HELP FILE

Palo Alto Networks VPN

Palo Alto Networks VPN

    Set up a Palo Alto Networks VPN SSO app integration so that your users can sign into this app using the same credentials that they use for LastPass.

    About this task:
    1. Log in and access the LastPass new Admin Console by doing either of the following:
      • While logged in to LastPass, click the active LastPass icon active LastPass icon in your web browser toolbar, then select Admin Console in the menu.
      • Log in at https://admin.lastpass.com with your admin email address and master password.
    2. Go to Applications > SSO apps.
    3. Select Add app in the upper-right navigation (or Search the catalog if you're adding your first app).
    4. Search for and select your app from the catalog (or Add an unlisted app if you can't find your app).
    5. Click Continue, and you are taken to the Set up LastPass section of the app configuration.

      Fastpath: LastPass automatically fills out all required information in the Set up app section for you. Some apps allow you to upload settings in an XML file, while others require you to copy and paste the following information:
      Name in LastPass Value
      Entity ID
      https://identity.lastpass.com
      SSO Endpoint
      https://identity.lastpass.com/SAML/SSOService
      Logout URL
      https://identity.lastpass.com/Login/Logout
      Certificate fingerprint Provided in the Set up app section of the SSO app. If needed, download the LastPass certificate in PEM, DER, or Download metadata (XML) format.
      Certificate fingerprint (SHA256)
      Certificate (PEM)

    6. For the next steps, open a new web browser window or tab. Go to the app's settings to enable single sign-on, and make sure your app recognizes LastPass as the Identity Provider.

    Part 2 - Configure the app in Palo Alto Networks VPN

    About this task: For detailed instructions, please see Palo Alto Networks VPN documentation.
    1. Log into the admin console of your VPN server and go to Device > Server Profiles > SAML > Identity Provider > Import.
    2. Set up a Profile Name and import the LastPass metadata file (downloaded in Part 1) by selecting Browse... and selecting the metadata file that you saved, then click OK to save changes.
    3. Next, create a new Authentication Profile. Navigate to Device > Authentication Profile and click Add.

      Authentication Profile Authentication tab

    4. Select your authentication profile name. Select SAML from the Type options and select the LastPass identity provider name that you created in the IdP Server Profile.
    5. Click on the Advanced tab and select all users or a list of users in the Allow List. Click Ok to save changes.

      Authentication Profile Advanced tab

    6. Next, switch to the new authentication profile on your GlobalProtect Portals and Gateways. Navigate to Network > GlobalProtect > Portals, select the portal you'd like to update, click on the Authentication tab, and select the authentication profile that you created.
    7. Open Network > GlobalProtect > Gateways, select the portal you'd like to update, click on the Authentication tab, and select the authentication profile recently created.

      Note: For more about information about the Palo Alto Network VPN SAML setup, visit Palo Alto Network SAML setup page.

      Result: Finalize the Palo Alto Network VPN configuration in LastPass by performing the steps in finalizing the Palo Alto Network VPN configuration.

    Part 3 - Finalize the Palo Alto Network VPN configuration

    1. Return to the LastPass new Admin Console.
    2. Back on the Configure app page in the LastPass Admin Console (from Part 1), select Set up LastPass.
    3. LastPass needs to know the app’s URI to the Assertion Consumer Service (ACS) to be able to authenticate users. This is provided by your SSO app.

      ACS
      The URL to which LastPass sends authentication assertions after authenticating a user. It may also be known as Post-Back URL, Reply URL, Single Sign-On URL, or Service Provider URL.
      Step-up authentication (passwordless login)
      Enable this setting if you want to require users to confirm their identity using the LastPass Authenticator app upon each login to this SSO app.
      Remember: Passwordless login for SSO apps only supports authentication using stored biometrics (face or fingerprint) via push notification in the LastPass Authenticator app.

    4. Select Advanced settings.
    5. Click Save & assign users > Users, groups & roles to begin making your selections.
    6. Click Save & continue > Finish.

      Result: Setup for your SSO app is complete! The LastPass users you assigned to this SSO app can now use their LastPass account to sign in to this SSO app going forward.