Netskope Forward Proxy over IPSec/GRE with Azure AD SAML Auth
Netskope Forward Proxy over IPSec/GRE with Azure AD SAML Auth
Netskope integrates with identity providers to gather user identity information for traffic steered through an IPSec or GRE tunnel. This guide explains how to configure Azure AD SAML Auth with Netskope Forward Proxy over IPSec or GRE tunnels. This guide does not cover how to configure an IPSec or GRE tunnel and installing Netskope certificates onto the devices connecting to the web via the tunnel. Refer to IPSec and GRE to configure your tunnels and install certificates on devices before proceeding with these instructions.
Workflow
The integration requires the following steps in the order specified.
- Get Netskope SAML settings.
- Configuring an Enterprise Application in Microsoft Azure Active Directory for SAML Auth.
- Add account in Netskope SAML – Forward Proxy.
- Enable authentication and configure SAML Auth domain bypass settings.
- Test SAML Auth via IPSec or GRE tunnel
- Check Skope IT events
- Bypass SAML Auth Authentication
- Get Netskope SAML Settings
- Configure an Enterprise Application in Microsoft Azure Active Directory for SAML Auth
- Add an Azure AD Account in Netskope SAML – Forward Proxy
- Enable Authentication and Configure SSO Domain Bypass Settings
- Test SSO via the IPSec or GRE Tunnel
- Check Skope IT Events
- Bypass SAML Forward Proxy Authentication Methods
- Tips and FAQs
Articles
- Get Netskope SAML Settings
- Configure an Enterprise Application in Microsoft Azure Active Directory for SAML Auth
- Add an Azure AD Account in Netskope SAML – Forward Proxy
- Enable Authentication and Configure SSO Domain Bypass Settings
- Test SSO via the IPSec or GRE Tunnel
- Check Skope IT Events
- Bypass SAML Forward Proxy Authentication Methods
- Tips and FAQs