<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Directory Sync and Prisma access in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/directory-sync-and-prisma-access/m-p/436182#M260</link>
    <description>&lt;P&gt;I'm considering using Directory Sync for my Panorama-managed Prisma access tenant and would like to clarify certain aspects of using Directory Sync.&lt;/P&gt;&lt;P&gt;- Is there a recommended number of Cloud Identity agent hosts to be deployed?&lt;/P&gt;&lt;P&gt;- Palo Alto's documentation says the certificates generated using the Cloud Identity Engine apps expires 3 months from issuance date and renews automatically for version 1.5.0 and above. Are there specific ports or app-IDs that need to be allowed in policy to ensure automatic renewal?&lt;/P&gt;&lt;P&gt;- In Panorama, when Directory Sync is enabled, a warning message is displayed saying: "&lt;EM&gt;&lt;STRONG&gt;After you enable Directory Sync, Prisma access obtains its user and group mapping information from the Directory Sync Service only, and any existing user and group mapping settings will be ignored&lt;/STRONG&gt;&lt;/EM&gt;".&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - Given the above error, does that mean there's the possibility of a temporary outage while the firewalls lose/clear any previous AD group information from LDAP profiles and update their information using Directory Sync?&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - If there are already policies in place that have been configured using the long-form Distinguished Name, will enabling Directory Sync affect the existing configured policies?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Thu, 23 Sep 2021 16:05:11 GMT</pubDate>
    <dc:creator>MartinE</dc:creator>
    <dc:date>2021-09-23T16:05:11Z</dc:date>
    <item>
      <title>Directory Sync and Prisma access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/directory-sync-and-prisma-access/m-p/436182#M260</link>
      <description>&lt;P&gt;I'm considering using Directory Sync for my Panorama-managed Prisma access tenant and would like to clarify certain aspects of using Directory Sync.&lt;/P&gt;&lt;P&gt;- Is there a recommended number of Cloud Identity agent hosts to be deployed?&lt;/P&gt;&lt;P&gt;- Palo Alto's documentation says the certificates generated using the Cloud Identity Engine apps expires 3 months from issuance date and renews automatically for version 1.5.0 and above. Are there specific ports or app-IDs that need to be allowed in policy to ensure automatic renewal?&lt;/P&gt;&lt;P&gt;- In Panorama, when Directory Sync is enabled, a warning message is displayed saying: "&lt;EM&gt;&lt;STRONG&gt;After you enable Directory Sync, Prisma access obtains its user and group mapping information from the Directory Sync Service only, and any existing user and group mapping settings will be ignored&lt;/STRONG&gt;&lt;/EM&gt;".&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - Given the above error, does that mean there's the possibility of a temporary outage while the firewalls lose/clear any previous AD group information from LDAP profiles and update their information using Directory Sync?&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; - If there are already policies in place that have been configured using the long-form Distinguished Name, will enabling Directory Sync affect the existing configured policies?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 16:05:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/directory-sync-and-prisma-access/m-p/436182#M260</guid>
      <dc:creator>MartinE</dc:creator>
      <dc:date>2021-09-23T16:05:11Z</dc:date>
    </item>
  </channel>
</rss>

