website/integrations/networking/globalprotect/index.md
GlobalProtect enables you to use Palo Alto Networks next-gen firewalls or Prisma Access to secure your mobile workforce.
Palo Alto Networks GlobalProtect platform is a paid enterprise product.
The following placeholders are used in this guide:
gp.company is the FQDN of the GlobalProtect portal.authentik.company is the FQDN of the authentik installation.:::info This documentation lists only the settings that you need to change from their default values. Be aware that any changes other than those explicitly mentioned in this guide could cause issues accessing your application. :::
:::caution A trusted web certificate is required to be bound to the GlobalProtect Portal. This can be signed by a trusted internal Root Certificate Authority (CA); however, a self-signed certificate, a certificate outside of its validity, or a non-standard confirming certificate (such as a lifespan not trusted by modern browsers) will error out on SAML authentication. :::
To support the integration of GlobalProtect with authentik, you need to create an application/provider pair in authentik.
https://gp.company:443/SAML20/SP/ACS. (Note the absence of the trailing slash and the inclusion of the web interface port)https://authentik.company/application/saml/<application_slug>/sso/binding/redirect/.Post.Navigate to the GlobalProtect configuration device (Firewall or Panorama).
Navigate to 'SAML Identity Provider' on the Device tab and choose the 'import' option.
usernameChoose 'Advanced' within the profile and add 'all'. This will have only authentik control the authorization.
Navigate to the 'GlobalProtect Portal Configuration' and choose the portal for SAML access.
Make the same exact changes to the 'GlobalProtect Gateway Configuration'.
Commit the changes to the firewall.