<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User-ID with Azure AD in Integration Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/302379#M51</link>
    <description>&lt;P&gt;I'm in the same boat as FDEMUYTER - all machines being managed via AzureAD/Azure Intune without any AD infra to speak of ( not in Hybrid ). Having to enter a userID kind of breaks the SSO experience IMO. Hoping there is a better way to do this.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Dec 2019 16:02:29 GMT</pubDate>
    <dc:creator>bwagstheitguy</dc:creator>
    <dc:date>2019-12-06T16:02:29Z</dc:date>
    <item>
      <title>User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/256166#M33</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have PC's that are only registered inside Azure AAD and managed via Intune they have no connection to the on-prem AD and are connecting via a Wifi zone behind PA to the internet. &amp;nbsp;How can i determine the USER id, without user interaction.&lt;/P&gt;&lt;P&gt;Or do i need Global protect for this and SSO?&lt;/P&gt;&lt;P&gt;Is there someting like a User ID agent for Azure AAD.&lt;/P&gt;&lt;P&gt;Or maybe i can use SAML SSO with Azure AAD for captive portal, can somebody point me to a good article on how to configure this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 04 Apr 2019 20:13:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/256166#M33</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2019-04-04T20:13:14Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/259597#M36</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for your question! This is an awesome use-case however, it's not one that we natively support at this time. There are other customers that have expressed interest in this capability.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If there's a chance you're running in a hybrid mode and have a Windows Server running AD and synchronizing with Azure AD then, of course, you can use the User-ID agent to communicate with the domain controller. SAML authentication works great with GlobalProtect, but it is not intended for use with User-ID.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you'd like, you can contact me directly (email is first initial last name - no spaces or hyphens [at] paloaltonetworks[dot]com and provide me with your contact information, I'd be happy to add you to the enhancement request list.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for reaching out!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-JeffH&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Jeff Hochberg | Sr. Systems Engineer - Technical Business Development&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Palo Alto Networks&amp;nbsp;|&amp;nbsp;Atlanta, GA&amp;nbsp;|&amp;nbsp;&amp;nbsp;USA&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Mobile:&lt;/STRONG&gt;&amp;nbsp;404.432.1112&amp;nbsp;|&amp;nbsp;&lt;U&gt;www.&lt;/U&gt;&lt;U&gt;&lt;A href="https://www.paloaltonetworks.com/" target="_blank" rel="nofollow noopener noreferrer noopener noreferrer"&gt;paloaltonetworks.com&lt;/A&gt;&lt;/U&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="1 2 3 4 5 6 7"&gt;&lt;EM&gt;The content of this message is the proprietary and confidential property of Palo Alto Networks and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by reply e-mail. Any unauthorized use or distribution of the content of this message is prohibited.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 10:09:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/259597#M36</guid>
      <dc:creator>jhochberg</dc:creator>
      <dc:date>2019-05-02T10:09:13Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/259675#M37</link>
      <description>&lt;P&gt;Hi Jeff,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have dropped you an e-mail with my contact details. &amp;nbsp;To get around this limitation i could maybe user a captive portal and SAML SSO?&lt;/P&gt;&lt;P&gt;In my case these user are all on a seperate segment.&lt;/P&gt;&lt;P&gt;I will have to test this out. &amp;nbsp;&lt;/P&gt;&lt;P&gt;Never the less &amp;nbsp;integrating User-ID with Azure AAD would be a good enhancement.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2019 20:06:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/259675#M37</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2019-05-02T20:06:34Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/276256#M47</link>
      <description>&lt;P&gt;Hi Jeff,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any idea if this i a feature that will be introduced or palo alto is considering this?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jul 2019 20:49:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/276256#M47</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2019-07-11T20:49:00Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/302379#M51</link>
      <description>&lt;P&gt;I'm in the same boat as FDEMUYTER - all machines being managed via AzureAD/Azure Intune without any AD infra to speak of ( not in Hybrid ). Having to enter a userID kind of breaks the SSO experience IMO. Hoping there is a better way to do this.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2019 16:02:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/302379#M51</guid>
      <dc:creator>bwagstheitguy</dc:creator>
      <dc:date>2019-12-06T16:02:29Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/302401#M52</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;what you could to to get the user id is use global protect client with SAML authentication to azure.&lt;/P&gt;&lt;P&gt;You can connect to internal or external portal and use always on.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Dec 2019 17:53:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/302401#M52</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2019-12-06T17:53:58Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328180#M53</link>
      <description>&lt;P&gt;Hi. Have there been any updates regarding direct integration with Azure AD? We are looking to move to SaaS infrastructure.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 11:51:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328180#M53</guid>
      <dc:creator>Trond.Olsen</dc:creator>
      <dc:date>2020-05-15T11:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328218#M54</link>
      <description>&lt;P&gt;Hi Olson,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;No user-id agent for azure directly but you can solve this issue by using global protect and SAML authentication.&lt;/P&gt;&lt;P&gt;It depends on what you need and what is your use-case.&lt;/P&gt;&lt;P&gt;What do you want to accomplish in the end?&lt;/P&gt;&lt;P&gt;You can also look into Prisma.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2020 15:25:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328218#M54</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2020-05-15T15:25:29Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328463#M55</link>
      <description>&lt;P&gt;Hi there&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently using UserID in schools to implement internet filtering during exams. The number of students far exceed our VPN tunnel capacity in our Palo Alto firewall so we can't use Globalprotect either. Another issue with Azure AD mentioned elsewhere is that you'll see the public NAT IP externally, so maybe UserID isn't an option at all? Maybe we have to look at alternativ implementation in our Cisco wifi solution.&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 06:56:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328463#M55</guid>
      <dc:creator>Trond.Olsen</dc:creator>
      <dc:date>2020-05-18T06:56:46Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328476#M56</link>
      <description>&lt;P&gt;Hi Olsen,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are using Cisco ISE you could try forwarding you logs to a palo alto user id agent configured as a syslog listener.&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/map-ip-addresses-to-users/configure-user-id-to-monitor-syslog-senders-for-user-mapping" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/user-id/map-ip-addresses-to-users/configure-user-id-to-monitor-syslog-senders-for-user-mapping&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I have not tried it myself but was also something i was thinking about.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Another thing you could to is use an internal portal only without creating a tunnel but only for authentication. This is called a non-tunnel mode gateway. (always on configuration)&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/8-0/globalprotect-admin/globalprotect-gateways/globalprotect-gateway-concepts/types-of-gateways" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/globalprotect/8-0/globalprotect-admin/globalprotect-gateways/globalprotect-gateway-concepts/types-of-gateways&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This will require you to deploy global protect to all your clients.&lt;/P&gt;&lt;P&gt;This solution will give you the most accurate solution I think.&lt;/P&gt;&lt;P&gt;I am assuming all your users and computer are in azure ad only? How are your users authenticated on the WIFI?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 09:15:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328476#M56</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2020-05-18T09:15:48Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328479#M57</link>
      <description>&lt;P&gt;These are good suggestions! I wasn't aware that Globalprotect could be used for autentication only though license might be an issue with iPad and Chromebook. We might get some consulant advice on Cisco ISE as we discarded it some years ago because concerns around complexity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Concerning Azure AD we plan to remove our on-premise AD entirely.&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 09:23:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328479#M57</guid>
      <dc:creator>Trond.Olsen</dc:creator>
      <dc:date>2020-05-18T09:23:00Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328519#M58</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;There are different options for your problem but moving everything to the cloud will need carefull planning and decisions up front.&lt;/P&gt;&lt;P&gt;A good read is also:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory-domain-services/compare-identity-solutions" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/active-directory-domain-services/compare-identity-solutions&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also please have a look into Prisma if you are moving to full cloud.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 May 2020 12:42:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/328519#M58</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2020-05-18T12:42:57Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/336574#M60</link>
      <description>&lt;P&gt;I think the bigger picture here needs to be put into perspective:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Microsoft is doing everything that they can do to prevent small business from having any on-site servers or services. This includes breaking most file server functions for office, in favor of one-drive, etc.&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;Hybrid AD deployments are a disaster for SMB - Why have an AD server on-site that does nothing but remote accounts locally when inTune does as much or more than ADGP when it comes to SMB needs.&lt;/LI&gt;&lt;LI&gt;With COVID and general WFH and BYOD fewer PCs than ever are physically connected to an AD and forcing VPN connectivity just for policy and password management updates is kind of insane when Office and everything else Microsoft is not communicating with O365.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;I find it almost imperative that the LOCAL firewall policy be able apply rules based on AzureAd membership - be it User-ID or some other SSO method. I can tell you that almost every one of my SMB customers is already, or will be completely server-less by the end of the year and all will be AzureAD/Intune managed.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;There has to be a better way to put 10-50 users into policy based filtering than hydribd-AD or forcing a VPN connection from the same office that the firewall resides in. That is just insane, especially seeing that often, another VPN is used by client PCs to connect to various SaaS endpoints or hosted services.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;This is the new SMB model and Palo Alto really needs to embrace it quickly.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Jul 2020 14:20:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/336574#M60</guid>
      <dc:creator>wburnett</dc:creator>
      <dc:date>2020-07-03T14:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/348401#M61</link>
      <description>&lt;P&gt;I agree, this is something that we are planning for in the near future. Palo Alto needs to come up with a solution very quickly.&lt;/P&gt;</description>
      <pubDate>Thu, 10 Sep 2020 20:05:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/348401#M61</guid>
      <dc:creator>trlawren</dc:creator>
      <dc:date>2020-09-10T20:05:45Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/354865#M62</link>
      <description>&lt;P&gt;Crickets...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hello Palo Alto -- care to comment about this?&lt;/P&gt;</description>
      <pubDate>Wed, 07 Oct 2020 15:22:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/354865#M62</guid>
      <dc:creator>wburnett</dc:creator>
      <dc:date>2020-10-07T15:22:54Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/395222#M64</link>
      <description>&lt;P&gt;Any replies on this Palo? Plenty of people would like to see this functionality.&lt;/P&gt;</description>
      <pubDate>Wed, 31 Mar 2021 18:35:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/395222#M64</guid>
      <dc:creator>mlopez78</dc:creator>
      <dc:date>2021-03-31T18:35:25Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/422654#M86</link>
      <description>&lt;P&gt;It's July 2021 , Intune/Microsoft Endpoint Manager isn't going away.&amp;nbsp; People are moving to it.&amp;nbsp; We have moved all of out endpoints to Intune.&amp;nbsp; Palo Alto needs a solution.&amp;nbsp; Is there an update here?&lt;/P&gt;</description>
      <pubDate>Wed, 28 Jul 2021 13:34:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/422654#M86</guid>
      <dc:creator>Housing1</dc:creator>
      <dc:date>2021-07-28T13:34:05Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/422958#M87</link>
      <description>&lt;P&gt;Hi Housing1,&lt;/P&gt;&lt;P&gt;As of today I am not aware of any direct integration with Azure AD.(used id agent for azure) &amp;nbsp;If you have Azure Active Directory Domain Services you could get group mappings using ldaps.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A title="Group Mappings" href="https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/authentication/enable-group-mapping.html" target="_self"&gt;https://docs.paloaltonetworks.com/globalprotect/10-1/globalprotect-admin/authentication/enable-group-mapping.html&lt;/A&gt;&amp;nbsp;.&lt;/P&gt;&lt;P&gt;To get the user info you could use a global protect client internal portal for authentication only using SAML. (portal non-tunnel model)&lt;/P&gt;&lt;P&gt;Or you can setup a captive portal with SAML authentication to Azure AD.&lt;/P&gt;&lt;P&gt;Depends on you use case.&lt;/P&gt;&lt;P&gt;I think the best option is to use global protect client. &amp;nbsp; For windows laptops no license is needed only for mobile endpoints and linux clients. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 29 Jul 2021 07:45:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/422958#M87</guid>
      <dc:creator>GOMEZZZ</dc:creator>
      <dc:date>2021-07-29T07:45:48Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/480788#M136</link>
      <description>&lt;P&gt;Hello PAN team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Were there any updates about supporting &lt;/SPAN&gt;&lt;STRONG&gt;Azure AAD for User-ID&lt;/STRONG&gt;&lt;SPAN&gt; since Jeff Hochberg commented in 2019?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks,&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Apr 2022 19:34:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/480788#M136</guid>
      <dc:creator>AnalysisMan</dc:creator>
      <dc:date>2022-04-18T19:34:34Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/487810#M142</link>
      <description>&lt;P&gt;Bump. Any update to this, 3 years now, this is a major problem now?&lt;/P&gt;</description>
      <pubDate>Tue, 17 May 2022 13:16:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/integration-discussions/user-id-with-azure-ad/m-p/487810#M142</guid>
      <dc:creator>PMCHelpdesk</dc:creator>
      <dc:date>2022-05-17T13:16:58Z</dc:date>
    </item>
  </channel>
</rss>

