<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Device Authentication with Azure AD in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/device-authentication-with-azure-ad/m-p/164985#M53117</link>
    <description>&lt;P&gt;We have setup an Azure AD environment with some test machines that are Azure AD joined, but not joined to our on-prem AD environment. Our PA certificate is installed on these machines. For a time PA correctly identifies these machines with the correct username. But after a while, it no longer does. This can be temporarily fixed by release/renewing the IP on the machine. But it only works for a time.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What needs to be done for PA to properly identify users that are on Azure AD joined machines?&lt;/P&gt;</description>
    <pubDate>Thu, 06 Jul 2017 15:51:16 GMT</pubDate>
    <dc:creator>JesseMagee</dc:creator>
    <dc:date>2017-07-06T15:51:16Z</dc:date>
    <item>
      <title>Device Authentication with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/device-authentication-with-azure-ad/m-p/164985#M53117</link>
      <description>&lt;P&gt;We have setup an Azure AD environment with some test machines that are Azure AD joined, but not joined to our on-prem AD environment. Our PA certificate is installed on these machines. For a time PA correctly identifies these machines with the correct username. But after a while, it no longer does. This can be temporarily fixed by release/renewing the IP on the machine. But it only works for a time.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;What needs to be done for PA to properly identify users that are on Azure AD joined machines?&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jul 2017 15:51:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/device-authentication-with-azure-ad/m-p/164985#M53117</guid>
      <dc:creator>JesseMagee</dc:creator>
      <dc:date>2017-07-06T15:51:16Z</dc:date>
    </item>
    <item>
      <title>Re: Device Authentication with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/device-authentication-with-azure-ad/m-p/165006#M53118</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/68227"&gt;@JesseMagee&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;How do you have your monitoring setup for this enviroment, are you using agentless, WMI probing or Captive Portal?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;edit:&lt;/P&gt;&lt;P&gt;I'll expand on this a little just because I'm trying to figure out how you are achieving a mapping at all.&amp;nbsp;&lt;SPAN&gt;In this scenario your better option would be to connect to the company internal AD servers that make the federated connection to Azure AD. Since you can run LDAP against it you could also setup a Captive Portal for this and just use that. Honestly I would say that the easiest and most reliable soution would be Captive Portal but depending on how you are running now that may be a change that is simply to big to make as it would effect user experiance.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jul 2017 17:01:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/device-authentication-with-azure-ad/m-p/165006#M53118</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2017-07-06T17:01:04Z</dc:date>
    </item>
    <item>
      <title>Re: Device Authentication with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/device-authentication-with-azure-ad/m-p/165060#M53132</link>
      <description>&lt;P&gt;Currently doing agentless. And I know they wont go for captive portal unfortunately. Too much change for the end user with that route&lt;/P&gt;</description>
      <pubDate>Thu, 06 Jul 2017 20:11:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/device-authentication-with-azure-ad/m-p/165060#M53132</guid>
      <dc:creator>JesseMagee</dc:creator>
      <dc:date>2017-07-06T20:11:53Z</dc:date>
    </item>
  </channel>
</rss>

