<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic How is the cloud Identity Engine different from other IAM vendors (e.g., Okta or Ping or Azure AD)? in Cloud Identity Engine Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cloud-identity-engine/how-is-the-cloud-identity-engine-different-from-other-iam/m-p/411317#M1</link>
    <description>&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Cloud Identity Engine is a broker service and not IAM. It collects user and group information from multiple IAM vendors—like Okta Ping, and similar platforms—making the info uniformly available across all firewalls. Customers will continue to leverage their IAM providers; however, they no longer need to connect every IAM with every firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Cloud IAM tools (like OKTA, Ping, Azure AD, etc.) are meant for identities—i.e. for maintaining users and user group information. But they are not firewall companies, and so cannot and do not enforce security policies. With Palo Alto Networks, customers can authenticate users using groups/users in these Cloud IdPs and enforce identity-based security policies—such as Credential Phishing—along with our URL Filtering subscription.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;A cloud-offered service like Cloud Identity Engine keeps users and group information in sync with the Cloud IdP and On-prem Idps to PANW firewall at all times. By dynamically updating user information, complexity and operational burden are greatly reduced.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 04 Jun 2021 20:05:16 GMT</pubDate>
    <dc:creator>blevin</dc:creator>
    <dc:date>2021-06-04T20:05:16Z</dc:date>
    <item>
      <title>How is the cloud Identity Engine different from other IAM vendors (e.g., Okta or Ping or Azure AD)?</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-identity-engine/how-is-the-cloud-identity-engine-different-from-other-iam/m-p/411317#M1</link>
      <description>&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Cloud Identity Engine is a broker service and not IAM. It collects user and group information from multiple IAM vendors—like Okta Ping, and similar platforms—making the info uniformly available across all firewalls. Customers will continue to leverage their IAM providers; however, they no longer need to connect every IAM with every firewall.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;Cloud IAM tools (like OKTA, Ping, Azure AD, etc.) are meant for identities—i.e. for maintaining users and user group information. But they are not firewall companies, and so cannot and do not enforce security policies. With Palo Alto Networks, customers can authenticate users using groups/users in these Cloud IdPs and enforce identity-based security policies—such as Credential Phishing—along with our URL Filtering subscription.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="font-weight: 400;"&gt;A cloud-offered service like Cloud Identity Engine keeps users and group information in sync with the Cloud IdP and On-prem Idps to PANW firewall at all times. By dynamically updating user information, complexity and operational burden are greatly reduced.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 04 Jun 2021 20:05:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-identity-engine/how-is-the-cloud-identity-engine-different-from-other-iam/m-p/411317#M1</guid>
      <dc:creator>blevin</dc:creator>
      <dc:date>2021-06-04T20:05:16Z</dc:date>
    </item>
  </channel>
</rss>

