<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Pulling in users directly from ADDS? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424814#M94295</link>
    <description>&lt;P&gt;Hi Nikolay - just to clarify, I'd like to import Azure AD groups into Palo Alto so that I can create rules based on them. E.g. create a policy rule that allows the Marketing dept to connect to an external application. Do the instuctions you have given me go through the steps to enable this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
    <pubDate>Thu, 05 Aug 2021 14:46:32 GMT</pubDate>
    <dc:creator>cra1901</dc:creator>
    <dc:date>2021-08-05T14:46:32Z</dc:date>
    <item>
      <title>Pulling in users directly from ADDS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424684#M94274</link>
      <description>&lt;P&gt;I have a requirement to pull in our users from Azure AD (or AADDS depending on the solution) into Prisma Cloud in order to create policy rules based on the source user/group but I'm unsure as to which method I would need to set this up? (Device\LDAP, Panorama\LDAP or Cloud Identity Engine - perhaps there's more than one way?!)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We do not have a Windows domain and therefore have no on-prem DC to connect to. Has anyone else got this set up that could point me in the right direction?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;TIA&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 10:36:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424684#M94274</guid>
      <dc:creator>cra1901</dc:creator>
      <dc:date>2021-08-05T10:36:17Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling in users directly from ADDS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424708#M94276</link>
      <description>&lt;P&gt;There is a guide for this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/resources/guides/prisma-access-for-users-deployment-guide" target="_blank"&gt;https://www.paloaltonetworks.com/resources/guides/prisma-access-for-users-deployment-guide&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I think also SAML is a nice option where the Prisma Access will be SP and Azure AD will be the IdP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.consigas.com/best-practice/remote-access-authentication/" target="_blank"&gt;https://www.consigas.com/best-practice/remote-access-authentication/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 10:51:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424708#M94276</guid>
      <dc:creator>NikolayDimitrov</dc:creator>
      <dc:date>2021-08-05T10:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling in users directly from ADDS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424721#M94278</link>
      <description>&lt;P&gt;Thank you for your help&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 11:15:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424721#M94278</guid>
      <dc:creator>cra1901</dc:creator>
      <dc:date>2021-08-05T11:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling in users directly from ADDS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424728#M94279</link>
      <description>&lt;P&gt;This is not for Azure AD but it shows how to extract the SAML atributes for user and group membership:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-GlobalProtect.html" target="_blank"&gt;https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-GlobalProtect.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 11:26:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424728#M94279</guid>
      <dc:creator>NikolayDimitrov</dc:creator>
      <dc:date>2021-08-05T11:26:57Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling in users directly from ADDS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424814#M94295</link>
      <description>&lt;P&gt;Hi Nikolay - just to clarify, I'd like to import Azure AD groups into Palo Alto so that I can create rules based on them. E.g. create a policy rule that allows the Marketing dept to connect to an external application. Do the instuctions you have given me go through the steps to enable this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 14:46:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424814#M94295</guid>
      <dc:creator>cra1901</dc:creator>
      <dc:date>2021-08-05T14:46:32Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling in users directly from ADDS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424872#M94299</link>
      <description>&lt;P&gt;From the Palo Alto side of things yes but you still need to configure the correct attributes for user/group on the Azure AD (Azure AD should have good guides how it can be&amp;nbsp; used as SAML IdP). After the SAML has imported the users and groups in the Palo Alto/Prisma Access look at :&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXWCA0" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXWCA0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;User redistribution inside prisma access should happen automatically but if you also have on premise devices look at:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access/redistribute-userid-information-for-users-and-networks" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access/redistribute-userid-information-for-users-and-networks&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 16:48:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424872#M94299</guid>
      <dc:creator>NikolayDimitrov</dc:creator>
      <dc:date>2021-08-05T16:48:18Z</dc:date>
    </item>
    <item>
      <title>Re: Pulling in users directly from ADDS?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424876#M94301</link>
      <description>&lt;P&gt;Thanks again for your help!&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 16:58:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pulling-in-users-directly-from-adds/m-p/424876#M94301</guid>
      <dc:creator>cra1901</dc:creator>
      <dc:date>2021-08-05T16:58:46Z</dc:date>
    </item>
  </channel>
</rss>

