<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using Cloud IDentity Engine to enforce group-based policies in Azure AD in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/using-cloud-identity-engine-to-enforce-group-based-policies-in/m-p/575081#M679</link>
    <description>&lt;P&gt;Awesome thanks..&lt;/P&gt;</description>
    <pubDate>Wed, 31 Jan 2024 11:07:13 GMT</pubDate>
    <dc:creator>PA_nts</dc:creator>
    <dc:date>2024-01-31T11:07:13Z</dc:date>
    <item>
      <title>Using Cloud IDentity Engine to enforce group-based policies in Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/using-cloud-identity-engine-to-enforce-group-based-policies-in/m-p/573449#M667</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;Question on retrieving user-group mappings only, using Cloud Identity Engine to enforce group-based policies.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So i have this setup at the moment:&lt;BR /&gt;Panorama managed FWs in Azure with Global protect (works)&lt;BR /&gt;The FWs use SAML currently for authenticating GP users against Azure AD (works)&lt;/P&gt;
&lt;P&gt;Additionally, what I want to achieve is the following.&lt;BR /&gt;To setup group-based policies on the FW to allow for instance:&lt;/P&gt;
&lt;P&gt;Source: Zone - GP_VPN&lt;BR /&gt;user group: GROUP_SALES can access Zone TRUST - 10.10.10.0/24 on https only&lt;BR /&gt;&lt;BR /&gt;Source: Zone - GP_VPN&lt;BR /&gt;user group: GROUP_HR can access zone TRUST 10.20.20.0/24 on https only&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Source: Zone - GP_VPN&lt;BR /&gt;user group: GROUP_Accounts can access zone TRUST 10.30.30.0/24 on https only&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;So I only want the FW to enforce Azure AD-Group based policies for users connecting via Globalprotect.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So from what I can tell, this is possible with Cloud Identity Engine.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;questions:&lt;BR /&gt;will this work and not affect my current SAML config.&lt;BR /&gt;do i need to enable/configure user-id (not enabled atm anywhere)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so looking at this doc from PAN, it seems to do what I want to do.. but just need a second pair of eyes please.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-the-cloud-identity-engine-as-a-mapping-source-on-the-firewall" target="_blank"&gt;https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-the-cloud-identity-engine-as-a-mapping-source-on-the-firewall&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks in adv&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jan 2024 10:15:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/using-cloud-identity-engine-to-enforce-group-based-policies-in/m-p/573449#M667</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-01-18T10:15:56Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cloud IDentity Engine to enforce group-based policies in Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/using-cloud-identity-engine-to-enforce-group-based-policies-in/m-p/575061#M677</link>
      <description>&lt;P&gt;you need to ensure the GP_VPN zone has user-id enabled, that ensures user-ids are mapped and logged etc&lt;/P&gt;
&lt;P&gt;afterwards you can connect CIE, without causing impact, this will simply load all your available groups to the firewall&lt;/P&gt;
&lt;P&gt;once that's done you can start adding groups to security rules&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 08:44:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/using-cloud-identity-engine-to-enforce-group-based-policies-in/m-p/575061#M677</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-01-31T08:44:48Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cloud IDentity Engine to enforce group-based policies in Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/using-cloud-identity-engine-to-enforce-group-based-policies-in/m-p/575081#M679</link>
      <description>&lt;P&gt;Awesome thanks..&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jan 2024 11:07:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/using-cloud-identity-engine-to-enforce-group-based-policies-in/m-p/575081#M679</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-01-31T11:07:13Z</dc:date>
    </item>
    <item>
      <title>Re: Using Cloud IDentity Engine to enforce group-based policies in Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/using-cloud-identity-engine-to-enforce-group-based-policies-in/m-p/579001#M705</link>
      <description>&lt;P&gt;quick update..&lt;/P&gt;
&lt;P&gt;CIE app activated, Azure config done, CIE can connect and i can see user groups/names etc within CIE App.. all good.&lt;/P&gt;
&lt;P&gt;however stuck on the FWs..&lt;/P&gt;
&lt;P&gt;i have panorama with managed FWs..&lt;/P&gt;
&lt;P&gt;in the template group i configured CIE with the tenant and domain info (auto retrieved so tells me it connects ok) - changes committed.&lt;/P&gt;
&lt;P&gt;In Panorama, if i go into a security rule on my device group policy, i am unable to pull the user details..&lt;/P&gt;
&lt;P&gt;however If i change to the FW context and create a dummy rule, then i am able to see the users/groups pulled from CIE&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;so not sure why this is.&lt;/P&gt;
&lt;P&gt;I have configured CIE profile only in panorama&amp;gt;device&amp;gt;User Identification&amp;gt; Cloud Identity Engine&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i followed this doc. but stuck at step 8 &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-the-cloud-identity-engine-as-a-mapping-source-on-the-firewall" target="_blank"&gt;https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-the-cloud-identity-engine-as-a-mapping-source-on-the-firewall&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;any ideas?&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 01 Mar 2024 11:06:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/using-cloud-identity-engine-to-enforce-group-based-policies-in/m-p/579001#M705</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2024-03-01T11:06:01Z</dc:date>
    </item>
  </channel>
</rss>

