<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Connect Palo Alto with Azure AD in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/133077#M47163</link>
    <description>&lt;P&gt;I always forget that Azure AD is an actual thing; and that it isn't just an AD server hosted on Azure.&lt;/P&gt;</description>
    <pubDate>Thu, 15 Dec 2016 15:35:33 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2016-12-15T15:35:33Z</dc:date>
    <item>
      <title>Connect Palo Alto with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/132645#M47097</link>
      <description>&lt;P&gt;Hi, It's possible make this integration? Is the same configuration like a Windows Server AD?, I didn't found any article that talks o explain this topic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks in advance&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mats&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2016 15:32:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/132645#M47097</guid>
      <dc:creator>Matias_Cova</dc:creator>
      <dc:date>2016-12-13T15:32:36Z</dc:date>
    </item>
    <item>
      <title>Re: Connect Palo Alto with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/132661#M47100</link>
      <description>&lt;P&gt;It should be the same configuration you just need to feed it the proper address and make sure that your service route or mgmt port can access the Azure server.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2016 17:50:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/132661#M47100</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-12-13T17:50:08Z</dc:date>
    </item>
    <item>
      <title>Re: Connect Palo Alto with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/133051#M47153</link>
      <description>&lt;P&gt;The Azure AD product is not a full AD server but a linked authentication device using federated services. &amp;nbsp;The PA AD connector relies on seeing the actual AD log messages so I don't believe this will work with the Azure AD product. &amp;nbsp;In this scenario your better option would be to connect to the company internal AD servers that make the federated connection to Azure AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But if you run a virualized AD server in the Azure VM environment you could connect using the normal methods.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2016 13:10:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/133051#M47153</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2016-12-15T13:10:06Z</dc:date>
    </item>
    <item>
      <title>Re: Connect Palo Alto with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/133077#M47163</link>
      <description>&lt;P&gt;I always forget that Azure AD is an actual thing; and that it isn't just an AD server hosted on Azure.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Dec 2016 15:35:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/133077#M47163</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2016-12-15T15:35:33Z</dc:date>
    </item>
    <item>
      <title>Re: Connect Palo Alto with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/134092#M47304</link>
      <description>&lt;P&gt;Azure&amp;nbsp;AD Domain Services is now GA, so if you're willing to pay for it, you could do LDAP auth against that: &lt;A href="https://azure.microsoft.com/en-us/services/active-directory-ds/" target="_blank"&gt;https://azure.microsoft.com/en-us/services/active-directory-ds/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But you can't do transparent UserID because you have no "domain controller" to read events from.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Dec 2016 20:21:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/134092#M47304</guid>
      <dc:creator>jgrote</dc:creator>
      <dc:date>2016-12-21T20:21:28Z</dc:date>
    </item>
    <item>
      <title>Re: Connect Palo Alto with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/192114#M57758</link>
      <description>&lt;P&gt;Our clients using Azure AD as a service as their primary identity source need the&amp;nbsp;firewall&amp;nbsp;to populate Azure AD user to real (e.g. LAN RFC 1918) mappings. Using captive portal with Azure SAML SSO (as described in the following Microsoft Article) worked best for me.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.microsoft.com/en-us/azure/active-directory/active-directory-saas-paloaltoglobalprotect-tutorial&amp;nbsp;" target="_blank"&gt;https://docs.microsoft.com/en-us/azure/active-directory/active-directory-saas-paloaltoglobalprotect-tutorial&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are greatful to Palo Alto and Microsoft&amp;nbsp;for including this feature.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Parsing Azure syslogs may not be the best option as they&amp;nbsp;logs the public IP rather than the real IP of the user / device. Therefore we would not be able to differentiate users / devices NATed behind the same public IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 18 Dec 2017 19:43:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/192114#M57758</guid>
      <dc:creator>dhuising</dc:creator>
      <dc:date>2017-12-18T19:43:35Z</dc:date>
    </item>
    <item>
      <title>Re: Connect Palo Alto with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/192262#M57770</link>
      <description>&lt;P&gt;Thanks for the update, really happy to see this feature added to Azure.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2017 13:13:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/192262#M57770</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-12-19T13:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: Connect Palo Alto with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/335974#M84660</link>
      <description>&lt;P&gt;We posted a &lt;A href="https://www.consigas.com/best-practices/authenticating-globalprotect-and-prisma-access-remote-access-users-against-office365-azure-ad" target="_self"&gt;training video&lt;/A&gt; explaining how to securely set up SAML authentication end-to-end against Office 365 Azure AD. The critical element which explains how to set up certificate validation of the SAML Identity Provider to address the SAML Bypass Vulnerability (CVE-2020-2021) starts at 29:35. It shows how to enable "Validate Identity Provider Certificate" and fix the commit error "Validate Identity Provider Certificate is checked but no Certificate Profile is provided authentication-profile"&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jun 2020 07:22:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/connect-palo-alto-with-azure-ad/m-p/335974#M84660</guid>
      <dc:creator>LarsAtConsigas</dc:creator>
      <dc:date>2020-06-30T07:22:31Z</dc:date>
    </item>
  </channel>
</rss>

