<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: USER-ID policies + FULL azure ad in VM-Series in the Public Cloud</title>
    <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541136#M1873</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I would check the policy you created against a traffic log to see if you accidentally missed something. Also check how the users names are displayed in the logs vs how they are in the policy.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
    <pubDate>Thu, 04 May 2023 21:55:42 GMT</pubDate>
    <dc:creator>OtakarKlier</dc:creator>
    <dc:date>2023-05-04T21:55:42Z</dc:date>
    <item>
      <title>USER-ID policies + FULL azure ad</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/540770#M1869</link>
      <description>&lt;P&gt;Hello everyone ,&lt;/P&gt;
&lt;P&gt;I'm having a problem that I can't solve.&lt;/P&gt;
&lt;P&gt;I'll explain the context.&lt;BR /&gt;I am in full AZURE AD.&lt;BR /&gt;My computers are enrolled via INTUNE&lt;/P&gt;
&lt;P&gt;I would like to be able to set up user-based firewall rules.&lt;BR /&gt;I set up the "cloud identity engine" (linked to azure ad), I can see my groups and my users in the palo alto.&lt;BR /&gt;When I create a firewall rule and I associate a user to it, the rule has no effect on this user.&lt;BR /&gt;Do you have an idea ?&lt;/P&gt;
&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Tue, 02 May 2023 13:08:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/540770#M1869</guid>
      <dc:creator>LCutman</dc:creator>
      <dc:date>2023-05-02T13:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: USER-ID policies + FULL azure ad</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541136#M1873</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;I would check the policy you created against a traffic log to see if you accidentally missed something. Also check how the users names are displayed in the logs vs how they are in the policy.&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 04 May 2023 21:55:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541136#M1873</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-05-04T21:55:42Z</dc:date>
    </item>
    <item>
      <title>Re: USER-ID policies + FULL azure ad</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541214#M1877</link>
      <description>&lt;P&gt;HI &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/27580"&gt;@OtakarKlier&lt;/a&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;Thank you for taking the time to look at my question?&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;Here is some screenshot of my configuration&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LCutman_0-1683288245280.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49993iD855EF0BD47448AA/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="LCutman_0-1683288245280.png" alt="LCutman_0-1683288245280.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LCutman_1-1683288313607.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49994iB3933D41FD3A1FE0/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="LCutman_1-1683288313607.png" alt="LCutman_1-1683288313607.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LCutman_2-1683288364154.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49995iF8DA3907B7AA7B0F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="LCutman_2-1683288364154.png" alt="LCutman_2-1683288364154.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LCutman_3-1683288461114.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49996i1364A78AF4A6E42A/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="LCutman_3-1683288461114.png" alt="LCutman_3-1683288461114.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LCutman_4-1683288776698.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49997i346813527E692D86/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="LCutman_4-1683288776698.png" alt="LCutman_4-1683288776698.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LCutman_5-1683288939342.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49998iEF962506007D7787/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="LCutman_5-1683288939342.png" alt="LCutman_5-1683288939342.png" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LCutman_6-1683288976593.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/49999iC77F831629A44676/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="LCutman_6-1683288976593.png" alt="LCutman_6-1683288976593.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 12:16:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541214#M1877</guid>
      <dc:creator>LCutman</dc:creator>
      <dc:date>2023-05-05T12:16:51Z</dc:date>
    </item>
    <item>
      <title>Re: USER-ID policies + FULL azure ad</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541252#M1878</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;Honestly I never had to deal with Azure AD, bt something is off. I would open a case with PAN support on this one. Also just a few suggestions:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;I would recommend having a zone protection profile for you inside zones as well as external zones.&lt;/LI&gt;
&lt;LI&gt;Hopefully you are using a secure DNS. I understand that the google DNS was just ICMP only.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 14:32:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541252#M1878</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-05-05T14:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: USER-ID policies + FULL azure ad</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541300#M1879</link>
      <description>&lt;P&gt;I have some questions, but I think you are missing the User-IP mapping as the cloud identity engine won't provide IP. So far I heard only GP always one can help&lt;/P&gt;</description>
      <pubDate>Fri, 05 May 2023 21:38:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541300#M1879</guid>
      <dc:creator>mikealanni</dc:creator>
      <dc:date>2023-05-05T21:38:10Z</dc:date>
    </item>
    <item>
      <title>Re: USER-ID policies + FULL azure ad</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541532#M1881</link>
      <description>&lt;P&gt;Good morning&lt;BR /&gt;I simply did a test with a ping to 8.8.8.8&lt;/P&gt;
&lt;P&gt;But the configuration is not finalized yet&lt;/P&gt;</description>
      <pubDate>Tue, 09 May 2023 08:58:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/541532#M1881</guid>
      <dc:creator>LCutman</dc:creator>
      <dc:date>2023-05-09T08:58:59Z</dc:date>
    </item>
    <item>
      <title>Re: USER-ID policies + FULL azure ad</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/544681#M1898</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/236340"&gt;@LCutman&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Do you have an authentication rule that uses the auth profile in your first sceenshot? Your users need to authenticate to CIE before it can map users to IPs. The documentation is not particularly clear but I'm willing to lab it up as I'm doing a GP deployment for a customer in the same situation and looking at this it may be a better option...&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/watch?v=fZWMP5Bp_Go" target="_blank"&gt;Cloud Identity Engine Demonstration - YouTube&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jun 2023 11:37:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/544681#M1898</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2023-06-03T11:37:59Z</dc:date>
    </item>
    <item>
      <title>Re: USER-ID policies + FULL azure ad</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/544785#M1903</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/127749"&gt;@mb_equate&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Thanks for the video but I had seen it before.&lt;BR /&gt;If I understand correctly the only way to be able to use the cloud engine (with azure ad) to map the IP addresses is to use Global protect&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 12:18:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/544785#M1903</guid>
      <dc:creator>LCutman</dc:creator>
      <dc:date>2023-06-05T12:18:01Z</dc:date>
    </item>
    <item>
      <title>Re: USER-ID policies + FULL azure ad</title>
      <link>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/544869#M1904</link>
      <description>&lt;P&gt;Looking into this further, it appears to be the captive portal that actually does the mapping rather than CIE - an authentication rule steers the client to the captive portal which authenticates the user (presumably via a CIE auth profile), once the user is authenticated the portal provides the mapping data as it would in any other case. In theory you could do this without CIE if you used AzureAD as your authentication source in the rule.&lt;/P&gt;
&lt;P&gt;I've found the documentation rather sketchy when it comes to this, e.g. &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wlRyCAI" target="_self"&gt;this KB article&lt;/A&gt; states &lt;EM&gt;CIE&amp;nbsp;does not have the functionality to learn user to IP mapping&lt;/EM&gt; which is correct - CIE itself does not provide the mapping however &lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-the-cloud-identity-engine-as-a-mapping-source-on-the-firewall" target="_self"&gt;the documentation&lt;/A&gt; suggests you run&amp;nbsp;&lt;EM&gt;show user ip-user-mapping all&lt;/EM&gt; after configuring CIE which wouldn't work until you have a mapping source which CIE does not provide.&lt;/P&gt;
&lt;P&gt;The best I could find is this video&amp;nbsp;&lt;A href="https://youtu.be/_ppC2H8Ta_M?t=452" target="_blank"&gt;https://youtu.be/_ppC2H8Ta_M?t=452&lt;/A&gt;&amp;nbsp;which loosely shows the auth flow to CIE via a captive portal which is a standard method for mapping users to IPs when you don't have a Windows event log source (e.g. non-domain joined / BYOD):&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/user-id/map-ip-addresses-to-users/map-ip-addresses-to-usernames-using-captive-portal" target="_blank"&gt;Map IP Addresses to Usernames Using Authentication Portal (paloaltonetworks.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;So no, you don't need GlobalProtect, but I'm yet to be convinced this is reliable method that would be transparent to users without understanding the SSO methods (which will need to be either certificate based or dependent on existing authentication tokens).&lt;/P&gt;
&lt;P&gt;It would be great if PAN could demonstrate a working end-to-end solution for this.&lt;/P&gt;</description>
      <pubDate>Tue, 06 Jun 2023 00:51:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/vm-series-in-the-public-cloud/user-id-policies-full-azure-ad/m-p/544869#M1904</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2023-06-06T00:51:45Z</dc:date>
    </item>
  </channel>
</rss>

