<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CIE for user/group mapping for firewall on-premise in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cie-for-user-group-mapping-for-firewall-on-premise/m-p/1242494#M125550</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/81982"&gt;@RCastro&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your understanding is correct.&amp;nbsp; GP will provide the user-IP mapping and CIE will provide the user-group mapping.&amp;nbsp; One additional step that I like to take is to verify the usernames in the group mapping are identical to the usernames in the IP mapping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;gt; show user group list
&amp;gt; show user group name "&amp;lt;group-name&amp;gt;"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the usernames don't match exactly, the group mapping will not occur.&amp;nbsp; Since you are using Azure for both IP and group mapping, the usernames should be identical.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
    <pubDate>Fri, 16 Jan 2026 00:36:55 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2026-01-16T00:36:55Z</dc:date>
    <item>
      <title>CIE for user/group mapping for firewall on-premise</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cie-for-user-group-mapping-for-firewall-on-premise/m-p/1242489#M125547</link>
      <description>&lt;P class="font-claude-response-body whitespace-normal break-words"&gt;Hi Community,&lt;/P&gt;
&lt;P class="font-claude-response-body whitespace-normal break-words"&gt;I'm working on implementing user and group mapping for security policies on our on-premises firewall and wanted to verify my understanding of the architecture before proceeding further.&lt;/P&gt;
&lt;P class="font-claude-response-body whitespace-normal break-words"&gt;&lt;STRONG&gt;Current Setup:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL class="[&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-disc space-y-2.5 pl-7"&gt;
&lt;LI class="whitespace-normal break-words"&gt;On-prem Palo Alto firewall with GlobalProtect configured&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words"&gt;GlobalProtect authentication: SAML via Azure Entra ID (working perfectly)&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words"&gt;Cloud Identity Engine (CIE) tenant configured with directory sync enabled&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words"&gt;Firewall added as a managed device in CIE tenant&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words"&gt;Followed the documentation here: &lt;A class="underline" href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/authenticate-users-with-the-cloud-identity-engine/configure-the-cloud-identity-engine-as-a-mapping-source-on-the-firewall" target="_blank"&gt;Configure the Cloud Identity Engine as a Mapping Source on the Firewall&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="font-claude-response-body whitespace-normal break-words"&gt;&lt;STRONG&gt;What I've Done:&lt;/STRONG&gt;&lt;/P&gt;
&lt;OL class="[&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-decimal space-y-2.5 pl-7"&gt;
&lt;LI class="whitespace-normal break-words"&gt;Configured CIE as a User-ID source under Device &amp;gt; User Identification &amp;gt; Cloud Identity Engine&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words"&gt;Enabled directory sync in CIE with Azure Entra ID&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words"&gt;Users authenticate successfully via GlobalProtect with SAML&lt;/LI&gt;
&lt;/OL&gt;
&lt;P class="font-claude-response-body whitespace-normal break-words"&gt;&lt;STRONG&gt;My Understanding:&lt;/STRONG&gt; Based on my research, here's what should happen:&lt;/P&gt;
&lt;UL class="[&amp;amp;:not(:last-child)_ul]:pb-1 [&amp;amp;:not(:last-child)_ol]:pb-1 list-disc space-y-2.5 pl-7"&gt;
&lt;LI class="whitespace-normal break-words"&gt;GlobalProtect automatically provides IP-to-username mapping when users authenticate via SAML&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words"&gt;CIE (configured as User-ID source) provides the group membership information&lt;/LI&gt;
&lt;LI class="whitespace-normal break-words"&gt;The firewall combines both to apply security policies based on user/group&lt;/LI&gt;
&lt;/UL&gt;
&lt;P class="font-claude-response-body whitespace-normal break-words"&gt;&lt;STRONG&gt;The Question:&lt;/STRONG&gt; The documentation includes a verification step that says: &lt;EM&gt;"On the client device, use the browser to access a web page that requires authentication"&lt;/EM&gt; for testing the mapping.&lt;/P&gt;
&lt;P class="font-claude-response-body whitespace-normal break-words"&gt;My understanding is that this browser-based authentication step is &lt;STRONG&gt;just one verification method&lt;/STRONG&gt; (typically for Captive Portal scenarios), and that with GlobalProtect + SAML, the user-to-IP mapping should happen automatically when users connect to the VPN. I should be able to verify the mapping simply by running &lt;CODE class="bg-text-200/5 border border-0.5 border-border-300 text-danger-000 whitespace-pre-wrap rounded-[0.4rem] px-1 py-px text-[0.9rem]"&gt;show user ip-user-mapping all&lt;/CODE&gt; after GlobalProtect authentication, without needing any browser-based authentication.&lt;/P&gt;
&lt;P class="font-claude-response-body whitespace-normal break-words"&gt;&lt;STRONG&gt;Am I missing something here?&lt;/STRONG&gt; Should I expect the mapping to work with just GlobalProtect SAML authentication, or is there an additional configuration step I need to enable browser-based authentication?&lt;/P&gt;
&lt;P class="font-claude-response-body whitespace-normal break-words"&gt;Any insights from those who have implemented this architecture would be greatly appreciated!&lt;/P&gt;
&lt;P class="font-claude-response-body whitespace-normal break-words"&gt;Thanks in advance!&lt;/P&gt;</description>
      <pubDate>Mon, 24 Nov 2025 19:11:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cie-for-user-group-mapping-for-firewall-on-premise/m-p/1242489#M125547</guid>
      <dc:creator>RCastro</dc:creator>
      <dc:date>2025-11-24T19:11:39Z</dc:date>
    </item>
    <item>
      <title>Re: CIE for user/group mapping for firewall on-premise</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cie-for-user-group-mapping-for-firewall-on-premise/m-p/1242494#M125550</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/81982"&gt;@RCastro&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Your understanding is correct.&amp;nbsp; GP will provide the user-IP mapping and CIE will provide the user-group mapping.&amp;nbsp; One additional step that I like to take is to verify the usernames in the group mapping are identical to the usernames in the IP mapping.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;&amp;gt; show user group list
&amp;gt; show user group name "&amp;lt;group-name&amp;gt;"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If the usernames don't match exactly, the group mapping will not occur.&amp;nbsp; Since you are using Azure for both IP and group mapping, the usernames should be identical.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jan 2026 00:36:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cie-for-user-group-mapping-for-firewall-on-premise/m-p/1242494#M125550</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2026-01-16T00:36:55Z</dc:date>
    </item>
  </channel>
</rss>

