<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cloud Identity Engine - Multi Auth Profile in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/569247#M640</link>
    <description>&lt;P&gt;Hello All .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a very simple thing I am trying to do but as ever things are not so simple with Palo .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm using Prisma SASE&amp;nbsp; and this focus around this question is Cloud ID Engine &amp;amp; Global Protect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;WE are AAD only with no on premise resources .&lt;/P&gt;
&lt;P&gt;I currently use&amp;nbsp; Azure AD as my IDP and all is well with it .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Problem happens when I need to add a second Azure AD for a company we are working with .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Should be as simple as create a SEQUENCE auth policy , trouble is , this does not work if you are using SAML.&lt;/P&gt;
&lt;P&gt;I&amp;nbsp; have setup the required Enterprise Application&amp;nbsp; - CIE - Authentication .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The way&amp;nbsp; I am told to go is to use a MULTI profile in CIE that points to the two AAD&amp;nbsp; IDP .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tested both AAD IDPs in CIE independently and they both work OK .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I set them up using a&amp;nbsp; MULTI auth profile in CIE it all goes wrong.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firstly , the MULTI profile&amp;nbsp; attempts to connect again BOTH IDPs&amp;nbsp; which involves multiple authentication attempts ro what seems a proxy Palo Alto portal&amp;nbsp; ,&lt;/P&gt;
&lt;P class="p1"&gt;&lt;A href="https://cloud-auth.de.apps.paloaltonetworks.com/sp/acs" target="_blank"&gt;https://cloud-auth.de.apps.paloaltonetworks.com/sp/acs&lt;/A&gt;&lt;/P&gt;
&lt;P class="p1"&gt;It just does not work , the only other way is to joind the AADs together but I a m loathe to do this&amp;nbsp; as PAlo does say it works with a multi profile. Anyone done this ?&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Dec 2023 10:55:56 GMT</pubDate>
    <dc:creator>gcollins5</dc:creator>
    <dc:date>2023-12-11T10:55:56Z</dc:date>
    <item>
      <title>Cloud Identity Engine - Multi Auth Profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/569247#M640</link>
      <description>&lt;P&gt;Hello All .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Have a very simple thing I am trying to do but as ever things are not so simple with Palo .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm using Prisma SASE&amp;nbsp; and this focus around this question is Cloud ID Engine &amp;amp; Global Protect.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;WE are AAD only with no on premise resources .&lt;/P&gt;
&lt;P&gt;I currently use&amp;nbsp; Azure AD as my IDP and all is well with it .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Problem happens when I need to add a second Azure AD for a company we are working with .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Should be as simple as create a SEQUENCE auth policy , trouble is , this does not work if you are using SAML.&lt;/P&gt;
&lt;P&gt;I&amp;nbsp; have setup the required Enterprise Application&amp;nbsp; - CIE - Authentication .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The way&amp;nbsp; I am told to go is to use a MULTI profile in CIE that points to the two AAD&amp;nbsp; IDP .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have tested both AAD IDPs in CIE independently and they both work OK .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When I set them up using a&amp;nbsp; MULTI auth profile in CIE it all goes wrong.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Firstly , the MULTI profile&amp;nbsp; attempts to connect again BOTH IDPs&amp;nbsp; which involves multiple authentication attempts ro what seems a proxy Palo Alto portal&amp;nbsp; ,&lt;/P&gt;
&lt;P class="p1"&gt;&lt;A href="https://cloud-auth.de.apps.paloaltonetworks.com/sp/acs" target="_blank"&gt;https://cloud-auth.de.apps.paloaltonetworks.com/sp/acs&lt;/A&gt;&lt;/P&gt;
&lt;P class="p1"&gt;It just does not work , the only other way is to joind the AADs together but I a m loathe to do this&amp;nbsp; as PAlo does say it works with a multi profile. Anyone done this ?&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P class="p1"&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Dec 2023 10:55:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/569247#M640</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2023-12-11T10:55:56Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Identity Engine - Multi Auth Profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/584714#M744</link>
      <description>&lt;P&gt;Is this fixed? I did see a working scenario, just it will break SSO...&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/td-p/571455" target="_blank"&gt;https://live.paloaltonetworks.com/t5/prisma-access-discussions/prisma-access-cie-multi-profile-breaks-sso/td-p/571455&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Apr 2024 02:47:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/584714#M744</guid>
      <dc:creator>KengSeng</dc:creator>
      <dc:date>2024-04-24T02:47:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Identity Engine - Multi Auth Profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/585653#M751</link>
      <description>&lt;P&gt;I understand that you are using CIE with Multiple SAML authentication profiles. My question to you is, are you assigning groups to those different SAML authentications?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please reference the link below regarding how to configure the multiple authentication profile, starting from step 5.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The way that the authentication sequence works in CIE, you have to assign groups to the authentication types, So if you have different SAML profiles, you need to assign the groups that you would like to authenticate to those SAML profiles. If you have a user matching more than one group that has an assigned authentication type then the CIE selects the authentication type that is closer to the top of the list.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;With that said, the authentication mapping in CIE doesn't work like the authentication sequence in NGFW.&lt;/P&gt;
&lt;P&gt;- In NGFW, it will check the authentication profiles top down until the user is able to authenticate.&lt;/P&gt;
&lt;P&gt;- In CIE, the authentication mapping &lt;SPAN&gt;uses the given userID to obtain the group information for the user to determine if the user’s group has an assigned authentication type. If the user belongs to multiple groups, the Cloud Identity Engine uses the first authentication type you assign to the group for user authentication. Now, if the user is not in an assigned group then it will use the authentication configured in "Default authentication type".&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Reference:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/set-up-an-authentication-profile#id6c86a9c5-c55a-4ae3-85b1-12888d40afb4" target="_blank"&gt;https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/set-up-an-authentication-profile#id6c86a9c5-c55a-4ae3-85b1-12888d40afb4&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 May 2024 15:21:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/585653#M751</guid>
      <dc:creator>domari</dc:creator>
      <dc:date>2024-05-02T15:21:21Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Identity Engine - Multi Auth Profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/586379#M754</link>
      <description>&lt;P&gt;Thank you for your reply .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I had this configured as you said .&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Issue is CIE can't pick between the different IDPs and it requires manual intervention to pick the right directory .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 13:29:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/586379#M754</guid>
      <dc:creator>gcollins5</dc:creator>
      <dc:date>2024-05-10T13:29:12Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Identity Engine - Multi Auth Profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/586390#M755</link>
      <description>&lt;P&gt;I need a little more clarification to understand the problem better.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Lets say you have user 'X' connecting to globalprotect and they get redirected to CIE for authentication.&lt;/P&gt;
&lt;P&gt;- Does user 'X' belong to different groups configured under different SAML profiles?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;- You noted "it&amp;nbsp;&lt;SPAN&gt;requires manual intervention to pick the right directory". Can you elaborate to how this manual intervention is happening? Is it happening on the web-browser where the user has to pick which IdP they need to authenticate to?&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;- Side question, do you have a default profile configured?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 May 2024 15:27:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/586390#M755</guid>
      <dc:creator>domari</dc:creator>
      <dc:date>2024-05-10T15:27:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Identity Engine - Multi Auth Profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/587222#M760</link>
      <description>&lt;P&gt;This is the screen that I have seen, I have configured the group, else the multi profile wont work. I have also set default profile. The SSO is not seemless compared to pointing to Entra ID directly. Is this fixed?&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="KengSeng_0-1716170964692.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/59860i35361448E78BF363/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="KengSeng_0-1716170964692.png" alt="KengSeng_0-1716170964692.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 May 2024 02:12:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/587222#M760</guid>
      <dc:creator>KengSeng</dc:creator>
      <dc:date>2024-05-20T02:12:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cloud Identity Engine - Multi Auth Profile</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/1222269#M1105</link>
      <description>&lt;P&gt;when trying to log in with a different tenant, does an error appear as follows?&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2025-02-28 111635.png" style="width: 922px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/66247iED8F26E2E86A9227/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2025-02-28 111635.png" alt="Screenshot 2025-02-28 111635.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 28 Feb 2025 09:06:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/cloud-identity-engine-multi-auth-profile/m-p/1222269#M1105</guid>
      <dc:creator>DickyAnggara</dc:creator>
      <dc:date>2025-02-28T09:06:58Z</dc:date>
    </item>
  </channel>
</rss>

