Can set up a real working IdP or a “dummy” one (knowing that XAU info sent from the Edge SWG will be used to authenticate the users in WI there is no need to authenticate the user again with an external IdP like Azure), example of “not working” IdP:
Generic SAML
IdP Details
Entrypoint URL: https://login.microsoftonline.com/1234:
Logout URL: https://login.microsoftonline.com/1234
Signing Certificate: any “.cer” file
Claims:
Username Attributes: nameID
Username Identifier Format: urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress
Group Attribute: groups
Click on “Create”
Export the Cloud WI metadata (import it in the IdP if setting it up, skip it if “dummy”/not working one)
“PUSH SETTINGS”
Enable authentication clicking on the “Use Authentication” checkmark. Set:
Mode: Server
Profile: SAML Authentication
Click on “Update” and “PUSH SETTINGS”
In Cloud WI management go to “My Policy” and create/modify policy rules to match username/group membership as per business requirements.
Newly created “Identity Provider” real/dummy not working one can be selected. Edge SWG authenticated user info will be fetched from the forwarded XAU and XAG headers
Refer to: