<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic The user information linked in the CIE does not match the match criteria in the GP's application settings. in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/the-user-information-linked-in-the-cie-does-not-match-the-match/m-p/1234951#M1187</link>
    <description>&lt;P&gt;&lt;SPAN&gt;We would like to know the user information that corresponds to the GP sign-in account and tunnel settings and other matching conditions.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We are currently verifying SAML login and SSO in our verification environment.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;In the GP application and tunnel settings, we have specified the user information obtained from the Entra ID as the matching condition, but we have not found the desired setting, and we are applying the application and tunnel settings that have “any” set as the matching condition in the subordinate settings.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;SAML authentication using the CIE authentication profile has succeeded without any problems, and authentication using the SAML authentication profile has also succeeded without any problems.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;In addition, we are currently specifying a user who is displayed in the “username@domain” format as a match condition (we are aware that this format is displayed by setting the primary user name to UPN on the SCM).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;On the other hand, when the actual GP connection is made, the intended application settings and tunnel settings are not used, and other settings with any match condition are applied.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;◆Reference documents for initial environment construction&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;・SCIM linking of CIE and Entra ID&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Configuration of SCIM connector for Cloud Identity Engine&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;・SAML authentication using CIE&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma-access/integration/microsoft-integrations-with-prisma-access/azure-ad-saml-authentication-for-mobile-user-deployments/configure-mobile-users-using-cloud-identity-engine" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/prisma-access/integration/microsoft-integrations-with-prisma-access/azure-ad-saml-authentication-for-mobile-user-deployments/configure-mobile-users-using-cloud-identity-engine&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Prisma Access configuration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;・Both Group Mapping and SAML authentication are configured via Cloud Identity Engine (CIE) with SCIM connector.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The matching condition for tunnel and application settings is the user obtained from Entra ID, and the relevant settings have been moved to the top of the list.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;There is no problem with the GP connection.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;For NGFW and Prisma Access&amp;gt;ID Service&amp;gt;CIE&amp;gt;User Attributes, the user principal name (UPN) is selected as the primary name. Alternative user names and mail fields are set to None.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;In the CIE, the linked users are visible, and the Sync Status is Success.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We have configured the system based on the document, but because the assumed GP application settings and tunnel settings are not being used, we have changed the Entra ID settings as follows.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Entra ID settings&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The following settings have been changed to UPN in the Palo Alto Networks SCIM Connector and Palo Alto Networks Cloud Identity Engine of the enterprise application.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Home&amp;gt;Default Directory&amp;gt;Enterprise Applications&amp;gt;Palo Alto Networks SCIM Connector&amp;gt;Provisioning&amp;gt;Mapping&amp;gt;Provision Microsoft Entra ID Users&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-&amp;gt; PaloAltoNetworks attribute Microsoft Entra ID attributes corresponding to userName and displayName are both changed to UPN.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Home&amp;gt;Default Directory&amp;gt;Enterprise Applications&amp;gt;Palo Alto Networks Cloud Identity Engine - Cloud Authentication Service&amp;gt;Single Sign-On&amp;gt;Attributes and Claims&amp;gt;Change&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;unique username value to UPN.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;◆Questions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;We believe that there is no applicable section in the SCM configuration except NGFW and Prisma Access&amp;gt;ID Service&amp;gt;CIE&amp;gt;User Attributes, and we assume that the Entra ID side may be returning user information other than UPNs.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Therefore, we would like to know two points.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Question 1: Are there any settings required by Entra ID for SCIM linkage other than the settings listed in the&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;configuration details?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Question 2) We do not think there are any settings other than NGFW and Prisma Access&amp;gt;ID Service&amp;gt;CIE&amp;gt;User Attributes in&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;SCM, is this correct?&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Wed, 30 Jul 2025 01:36:51 GMT</pubDate>
    <dc:creator>AikawaHinata</dc:creator>
    <dc:date>2025-07-30T01:36:51Z</dc:date>
    <item>
      <title>The user information linked in the CIE does not match the match criteria in the GP's application settings.</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/the-user-information-linked-in-the-cie-does-not-match-the-match/m-p/1234951#M1187</link>
      <description>&lt;P&gt;&lt;SPAN&gt;We would like to know the user information that corresponds to the GP sign-in account and tunnel settings and other matching conditions.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We are currently verifying SAML login and SSO in our verification environment.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;In the GP application and tunnel settings, we have specified the user information obtained from the Entra ID as the matching condition, but we have not found the desired setting, and we are applying the application and tunnel settings that have “any” set as the matching condition in the subordinate settings.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;SAML authentication using the CIE authentication profile has succeeded without any problems, and authentication using the SAML authentication profile has also succeeded without any problems.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;In addition, we are currently specifying a user who is displayed in the “username@domain” format as a match condition (we are aware that this format is displayed by setting the primary user name to UPN on the SCM).&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;On the other hand, when the actual GP connection is made, the intended application settings and tunnel settings are not used, and other settings with any match condition are applied.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;◆Reference documents for initial environment construction&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;・SCIM linking of CIE and Entra ID&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Configuration of SCIM connector for Cloud Identity Engine&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;・SAML authentication using CIE&lt;/SPAN&gt;&lt;BR /&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma-access/integration/microsoft-integrations-with-prisma-access/azure-ad-saml-authentication-for-mobile-user-deployments/configure-mobile-users-using-cloud-identity-engine" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/prisma-access/integration/microsoft-integrations-with-prisma-access/azure-ad-saml-authentication-for-mobile-user-deployments/configure-mobile-users-using-cloud-identity-engine&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Prisma Access configuration&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;・Both Group Mapping and SAML authentication are configured via Cloud Identity Engine (CIE) with SCIM connector.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The matching condition for tunnel and application settings is the user obtained from Entra ID, and the relevant settings have been moved to the top of the list.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;There is no problem with the GP connection.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;For NGFW and Prisma Access&amp;gt;ID Service&amp;gt;CIE&amp;gt;User Attributes, the user principal name (UPN) is selected as the primary name. Alternative user names and mail fields are set to None.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;In the CIE, the linked users are visible, and the Sync Status is Success.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;We have configured the system based on the document, but because the assumed GP application settings and tunnel settings are not being used, we have changed the Entra ID settings as follows.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Entra ID settings&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;The following settings have been changed to UPN in the Palo Alto Networks SCIM Connector and Palo Alto Networks Cloud Identity Engine of the enterprise application.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Home&amp;gt;Default Directory&amp;gt;Enterprise Applications&amp;gt;Palo Alto Networks SCIM Connector&amp;gt;Provisioning&amp;gt;Mapping&amp;gt;Provision Microsoft Entra ID Users&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;-&amp;gt; PaloAltoNetworks attribute Microsoft Entra ID attributes corresponding to userName and displayName are both changed to UPN.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Home&amp;gt;Default Directory&amp;gt;Enterprise Applications&amp;gt;Palo Alto Networks Cloud Identity Engine - Cloud Authentication Service&amp;gt;Single Sign-On&amp;gt;Attributes and Claims&amp;gt;Change&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;unique username value to UPN.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;◆Questions:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;We believe that there is no applicable section in the SCM configuration except NGFW and Prisma Access&amp;gt;ID Service&amp;gt;CIE&amp;gt;User Attributes, and we assume that the Entra ID side may be returning user information other than UPNs.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Therefore, we would like to know two points.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Question 1: Are there any settings required by Entra ID for SCIM linkage other than the settings listed in the&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;configuration details?&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Question 2) We do not think there are any settings other than NGFW and Prisma Access&amp;gt;ID Service&amp;gt;CIE&amp;gt;User Attributes in&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;SCM, is this correct?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 30 Jul 2025 01:36:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/the-user-information-linked-in-the-cie-does-not-match-the-match/m-p/1234951#M1187</guid>
      <dc:creator>AikawaHinata</dc:creator>
      <dc:date>2025-07-30T01:36:51Z</dc:date>
    </item>
  </channel>
</rss>

