<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User-ID using internal global protect and Azure Active Directory in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-using-internal-global-protect-and-azure-active-directory/m-p/299945#M78433</link>
    <description>&lt;P&gt;We noticed that the authentication profile can also get a value for the user group. But reading the documentation, we found that PaloAlto only uses this to match authenticating users against Allow List entries and not for policies or reports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only thing missing is that PaloAlto allow the use of the user group that can be pass by AzureAD on Policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Nov 2019 11:34:17 GMT</pubDate>
    <dc:creator>Marcaria-Infrastructure</dc:creator>
    <dc:date>2019-11-21T11:34:17Z</dc:date>
    <item>
      <title>User-ID using internal global protect and Azure Active Directory</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-using-internal-global-protect-and-azure-active-directory/m-p/248605#M70718</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've setup SAML SSO based authentication to global protect with Azure Active Directory. I'm wondering if i can take this a step further by using internal global protect gateways and using global protect for USER-ID?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If i did this, how would i go about setting up user based policies on the palo? effectively allowing me to allow/deny traffic based off Azure Active directory user or group?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apologies if i've missed something obvous within the documentation.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;cheers&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Sat, 02 Feb 2019 19:37:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-using-internal-global-protect-and-azure-active-directory/m-p/248605#M70718</guid>
      <dc:creator>TomDow</dc:creator>
      <dc:date>2019-02-02T19:37:03Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID using internal global protect and Azure Active Directory</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-using-internal-global-protect-and-azure-active-directory/m-p/255249#M72433</link>
      <description>&lt;P&gt;My environment is already on Azure-AD and I have no on prem AD.&amp;nbsp; There is no intent to add on premise devices if it can be avoided.&lt;BR /&gt;&amp;nbsp;I too was wondering if I set up the SAML connection and the Palo Alto application in O365 for firewall auth and global protect VPNs if it also encapsulated User-ID if we use global protect agents internally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 11:17:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-using-internal-global-protect-and-azure-active-directory/m-p/255249#M72433</guid>
      <dc:creator>Medisked</dc:creator>
      <dc:date>2019-03-28T11:17:21Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID using internal global protect and Azure Active Directory</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-using-internal-global-protect-and-azure-active-directory/m-p/255284#M72446</link>
      <description>&lt;P&gt;Hi Medisked,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I ended up raising this as a Palo Alto support ticket.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However i think your question is slightly different to mine. When you setup a global protect agent- this agent does send USER-ID information to the firewall. You can see this by simply looking at the Monitor tab and you'll see the username against the traffic that user has created.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However what Palo Alto have confirmed is that the Group mapping settings can only be LDAP. Therefore if you have no DCs at all and your directory service is only Azure AD- there is no way to set policies within the firewall to say "user X can only go to resource Y".&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Mar 2019 16:52:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-using-internal-global-protect-and-azure-active-directory/m-p/255284#M72446</guid>
      <dc:creator>TomDow</dc:creator>
      <dc:date>2019-03-28T16:52:33Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID using internal global protect and Azure Active Directory</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-using-internal-global-protect-and-azure-active-directory/m-p/299945#M78433</link>
      <description>&lt;P&gt;We noticed that the authentication profile can also get a value for the user group. But reading the documentation, we found that PaloAlto only uses this to match authenticating users against Allow List entries and not for policies or reports.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only thing missing is that PaloAlto allow the use of the user group that can be pass by AzureAD on Policies.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2019 11:34:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-using-internal-global-protect-and-azure-active-directory/m-p/299945#M78433</guid>
      <dc:creator>Marcaria-Infrastructure</dc:creator>
      <dc:date>2019-11-21T11:34:17Z</dc:date>
    </item>
  </channel>
</rss>

