<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Prisma Access Portal config Azure SAML: test config in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-portal-config-azure-saml-test-config/m-p/483569#M341</link>
    <description>&lt;P&gt;How will it be known if the user is in the group before the SAML authentication?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way I see is after the users have logged into their Globalprotect agents is to have another authentication based on auth policy &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/authentication-policy" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/authentication-policy&lt;/A&gt; but really I think you need to better understand what is needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may check for extra info how to sync user groups from the Azure AD if you don't want to sync from on-prem device or for the Cloud identity engine to connect to a on-prem AD server:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access" target="_blank"&gt;https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to use Ldap with Azure Ad:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/td-p/334921" target="_blank"&gt;https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/td-p/334921&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A new feature that you can use is SCIM and the cloud identity engine without the need for service connection to the on-prem AD or to sync from on-prem firewall/agent or to pay for the Microsoft Azure Ldap feature:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/manage-the-cloud-identity-engine/cloud-identity-engine-attributes" target="_blank"&gt;https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/manage-the-cloud-identity-engine/cloud-identity-engine-attributes&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/sync-scim" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/sync-scim&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 28 Apr 2022 16:21:21 GMT</pubDate>
    <dc:creator>nikoolayy1</dc:creator>
    <dc:date>2022-04-28T16:21:21Z</dc:date>
    <item>
      <title>Prisma Access Portal config Azure SAML: test config</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-portal-config-azure-saml-test-config/m-p/483479#M340</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the following question about Prisma Access Portal authentication,&amp;nbsp; I would like to gradually move my users to use SAML authentication instead of the currently configured profile.&lt;/P&gt;&lt;P&gt;Can I accomplish this by using a group in the Allow List of the authentication profile.&amp;nbsp; So only when you are in the group peform SAML.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2022 09:42:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-portal-config-azure-saml-test-config/m-p/483479#M340</guid>
      <dc:creator>zGomez</dc:creator>
      <dc:date>2022-04-28T09:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Prisma Access Portal config Azure SAML: test config</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-portal-config-azure-saml-test-config/m-p/483569#M341</link>
      <description>&lt;P&gt;How will it be known if the user is in the group before the SAML authentication?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way I see is after the users have logged into their Globalprotect agents is to have another authentication based on auth policy &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/authentication-policy" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-admin/authentication/authentication-policy&lt;/A&gt; but really I think you need to better understand what is needed.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You may check for extra info how to sync user groups from the Azure AD if you don't want to sync from on-prem device or for the Cloud identity engine to connect to a on-prem AD server:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access" target="_blank"&gt;https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How to use Ldap with Azure Ad:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/td-p/334921" target="_blank"&gt;https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/td-p/334921&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;A new feature that you can use is SCIM and the cloud identity engine without the need for service connection to the on-prem AD or to sync from on-prem firewall/agent or to pay for the Microsoft Azure Ldap feature:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/manage-the-cloud-identity-engine/cloud-identity-engine-attributes" target="_blank"&gt;https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/manage-the-cloud-identity-engine/cloud-identity-engine-attributes&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/sync-scim" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/active-directory/fundamentals/sync-scim&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2022 16:21:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-portal-config-azure-saml-test-config/m-p/483569#M341</guid>
      <dc:creator>nikoolayy1</dc:creator>
      <dc:date>2022-04-28T16:21:21Z</dc:date>
    </item>
  </channel>
</rss>

