SAML is an XML-based open standard for Single-Sign-On (SSO) that eliminates the need for application-specific passwords. SAML enables secure authentication and authorization between Identity Providers (IdPs) and Service Providers (SPs).
SonicOS 7.2 introduces SAML 2.0 Support for Management Access, User Authentication, and SSLVPN authentication.
In this article, we will demonstrate how to configure SAML authentication for firewall management in SonicOS 7.2. While we use Okta as the Identity Provider (IdP) in this example, the steps can be adapted for any SAML-compliant IdP.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
Â
Please refer to the following steps while configuring SAML authentication for firewall management.
Configuring the SAML Service Provider (SP).



NOTE: The information you configure for the Service Provider will help generate the following inputs needed on the IDP side.Exporting Service Provider (SP) Metadata.



NOTE: When setting up the actual SAML profile later, ensure that you use the same SAML profile name. Â
Configuring the Identity Provider (IdP).


NOTE: The Group name should exactly match the SonicWALL Administrators group name on the firewall, as we will send the group name as an attribute to the firewall, and that is how SonicWall will grant Administrator privileges to the admin user 













Configuring SAML Identification Provider on the firewall.







Configuring SAML Profile on the firewall.


NOTE: Ensure that you use the same SAML profile name that was used while exporting SP Metadata under the Exporting Service Provider (SP) Metadata section above. Â
NOTE: The certificate needs to be imported before configuring the SAML profile. 

Additional Checks.




Log In test.



