Configuring SAML SSO for Panorama9
These steps will guide you through setting up the single sign-on functionality between ADSelfService Plus and Panorama9.
Prerequisite
- Log in to ADSelfService Plus as an administrator.
- Navigate to Configuration → Self-Service → Password Sync/Single Sign On → Add Application, and select Panorama9 from the applications displayed.
Note: You can also find Panorama9 application that you need from the search bar located in the left pane or the alphabet wise navigation option in the right pane.
-
Click IdP details in the top-right corner of the screen.
-
In the pop-up that appears, copy the Login URL and SHA1 FingerPrint.
Panaroma9 (Service Provider) configuration steps
-
Open a new tab and login to Panorama9 portal with an administrator’s credentials.
-
Navigate to Manage → Extensions.
-
Select Single Sign-On from the left pane.

-
Click on the Edit icon in the topright corner of the screen.
-
In the Identity provider Login URL field, enter the Login URL copied in Step 4 of Prerequisite.
Note:
The login URL must be in the format https://domainname.com/*
-
In the Certificate fingerprint field, enter the SHA1 FingerPrint copied in Step 4 of Prerequisite.
-
Copy the value in the Login URL field.
-
Click on the Save button in the bottom of the screen.
ADSelfService Plus (Identity Provider) configuration steps
-
Now, switch to ADSelfService Plus’ Panaroma9 configuration page.
-
Enter the Application Name and Description.
-
In the Assign Policies field, select the policies for which SSO need to be enabled.
Note:ADSelfService Plus allows you to create OU and group-based policies for your AD domains. To create a policy, go to Configuration → Self-Service → Policy Configuration → Add New Policy.
-
Select Enable Single Sign-On.
-
Enter the Domain Name of your Panorama9 account. For example, if you use johndoe@thinktodaytech.com to log in to Panorama9, then thinktodaytech.com is the domain name.
-
In the SAML Redirect URL field, enter the value you copied in Step 7 of Panaroma9 configuration.
-
Enter the Assertion Consumer Service URL provided by your application service provider in the Assertion Consumer Service URL field. If required, click the + button next to the text field to add multiple Assertion Consumer URLs. These values can be found in the application's SSO configuration page or metadata. Please reach out to your application's support team if you are having trouble locating the Assertion Consumer Service URL in your application's user interface or metadata.
-
In the Name ID Format field, choose the format for the user login attribute value specific to the application.
Note: Use Unspecified as the default option if you are unsure about the format of the login attribute value used by the application.
-
Click Add Application.
Note:
For Panorma9, only IDP initiated flow is supported.