<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Get the info &amp;quot;Users login in Azure domain&amp;quot; to use in policy by groups in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238585#M125207</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CIE can get you the user-to-group mappings.&amp;nbsp;&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would need another method to get user-to-IP mappings such as GlobalProtect with Internal Host Detection, Authentication Portal, integration with network login server, etc.&amp;nbsp;&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/ngfw/administration/user-id/user-id-overview" target="_blank"&gt;https://docs.paloaltonetworks.com/ngfw/administration/user-id/user-id-overview&lt;/A&gt;&amp;nbsp; (Scroll down to picture.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 23 Sep 2025 20:57:56 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2025-09-23T20:57:56Z</dc:date>
    <item>
      <title>Get the info "Users login in Azure domain" to use in policy by groups</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238578#M125206</link>
      <description>&lt;P&gt;We are migrating onpremise AD to AZUREAD. The doubt is that these users going to AzureAD and all the info (source name and group belong) can not be retrieved by the FW (as UIA did on premise mode). So how can get the info (users/groups) from AzureAD to configure policy source groups in Palo Alto? We doesnt have any SAML IdP configured in Palo Alto.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 14:56:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238578#M125206</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2025-09-23T14:56:56Z</dc:date>
    </item>
    <item>
      <title>Re: Get the info "Users login in Azure domain" to use in policy by groups</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238585#M125207</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;CIE can get you the user-to-group mappings.&amp;nbsp;&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;You would need another method to get user-to-IP mappings such as GlobalProtect with Internal Host Detection, Authentication Portal, integration with network login server, etc.&amp;nbsp;&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/ngfw/administration/user-id/user-id-overview" target="_blank"&gt;https://docs.paloaltonetworks.com/ngfw/administration/user-id/user-id-overview&lt;/A&gt;&amp;nbsp; (Scroll down to picture.)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Sep 2025 20:57:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238585#M125207</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-09-23T20:57:56Z</dc:date>
    </item>
    <item>
      <title>Re: Get the info "Users login in Azure domain" to use in policy by groups</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238659#M125212</link>
      <description>&lt;P&gt;I found this nice link to configure the CIE. I will follow it to get the LDAP directory.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Related to mappings users/IP. What it would be the less impact way to do it for users which only authenticate in ENTRAID?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;i understand GP will cause users instaling clients so its discarded. So what would be a good and no t intrusive method for users?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Wed, 24 Sep 2025 12:52:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238659#M125212</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2025-09-24T12:52:28Z</dc:date>
    </item>
    <item>
      <title>Re: Get the info "Users login in Azure domain" to use in policy by groups</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238789#M125217</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Kind of two different ways to do this that are going to do essentially the same thing. You could enforce GlobalProtect for network access and use an internal gateway to tie the authentication to Entra ID through SAML SSO, or you utilize an authentication portal with SAML SSO to Entra ID to do effectively the same thing just through the browser solely itself.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The reason I personally don't love just using an authentication policy and the authentication portal is that a user only using apps like Slack, Webex, or Teams won't actually immediately be redirected to the portal. It works fine if your users live in a browser all day, but GlobalProtect is the most straightforward solution in this case. It's a good stop-gap if we're talking about personal machines here, but if these are company owned endpoints just push the agent through Intune and be done with it would be my suggestion.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Sep 2025 14:09:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238789#M125217</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2025-09-25T14:09:56Z</dc:date>
    </item>
    <item>
      <title>Re: Get the info "Users login in Azure domain" to use in policy by groups</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238803#M125221</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/85066"&gt;@BigPalo&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;As&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;said, GlobalProtect is going to be one of the most effective solutions.&amp;nbsp; There are other options depending upon your environment.&amp;nbsp; For example, in my company everyone has to log into the network (802.1x) whether it is wired or wireless.&amp;nbsp; So, I have their identity in my RADIUS server.&amp;nbsp; I forward the authentication logs to a firewall, then I redistribute them to the other firewalls.&amp;nbsp; That works very well for me.&amp;nbsp; Please also take a look at the User-ID Overview URL I posted above.&amp;nbsp; One of those solutions could work in your environment.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 25 Sep 2025 15:12:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1238803#M125221</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2025-09-25T15:12:11Z</dc:date>
    </item>
    <item>
      <title>Re: Get the info "Users login in Azure domain" to use in policy by groups</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1240136#M125351</link>
      <description>&lt;P&gt;Im trying with SAML and auth policy and captive portal but im getting errors in decryption and these stuffs.&lt;/P&gt;
&lt;P&gt;Do you have any link about how to configure this SAML authportal..?&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2025 08:31:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/get-the-info-quot-users-login-in-azure-domain-quot-to-use-in/m-p/1240136#M125351</guid>
      <dc:creator>BigPalo</dc:creator>
      <dc:date>2025-10-16T08:31:27Z</dc:date>
    </item>
  </channel>
</rss>

