate. Okta sends SAML assertion to firewall.
How-To publish GlobalProtect Clientless VPN app in user Okta Portal with SSO
We don’t support IdP initiated workflow. As a workaround, use the Okta Bookmark App
Search for the Bookmark App > Add
URL: https://GlobalProtectPortalAddress/global-protect/portal/portal.esp
Hide the Palo Alto Networks - GlobalProtect SAML application to users
Log-in to Okta portal – https://mycompany.okta.com