<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User-ID using Cloud identity engine with Azure AD in Cloud Identity Engine Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cloud-identity-engine/user-id-using-cloud-identity-engine-with-azure-ad/m-p/559759#M56</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34819"&gt;@BFC&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wish the PANW CIE documentation was more clear.&amp;nbsp; From my understanding, the CIE does NOT map users to IP addresses.&amp;nbsp; It maps users to groups.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Look at the last command in this doc -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-the-cloud-identity-engine-as-a-mapping-source-on-the-firewall" target="_blank"&gt;https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-the-cloud-identity-engine-as-a-mapping-source-on-the-firewall&lt;/A&gt;.&amp;nbsp; "On the firewall, use the show user ip-user-mapping all command to verify that the mapping information is available to the firewall."&amp;nbsp; My guess is that you have no user-to-IP mappings.&amp;nbsp; What is the ouput of that command on your NGFW?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Notice the 2nd to the last paragraph on this doc -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/get-started-with-the-cloud-identity-engine/learn-about-the-cloud-identity-engine#id3f7f173a-ab4b-4040-b82e-86944d8b769b" target="_blank"&gt;https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/get-started-with-the-cloud-identity-engine/learn-about-the-cloud-identity-engine#id3f7f173a-ab4b-4040-b82e-86944d8b769b&lt;/A&gt;.&amp;nbsp; “On the firewall, configure an Authentication policy that requires users to log in using Authentication Portal to access resources such as the internet.”&amp;nbsp; It is this Authentication Policy (not to be confused with the CIE Authentication Profile) that actually captures the user IP addresses when they successfully authenticate.&amp;nbsp; The web page used for logins is called the Authentication Portal or Captive Portal.&amp;nbsp; Without this piece, AAD or CIE has no idea what the user's IP address is.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's a huge part of the solution that is rarely mentioned!&amp;nbsp; Authentication Portal takes quite a few steps to configure.&amp;nbsp; Plus, your users now have an extra login.&amp;nbsp; They good news is that once you configure User-ID for user-to-IP mappings, you can do some cool stuff.&amp;nbsp; You also are not limited to the Authentication Portal.&amp;nbsp; You can use any method in the diagram here -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/user-id-overview" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/user-id-overview&lt;/A&gt; as long as the username format matches.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are your users logging into the network already, such as WiFi 802.1x?&amp;nbsp; You can forward that info to the NGFW using syslog.&amp;nbsp; Do your users already have GlobalProtect?&amp;nbsp; You can set it up with Internal Host Detection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Wed, 27 Sep 2023 18:55:03 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2023-09-27T18:55:03Z</dc:date>
    <item>
      <title>User-ID using Cloud identity engine with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-identity-engine/user-id-using-cloud-identity-engine-with-azure-ad/m-p/559428#M55</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are in the process of configuring the Cloud Identity Engine with the directory sync features with Azure-AD to pool the users and the groups in order to applying role/group-based access control. Despite successfully completing several steps of the configuration process, we are experiencing difficulties with the application of policies to the specified users and groups.&lt;/P&gt;
&lt;P&gt;Here is a summary of the steps we have completed thus far:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;1. Activation of the Cloud Identity Engine in the hub.&lt;BR /&gt;2. Configuration of a cloud-based directory for (Azure AD) to establish communication with the Cloud Identity Engine.&lt;BR /&gt;3. Setting up Azure as an IdP within the Cloud Identity Engine for user authentication.&lt;BR /&gt;4. Creation of an Authentication Profile in the Cloud Identity Engine.&lt;BR /&gt;5. Configuration of Cloud Identity Engine Authentication on our PaloAlto Firewall.&lt;BR /&gt;6. Setup of the Cloud Identity Engine as a Mapping Source on our PaloAlto Firewall.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Following the aforementioned setup, we linked the Cloud Identity Engine with Azure AD and pooled the users and the groups. We proceeded to map a Cloud Identity Engine profile in the User Identification sub-menu. During policy creation, we can view our groups and users, however, it seems that the policies are not being applied to these users or groups as expected.&lt;/P&gt;</description>
      <pubDate>Tue, 26 Sep 2023 01:47:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-identity-engine/user-id-using-cloud-identity-engine-with-azure-ad/m-p/559428#M55</guid>
      <dc:creator>BFC</dc:creator>
      <dc:date>2023-09-26T01:47:23Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID using Cloud identity engine with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/cloud-identity-engine/user-id-using-cloud-identity-engine-with-azure-ad/m-p/559759#M56</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/34819"&gt;@BFC&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wish the PANW CIE documentation was more clear.&amp;nbsp; From my understanding, the CIE does NOT map users to IP addresses.&amp;nbsp; It maps users to groups.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Look at the last command in this doc -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-the-cloud-identity-engine-as-a-mapping-source-on-the-firewall" target="_blank"&gt;https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-the-cloud-identity-engine-as-a-mapping-source-on-the-firewall&lt;/A&gt;.&amp;nbsp; "On the firewall, use the show user ip-user-mapping all command to verify that the mapping information is available to the firewall."&amp;nbsp; My guess is that you have no user-to-IP mappings.&amp;nbsp; What is the ouput of that command on your NGFW?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Notice the 2nd to the last paragraph on this doc -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/get-started-with-the-cloud-identity-engine/learn-about-the-cloud-identity-engine#id3f7f173a-ab4b-4040-b82e-86944d8b769b" target="_blank"&gt;https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/get-started-with-the-cloud-identity-engine/learn-about-the-cloud-identity-engine#id3f7f173a-ab4b-4040-b82e-86944d8b769b&lt;/A&gt;.&amp;nbsp; “On the firewall, configure an Authentication policy that requires users to log in using Authentication Portal to access resources such as the internet.”&amp;nbsp; It is this Authentication Policy (not to be confused with the CIE Authentication Profile) that actually captures the user IP addresses when they successfully authenticate.&amp;nbsp; The web page used for logins is called the Authentication Portal or Captive Portal.&amp;nbsp; Without this piece, AAD or CIE has no idea what the user's IP address is.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;That's a huge part of the solution that is rarely mentioned!&amp;nbsp; Authentication Portal takes quite a few steps to configure.&amp;nbsp; Plus, your users now have an extra login.&amp;nbsp; They good news is that once you configure User-ID for user-to-IP mappings, you can do some cool stuff.&amp;nbsp; You also are not limited to the Authentication Portal.&amp;nbsp; You can use any method in the diagram here -&amp;gt; &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/user-id-overview" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/user-id/user-id-overview&lt;/A&gt; as long as the username format matches.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Are your users logging into the network already, such as WiFi 802.1x?&amp;nbsp; You can forward that info to the NGFW using syslog.&amp;nbsp; Do your users already have GlobalProtect?&amp;nbsp; You can set it up with Internal Host Detection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 27 Sep 2023 18:55:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cloud-identity-engine/user-id-using-cloud-identity-engine-with-azure-ad/m-p/559759#M56</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-09-27T18:55:03Z</dc:date>
    </item>
  </channel>
</rss>

