<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cloud Identity Engine - Failed to get client configuration in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cloud-identity-engine-failed-to-get-client-configuration/m-p/585005#M5299</link>
    <description>&lt;P&gt;I was right! Disabling the LDAP group mapping solved the issue. ALL the output of the relevant commands below are identical to the failed state, only the client config is now matching the CIE group correctly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;show user user-ids match user &amp;lt;upn&amp;gt;&lt;/EM&gt; lists the primary username and CIE group membership used in config selection&lt;/P&gt;
&lt;P&gt;&lt;EM&gt; show user user-attributes user &amp;lt;upn&amp;gt;&lt;/EM&gt; lists the alt user name attributes from the CIE group, not that they are needed now&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;show user group name &amp;lt;group&amp;gt; | match &amp;lt;upn&amp;gt;&amp;nbsp;&lt;/EM&gt;lists the user as a member of the group used in config selection&lt;/P&gt;
&lt;P&gt;&lt;EM&gt; debug user-id dump domain-map&lt;/EM&gt; lists&amp;nbsp;&lt;EM&gt;ONLY&amp;nbsp;&lt;/EM&gt;the CIE domain map (FQDN/short name).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For now I'm advising other clients migrating from LDAP to CIE to disable LDAP groups, if there are no other dependencies on those groups. Not sure what to do if there are, other than a full migration to CIE replacing groups in policy.&lt;/P&gt;</description>
    <pubDate>Fri, 26 Apr 2024 03:48:28 GMT</pubDate>
    <dc:creator>mb_equate</dc:creator>
    <dc:date>2024-04-26T03:48:28Z</dc:date>
    <item>
      <title>Cloud Identity Engine - Failed to get client configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cloud-identity-engine-failed-to-get-client-configuration/m-p/584444#M5274</link>
      <description>&lt;P&gt;Migrating from on-prem (radius/ldap) auth &amp;amp; group mapping to CIE using AAD for both directory and auth types.GP porta connection fails with "Failed to get client configuration".&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Things we've checked...&lt;/P&gt;
&lt;P&gt;* CIE Auth Type configured to use the 'name' SAML claim from Azure AD, which happens to be the UPN&lt;/P&gt;
&lt;P&gt;* CIE Group Mapping is using UPN as the primary username&lt;/P&gt;
&lt;P&gt;* CIE auth profile on the device is restricted to AAD groups (authN works)&lt;/P&gt;
&lt;P&gt;* The user's UPN appears in the synced group&lt;/P&gt;
&lt;P&gt;* Serial number check in config selection criteria is&amp;nbsp;&lt;EM&gt;none&amp;nbsp;&lt;/EM&gt;and not no&lt;/P&gt;
&lt;P&gt;* Restart userid process&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We still have the LDAP groups available, when used in the config selection criteria a user authenticated by CIE is found in the&amp;nbsp;&lt;EM&gt;LDAP&amp;nbsp;&lt;/EM&gt;group and authZ succeeds, but strangely we see UserID transforming the UPN provided by GP from the SAML claim to the LDAP sAMAccountName i.e. domain\user which matches the LDAP group membership.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I suspect this is a hangover from the LDAP domain-map although when we dump the domain map it lists only the CIE/AAD domain and short name (client.onmicrosoft.com / client) - must I remove the LDAP group mapping? Are CIE and LDAP mutually exclusive?&lt;/P&gt;</description>
      <pubDate>Mon, 22 Apr 2024 05:19:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cloud-identity-engine-failed-to-get-client-configuration/m-p/584444#M5274</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-04-22T05:19:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Identity Engine - Failed to get client configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cloud-identity-engine-failed-to-get-client-configuration/m-p/584659#M5283</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would make sure your primary username attribute and your CIE attributes match each other, that'll be easiest for moving things over.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We are currently running both LDAP and CIE SAML at the moment. we have users set to primary as UPN as it was easier to get those two to match up that way. The way your users are going to show up in your logs is going to be based off the "Primary Username" under your "Group Mapping Settings"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would also CLI into the firewall and make sure the username is being group matched as intended:&amp;nbsp;show user user-ids match-user USER&lt;/P&gt;</description>
      <pubDate>Tue, 23 Apr 2024 17:15:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cloud-identity-engine-failed-to-get-client-configuration/m-p/584659#M5283</guid>
      <dc:creator>Claw4609</dc:creator>
      <dc:date>2024-04-23T17:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Identity Engine - Failed to get client configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cloud-identity-engine-failed-to-get-client-configuration/m-p/585004#M5298</link>
      <description>&lt;P&gt;This works for my client (custom LDAP group and CIE SAML) as one of the user's&amp;nbsp;&lt;EM&gt;alt user names&amp;nbsp;&lt;/EM&gt;appears in the LDAP group, but not the UPN. The UPN&amp;nbsp;&lt;EM&gt;IS&amp;nbsp;&lt;/EM&gt;in the CIE group in the client selection criteria, but only matches when we use the LDAP group instead.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;TAC have asked to check&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u0000001V9KCAU" target="_blank"&gt;GlobalProtect is not getting the configuration when user authen... - Knowledge Base - Palo Alto Networks&lt;/A&gt;, which is even more confusing because a) logs identifying the normalised username don't exist in PAN-OS 11 and b) states the normalised username "&lt;SPAN&gt;is not part of the user-attributes output&lt;/SPAN&gt;" despite being the&amp;nbsp;&lt;EM&gt;primary&lt;/EM&gt; username.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In our case, the output of "show user user-ids match-user USER" lists the user's UPN and matches the group in question.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It's possible our issue is similar to&amp;nbsp;&lt;A href="https://live.paloaltonetworks.com/t5/general-topics/problems-with-windows-user-id-agent-and-the-normalized-users/m-p/379078/highlight/true#M89544" target="_blank"&gt;LIVEcommunity - Re: Problems with Windows User-ID Agent and the normalized Users - LIVEcommunity - 378972 (paloaltonetworks.com)&lt;/A&gt;&amp;nbsp;where the domain-map from one LDAP group mapping is affecting another (CIE in this case).&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 03:32:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cloud-identity-engine-failed-to-get-client-configuration/m-p/585004#M5298</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-04-26T03:32:24Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Identity Engine - Failed to get client configuration</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cloud-identity-engine-failed-to-get-client-configuration/m-p/585005#M5299</link>
      <description>&lt;P&gt;I was right! Disabling the LDAP group mapping solved the issue. ALL the output of the relevant commands below are identical to the failed state, only the client config is now matching the CIE group correctly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;show user user-ids match user &amp;lt;upn&amp;gt;&lt;/EM&gt; lists the primary username and CIE group membership used in config selection&lt;/P&gt;
&lt;P&gt;&lt;EM&gt; show user user-attributes user &amp;lt;upn&amp;gt;&lt;/EM&gt; lists the alt user name attributes from the CIE group, not that they are needed now&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;show user group name &amp;lt;group&amp;gt; | match &amp;lt;upn&amp;gt;&amp;nbsp;&lt;/EM&gt;lists the user as a member of the group used in config selection&lt;/P&gt;
&lt;P&gt;&lt;EM&gt; debug user-id dump domain-map&lt;/EM&gt; lists&amp;nbsp;&lt;EM&gt;ONLY&amp;nbsp;&lt;/EM&gt;the CIE domain map (FQDN/short name).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;For now I'm advising other clients migrating from LDAP to CIE to disable LDAP groups, if there are no other dependencies on those groups. Not sure what to do if there are, other than a full migration to CIE replacing groups in policy.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Apr 2024 03:48:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/cloud-identity-engine-failed-to-get-client-configuration/m-p/585005#M5299</guid>
      <dc:creator>mb_equate</dc:creator>
      <dc:date>2024-04-26T03:48:28Z</dc:date>
    </item>
  </channel>
</rss>

