{"id":106068,"date":"2024-02-16T15:22:06","date_gmt":"2024-02-16T20:22:06","guid":{"rendered":"https:\/\/jumpcloud.com\/?post_type=support&p=106068"},"modified":"2024-07-11T16:31:27","modified_gmt":"2024-07-11T20:31:27","slug":"integrate-with-palo-alto-networks","status":"publish","type":"support","link":"https:\/\/jumpcloud.com\/support\/integrate-with-palo-alto-networks","title":{"rendered":"Integrate with Palo Alto Networks"},"content":{"rendered":"\n
Use JumpCloud SAML Single Sign On (SSO) to give your users convenient but secure access to all their web applications with a single set of credentials. Automatically provision, update and deprovision users and groups in Palo Alto Networks from JumpCloud using the Identity Management (SCIM) integration. Leverage this integration to centralize user lifecycle, user identity, and group management in JumpCloud for Palo Alto Networks. Save time and avoid mistakes, as well as potential security risks, related to manually creating users.<\/p>\n\n\n\n
Read this article to learn how to integrate with Palo Alto Networks. <\/p>\n\n\n\n
Prerequisites<\/strong><\/p>\n\n\n\n Considerations<\/strong><\/p>\n\n\n\n Attribute Considerations<\/strong><\/p>\n\n\n\n <\/p><\/div> If this is a Bookmark Application, enter your sign-in URL in the Bookmark URL<\/strong> field.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n <\/p><\/div> The SSO IdP URL<\/strong> is not editable after the application is created. You will have to delete and recreate the connector if you need to edit this field at a later time.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n <\/p><\/div> The certificate.pem will download to your local Downloads<\/strong> folder.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n Users are implicitly denied access to applications. After you connect an application to JumpCloud, you need to authorize user access to that application. You can authorize user access from the Application Configuration<\/strong> panel or from the Groups Configuration<\/strong> panel. <\/p>\n\n\n\n To learn how to authorize user access from the Groups Configuration<\/strong> panel, see Authorize Users to an SSO Application<\/a>.<\/p>\n\n\n\n <\/p><\/div> This varies by SP.<\/p>\n <\/div><\/div><\/div><\/div>\n\n\n\n The following table lists attributes that JumpCloud sends to the application. See Attribute Considerations<\/a> for more information regarding attribute mapping considerations. <\/p>\n\n\n\n\n
\n
\n
Creating a new JumpCloud Application Integration<\/strong><\/h2>\n\n\n\n
\n
\n
\n
\n
Configuring the SSO Integration<\/strong><\/h2>\n\n\n\n
To configure JumpCloud<\/strong><\/h3>\n\n\n\n
\n
Download the certificate<\/strong><\/h4>\n\n\n\n
\n
To configure Palo Alto Networks<\/strong><\/h3>\n\n\n\n
\n
\n
Authorizing User SSO Access<\/strong><\/h2>\n\n\n\n
To authorize user access from the Application Configuration panel<\/strong><\/h3>\n\n\n\n
\n
Validating SSO user authentication workflow(s)<\/strong><\/h2>\n\n\n\n
IdP-initiated<\/strong> user workflow<\/strong><\/h3>\n\n\n\n
\n
SP-initiated<\/strong> user workflow<\/strong><\/h3>\n\n\n\n
\n
\n
Configuring the Identity Management Integration<\/strong><\/h2>\n\n\n\n
To configure Palo Alto Networks<\/strong><\/h3>\n\n\n\n
\n
To configure JumpCloud<\/strong><\/h3>\n\n\n\n
\n
\n
Attribute Mappings<\/strong><\/h2>\n\n\n\n