<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User-ID with Azure AD in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196857#M58583</link>
    <description>&lt;P&gt;I see the option under User-ID for NTLM (currently unchecked). Simply checking this is all that is needed?&amp;nbsp; You mentioned it grabs the credentials from the browser, but if the user's machine is no longer on a local premise AD (simply connected via AzureAD through Windows 10), will there be credentials to grab?&amp;nbsp; Let's assume the individual is prompted, however often will this take place (session cookie, restart of browser, PC restart, etc.)&amp;nbsp; And lastly, since yes, NTLM is a Windows thing, how will Mac's and iOS devices handle this process? Will they simply get prompted to login and if so, the same last question applies (length of time). &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I sent a request to support about AzureAD. This really needs to be added as there are more of us looking to move to Azure and less on-premise. Maybe PA version 11. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 25 Jan 2018 14:39:19 GMT</pubDate>
    <dc:creator>jharlow</dc:creator>
    <dc:date>2018-01-25T14:39:19Z</dc:date>
    <item>
      <title>User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196512#M58521</link>
      <description>&lt;P&gt;We currently use User-ID with an on-premise Active Directory server. We are planning on moving to Azure AD (not to be confused with AD services in Azure).&amp;nbsp; Are there any plan on getting User-ID to work with AzureAD (web Auth)? What other options can I use to continue to use User-ID if we do not have Active Directory on premise?&amp;nbsp; Thanks.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 23 Jan 2018 21:50:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196512#M58521</guid>
      <dc:creator>jharlow</dc:creator>
      <dc:date>2018-01-23T21:50:24Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196601#M58528</link>
      <description>&lt;P&gt;There are several options:&lt;/P&gt;
&lt;P&gt;-captive portal with ntlm,&lt;/P&gt;
&lt;P&gt;-forwarding authentication logs to an on-prem UserID agent running as syslog collector,&lt;/P&gt;
&lt;P&gt;-API&lt;/P&gt;
&lt;P&gt;-GlobalProtect (inside the network it will not set up vpn but will simply function as a userID client)&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 10:01:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196601#M58528</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-24T10:01:40Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196703#M58554</link>
      <description>&lt;P&gt;If we were to pull all of our domain controllers from on-premise, wouldnt that kill the first two options?&amp;nbsp; GlobalProtect might be the only option but frown on as it is something that we will have to install.&amp;nbsp; What APIs are you referring to?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 18:39:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196703#M58554</guid>
      <dc:creator>jharlow</dc:creator>
      <dc:date>2018-01-24T18:39:43Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196712#M58559</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/17447"&gt;@jharlow&lt;/a&gt;&amp;nbsp;When&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;&amp;nbsp;talks about NTLM auth via CP he's referring to the firewall utilizing the NTLM protocol to to query&amp;nbsp;a user's web browser for the credentials.&amp;nbsp; When the browser provides credentials back those credentials are then checked against which ever directory you specify and then retained in cache also based on your specified duration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If that "behind the screens" negotiation isn't successful users will get a browser pop-up asking the user for creds.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;One thing to keep in mind you'll need to ensure the firewall's IP is in IE's local Intranet configuration so IE will pass creds to the FW via the automated NTLM process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2018 19:14:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196712#M58559</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-24T19:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196807#M58573</link>
      <description>&lt;P&gt;NTLM would simply ensure transparent authentication for the users if available/possible (pretty exclusive to windows) but in the backend 'normal' authentication methods can be used for which the AD does not to be on-prem&lt;/P&gt;
&lt;P&gt;Syslogs can be sent out of the AD for succesfull authentication events and an on-prem User-ID agent can capture these and create user-IP mappings&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;XML API would require a lot of scripting, but it's doable :&amp;nbsp;&lt;A title="Send User Mappings to User-ID Using the XML API" href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/map-ip-addresses-to-users/send-user-mappings-to-user-id-using-the-xml-api" target="_blank"&gt;Send User Mappings to User-ID Using the XML API&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2018 10:10:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196807#M58573</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-25T10:10:51Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196857#M58583</link>
      <description>&lt;P&gt;I see the option under User-ID for NTLM (currently unchecked). Simply checking this is all that is needed?&amp;nbsp; You mentioned it grabs the credentials from the browser, but if the user's machine is no longer on a local premise AD (simply connected via AzureAD through Windows 10), will there be credentials to grab?&amp;nbsp; Let's assume the individual is prompted, however often will this take place (session cookie, restart of browser, PC restart, etc.)&amp;nbsp; And lastly, since yes, NTLM is a Windows thing, how will Mac's and iOS devices handle this process? Will they simply get prompted to login and if so, the same last question applies (length of time). &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I sent a request to support about AzureAD. This really needs to be added as there are more of us looking to move to Azure and less on-premise. Maybe PA version 11. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2018 14:39:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196857#M58583</guid>
      <dc:creator>jharlow</dc:creator>
      <dc:date>2018-01-25T14:39:19Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196865#M58585</link>
      <description>&lt;P&gt;you'll also need to create a captive portal (aythentication) policy that is set to 'browser challenge'&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;it sends the browser a challenge, the browser will provide these (logged in user creds) if it trusts the firewall (needs to trust the certificate or via a pac file)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the browser or user is prompted when the configurable timeout occurs, so if ntlm works nicely you could have the browser re-queried every hour, if you need to resort to a webform, you could set the timeout to 4 hours or more, as not to bug users too much&lt;/P&gt;
&lt;P&gt;you can have captive portal give the user a cookie, in case their IP changes that cookie can be presented instead of needing to authenticate&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I wrote a bunch of stuff in this article: &lt;A title="Getting Started: User-ID " href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-User-ID/ta-p/69321" target="_blank"&gt;Getting Started: User-ID &lt;/A&gt;which you may find helpful&lt;/P&gt;
&lt;P&gt;let me know if there's anything missing &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2018 14:57:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196865#M58585</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2018-01-25T14:57:21Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196886#M58588</link>
      <description>&lt;P&gt;I will re-itterate a Windows OS will not pass NTLM credentials to the firewall without modifiation to the client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://support.microsoft.com/en-us/kb/943280" target="_blank"&gt;https://support.microsoft.com/en-us/kb/943280&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;"&lt;/SPAN&gt;&lt;SPAN class=""&gt;WinHTTP sends user credentials only in response to requests that occur on a local intranet site. However, WinHTTP does not check the security zone settings in Internet Explorer to determine whether a website is in a zone that allows credentials to be sent automatically.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class="kb-cause-section section ng-scope"&gt;&lt;SPAN&gt;If no proxy is configured, WinHTTP sends credentials only to local intranet sites.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="kb-cause-section section ng-scope"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="kb-cause-section section ng-scope"&gt;&lt;SPAN class="text-base"&gt;Note&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;If the URL contains no period in the servers name, such as in the following example, the server is assumed to be on a local intranet site:&lt;/DIV&gt;&lt;DIV class="kb-cause-section section ng-scope"&gt;&lt;DIV class="indent"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="indent"&gt;&lt;SPAN class="text-base"&gt;http://sharepoint/davshare&lt;/SPAN&gt;&lt;/DIV&gt;&lt;BR /&gt;If the URL contains periods, the server is assumed to be on the Internet. The periods indicate that you use an FQDN address. Therefore, no credentials are automatically sent to this server unless a proxy is configured and unless this server is indicated for proxy bypass.&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN class="text-base"&gt;Note&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;A server can be indicated for proxy bypass through either the bypass list or the proxy configuration script.&lt;BR /&gt;&lt;BR /&gt;In this situation, you are either denied access or prompted to enter your credentials when the website asks for credentials. Even when this occurs, the security zone settings are ignored."&lt;/DIV&gt;&lt;DIV class="kb-cause-section section ng-scope"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="kb-cause-section section ng-scope"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="kb-cause-section section ng-scope"&gt;The NTLM challenges will be coming from the firewall.&amp;nbsp; An IP address.&amp;nbsp; This is going to be assumed to be an "Internet" based NTLM challenge request and as such the Windows client will not pass creds to the IP which is coming from the firewall.&amp;nbsp;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="kb-cause-section section ng-scope"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="kb-cause-section section ng-scope"&gt;The Windows KB indicates the proper registry setting to modify to bypass this security setting.&lt;/DIV&gt;</description>
      <pubDate>Thu, 25 Jan 2018 17:21:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196886#M58588</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-25T17:21:54Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID with Azure AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196887#M58589</link>
      <description>&lt;P&gt;Looks like the KB points out a Win7 registry setting.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Win10 is in this directory:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;browse to...&lt;BR /&gt;Computer&lt;BR /&gt;Admin Templates&lt;BR /&gt;windows components&lt;BR /&gt;internet explorer&lt;BR /&gt;Internet control panel&lt;BR /&gt;security page&lt;BR /&gt;on the right - open&lt;BR /&gt;Site to Zone Assignment List&lt;BR /&gt;Enable it and click SHOW&lt;BR /&gt;enter the IP address as the Value Name&lt;BR /&gt;the Value should be 1 for Intranet zone&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jan 2018 17:27:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-with-azure-ad/m-p/196887#M58589</guid>
      <dc:creator>Brandon_Wertz</dc:creator>
      <dc:date>2018-01-25T17:27:00Z</dc:date>
    </item>
  </channel>
</rss>

