<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: UserID mapping for users usings Azure VPN Gateway and AzureAD in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/userid-mapping-for-users-usings-azure-vpn-gateway-and-azuread/m-p/1234696#M6129</link>
    <description>&lt;P&gt;Hi JPope,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no native support for you scenario.&amp;nbsp; &amp;nbsp;Since you are authenticating via the Azure VPN gateway using Azure Point to site , only azure knows the user to ip mapping and palo is not aware of this.&amp;nbsp; I don't know you Azure landscape but i am assuming you have deployed a hub and spoke topology inside Azure and your palo is inside the HUB.&amp;nbsp; You could deploy a global protect gateway on your palo alto in Azure and user an Azure Application Gateway or External Loadbalancer to publish the global protect portal/gateway out to the internet.&lt;/P&gt;
&lt;P&gt;And then let you remote user use global protect then you will have all the info you need, of course this would require a redesign of your topology.&lt;/P&gt;
&lt;P&gt;Another approach is somehow getting the S2SVPN Logs forwarded to your palo alto firewall.&amp;nbsp; &amp;nbsp;The theortical approach would then be don't see any reason why it won't work but i will take time and effort.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Azure VPN Gateway&lt;BR /&gt;↓&amp;nbsp; enable (Diagnostic logs)&lt;BR /&gt;Log Analytics Workspace&lt;BR /&gt;↓ (queried by Azure Function)&lt;BR /&gt;Azure Function (Python)&lt;BR /&gt;↓&lt;BR /&gt;Palo Alto Firewall (User-ID XML API)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But in short no easy way of doing this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 25 Jul 2025 13:18:49 GMT</pubDate>
    <dc:creator>F.DeMuyter</dc:creator>
    <dc:date>2025-07-25T13:18:49Z</dc:date>
    <item>
      <title>UserID mapping for users usings Azure VPN Gateway and AzureAD</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/userid-mapping-for-users-usings-azure-vpn-gateway-and-azuread/m-p/1234372#M6106</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have a unique scenario. We have a PA VM Firewall in Azure. We use Azure VPN Gateway to allow users to VPN in if need be (mainly 3rd party support) to get to services on the other side of the FW. The user's credentials authenticate against AzureAD using MFA. I need to know if there is a way to implement UserID, or something similar, that will allow me to set specific policies on which user or group of users has VPNed in using the groups they are in AzureAD.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The user accounts are also replicated to on-prem AD, so I don't know if that helps with a solution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jul 2025 16:49:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/userid-mapping-for-users-usings-azure-vpn-gateway-and-azuread/m-p/1234372#M6106</guid>
      <dc:creator>JPope_ITG</dc:creator>
      <dc:date>2025-07-21T16:49:56Z</dc:date>
    </item>
    <item>
      <title>Re: UserID mapping for users usings Azure VPN Gateway and AzureAD</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/userid-mapping-for-users-usings-azure-vpn-gateway-and-azuread/m-p/1234696#M6129</link>
      <description>&lt;P&gt;Hi JPope,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There is no native support for you scenario.&amp;nbsp; &amp;nbsp;Since you are authenticating via the Azure VPN gateway using Azure Point to site , only azure knows the user to ip mapping and palo is not aware of this.&amp;nbsp; I don't know you Azure landscape but i am assuming you have deployed a hub and spoke topology inside Azure and your palo is inside the HUB.&amp;nbsp; You could deploy a global protect gateway on your palo alto in Azure and user an Azure Application Gateway or External Loadbalancer to publish the global protect portal/gateway out to the internet.&lt;/P&gt;
&lt;P&gt;And then let you remote user use global protect then you will have all the info you need, of course this would require a redesign of your topology.&lt;/P&gt;
&lt;P&gt;Another approach is somehow getting the S2SVPN Logs forwarded to your palo alto firewall.&amp;nbsp; &amp;nbsp;The theortical approach would then be don't see any reason why it won't work but i will take time and effort.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Azure VPN Gateway&lt;BR /&gt;↓&amp;nbsp; enable (Diagnostic logs)&lt;BR /&gt;Log Analytics Workspace&lt;BR /&gt;↓ (queried by Azure Function)&lt;BR /&gt;Azure Function (Python)&lt;BR /&gt;↓&lt;BR /&gt;Palo Alto Firewall (User-ID XML API)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;But in short no easy way of doing this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Jul 2025 13:18:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/userid-mapping-for-users-usings-azure-vpn-gateway-and-azuread/m-p/1234696#M6129</guid>
      <dc:creator>F.DeMuyter</dc:creator>
      <dc:date>2025-07-25T13:18:49Z</dc:date>
    </item>
  </channel>
</rss>

