SAML Proxy Octa | FSC
Prisma SaaS
Log in to Prisma SaaS.
Select --> Settings --> SAML Proxy, then toggle to enable Unmanaged Device Access Control Configuration.

Select Identity Provider Settings Add Identity Provider.
Now we first have to configure an Octa SAML.
Octa SAML
Login to Okta.
Select --> Applications Add --> Applications --> Create New App.
Create the new app with a Web platform and SAML 2.0 sign-on method, then Create.



Open Prisma SaaS in a Secondary Tab
Settings --> Unmanaged Device Access Control --> SAML Proxy --> Identity Provider Settings


press next

Finish

Record values for the following Okta IdP settings in your planning worksheet, then Download the Okta certificate.
Identity Provider Single Sign-On URL
Identity Provider Issuer

Rename the Okta X.509 certificate from CERT extension to either CER or CRT file extension.

From the Prisma SaaS SAML app, select Assign Assign to to add and manage people or groups.

Log in to Prisma SaaS, and selectSettingsSAML ProxyIdentity Provider SettingsAdd Identity Provider.
Enter your IdP’s name inIDP Name.
ClickChoose File and upload the Okta certificate that you downloaded earlier.
Specify values for the following Okta IdP settings, using your planning worksheet, thenSave.
IDP Entity ID
SSO URL

Office 365 in Octa
Add Application

Last updated
Was this helpful?