<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article PANCast™ Episode 38: Cloud Identity Engine in PANCast™ Episodes</title>
    <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/ta-p/580035</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2F3TxdJeIufZ0%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3D3TxdJeIufZ0&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2F3TxdJeIufZ0%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="600" height="337" scrolling="no" title="PANCast™ Episode 38: Cloud Identity Engine" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;&lt;EM&gt;Episode Transcript:&lt;/EM&gt;&lt;/I&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Hello PANCasters, welcome back to another episode. Today Angelo is back to talk to us about Cloud Identity Engine. Welcome back Angelo.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Angelo:&lt;span class="lia-inline-image-display-wrapper lia-image-align-right" image-alt="Angelo Eisma is a Senior Technical Support Engineer at Palo Alto Networks. He has previously worked for a Security Operations Center and a Telco. As part of Palo Alto Networks TAC, he is an SME for Remote Access and ID Management and is highly enthusiastic about sharing his knowledge and experience with customers." style="width: 314px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58287iCFAEAF4E7CE9DFFA/image-dimensions/314x311?v=v2" width="314" height="311" role="button" title="PANCast Ep_Angelo-Eisma_palo-alto-networks.png" alt="Angelo Eisma is a Senior Technical Support Engineer at Palo Alto Networks. He has previously worked for a Security Operations Center and a Telco. As part of Palo Alto Networks TAC, he is an SME for Remote Access and ID Management and is highly enthusiastic about sharing his knowledge and experience with customers." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;Angelo Eisma is a Senior Technical Support Engineer at Palo Alto Networks. He has previously worked for a Security Operations Center and a Telco. As part of Palo Alto Networks TAC, he is an SME for Remote Access and ID Management and is highly enthusiastic about sharing his knowledge and experience with customers.&lt;/span&gt;&lt;/span&gt;&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Thanks John and glad to be back.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;So Angelo, what is Cloud Identity Engine?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;H2 id="toc-hId-1736998815"&gt;&lt;STRONG&gt;&lt;FONT color="#FF6600"&gt;What is Cloud Identity Engine?&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/H2&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Angelo:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;So firstly Cloud Identity Engine is often shortened to CIE. CIE offers two main functions at the moment which are to do with knowing your users. Firstly, it does directory sync so it can sync your user and group information from either cloud directory services such as Microsoft Entra ID or your on premise directory data. This data can be used by Palo Alto Networks products for things like user enforcement. As an example you can collect group information from CIE for your firewalls and use that group information in your policies. So let’s say your organization does not allow access to online storage sites by default, but there is a business reason for a limited set of users to be able to access these sites. You can add a security policy on your firewall, based on a specific group to allow access to these sites and then you control access via groups, rather than by having to make changes on the firewall. Now this is not new to Palo Alto Networks and we did discussed this in a previous episode but what is different is that CIE makes it easy to get your user and group information from public cloud directories and it can be configured to talk to your directory, and then all your firewalls, Panorama, and Prisma Access can just point to CIE to get the data.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Sounds helpful Angelo, so what is the second function?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Angelo:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Along the same lines for knowing your users, CIE also offers Cloud Authentication Service or CAS for short. This is similar to the directory sync in that you can configure your SAML IdP on CAS and then configure various Palo Alto Networks products to use CAS as the authentication service. So instead of having to configure SAML authentication on each firewall, and on Prisma Access you configure it once on CAS and point your services to use CAS as the authentication. You can also configure multiple SAML providers in CAS to be used for different purposes. So if you have multiple SAML providers, CAS can support this.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Great so it sounds like this is helpful in easing where you have to configure both user and group information and also SAML authentication. &lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Angelo:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;It does really help. And one last thing I want to mention is that CIE also now supports data redistribution. So it can also be used to redistribute data, such as user to ip mappings, or HIP reports, between your devices. Things like user to ip mapping are very important to be correct, up to date and also known by all devices that need to know it. CIE can be used to make sure this data is redistributed to where it needs to be known. This is similar to user and groups and authentication, while you can currently do this using a Palo Alto Networks firewalls and Panorama, having it configured in CIE and then just pointing your firewalls, Panorama and Prisma Access to CIE simplifies the process.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Great Info Angelo, so as a recap, what does CIE give us?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Angelo:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;So the main thing is you can centralize the configuration and then Palo Alto Networks products can use CIE for authentication, user and group information and also certain data redistribution.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Really good info, just one last question, anything to be aware of when using CIE?&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Angelo:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Really good question John. So the one thing that we recommend is to just check the supported features in CIE against the products, and the versions you use. As an example, the data redistribution services in CIE which is called user context, will only work with devices that are currently on PAN-OS 11.0 or higher. This is one of those things that really should be checked anyway when using different features on Palo Alto Networks products but thought I would note it just for this specific reason.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;Thanks so much again Angelo, great info on CIE.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;EM&gt;&lt;FONT color="#FF6600"&gt;&lt;I&gt;Angelo:&lt;/I&gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;You’re welcome John, can’t wait to come back for another episode.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;For our listeners please do not forget to check the transcript of this episode for some troubleshooting resources.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;I&gt;John:&lt;/I&gt;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;
&lt;DIV&gt;&lt;SPAN&gt;I’m sure you’ll be back soon Angelo! PANCasters, I hope you enjoyed today’s episode. Remember the transcript and additional information is available at live.paloaltonetworks.com. Until next time.&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV&gt;
&lt;P&gt;&lt;STRONG&gt;Related Content:&lt;/STRONG&gt;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;A title="Cloud Identity Engine Troubleshooting Checklist" href="https://docs.paloaltonetworks.com/cloud-identity/cloud-identity-engine-getting-started/troubleshoot-the-cloud-identity-engine/cloud-identity-engine-troubleshooting-checklist" target="_blank" rel="nofollow noopener noreferrer"&gt;Cloud Identity Engine Troubleshooting Checklist&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;LI-PRODUCT title="Cloud Identity" id="Cloud_Identity"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/P&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;I&gt;&lt;/I&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;</description>
    <pubDate>Wed, 13 Mar 2024 22:19:08 GMT</pubDate>
    <dc:creator>ozheng</dc:creator>
    <dc:date>2024-03-13T22:19:08Z</dc:date>
    <item>
      <title>PANCast™ Episode 38: Cloud Identity Engine</title>
      <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/ta-p/580035</link>
      <description>&lt;P&gt;This Episode introducing the Cloud Identity Engine and its benefits.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Title_PANCast Ep 38_palo-alto-networks.jpg" style="width: 960px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/58288i925E7629FD09C8CE/image-size/large?v=v2&amp;amp;px=999" role="button" title="Title_PANCast Ep 38_palo-alto-networks.jpg" alt="Title_PANCast Ep 38_palo-alto-networks.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 13 Mar 2024 22:19:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/ta-p/580035</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2024-03-13T22:19:08Z</dc:date>
    </item>
    <item>
      <title>Re: PANCast™ Episode 38: Cloud Identity Engine</title>
      <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/tac-p/588341#M100</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/109098"&gt;@ozheng&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for the great info. If we configure the CIE on the firewall can we use it for the security policy? Cause we create CIE on the Firewall we can see the users are populating but from the traffic logs we cannot see the source users and not hitting the rule.&lt;/P&gt;</description>
      <pubDate>Thu, 30 May 2024 06:22:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/tac-p/588341#M100</guid>
      <dc:creator>KhaleelE</dc:creator>
      <dc:date>2024-05-30T06:22:45Z</dc:date>
    </item>
    <item>
      <title>Re: PANCast™ Episode 38: Cloud Identity Engine</title>
      <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/tac-p/588444#M101</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/289014"&gt;@KhaleelE&lt;/a&gt;&amp;nbsp;,&lt;BR /&gt;I think you need to review your configuration, something is probably missing in the zone.&lt;BR /&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Fri, 31 May 2024 02:42:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/tac-p/588444#M101</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2024-05-31T02:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: PANCast™ Episode 38: Cloud Identity Engine</title>
      <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/tac-p/588592#M102</link>
      <description>&lt;P&gt;Hello &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/109098"&gt;@ozheng&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your response. Here is the TAC response below:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;As per the discussion, you wanted to restrict users by user based security policies. By configuring CIE we archived information about user and group.&lt;BR /&gt;To map a user to an IP address, the firewall still needs information; only then user based security policy will function.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;So I am confused that using CIE only are we able to restrict users by user based security policy?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Jun 2024 12:52:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/tac-p/588592#M102</guid>
      <dc:creator>KhaleelE</dc:creator>
      <dc:date>2024-06-03T12:52:41Z</dc:date>
    </item>
    <item>
      <title>Re: PANCast™ Episode 38: Cloud Identity Engine</title>
      <link>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/tac-p/589029#M103</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/289014"&gt;@KhaleelE&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;As written by the colleague in TAC, the user-id can be broken down in 2 functions :&lt;/P&gt;
&lt;P&gt;- user information (that can be done by CIE, Agentless or agents...)&lt;/P&gt;
&lt;P&gt;- mapping on actual traffic (irrespective of the method chosen above)&lt;/P&gt;
&lt;P&gt;Unless you did the necessary for the second point, you will only get the usernames.&lt;/P&gt;
&lt;P&gt;You open the documentation, that should be among the first steps of configuration.&lt;/P&gt;
&lt;P&gt;Olivier&lt;/P&gt;</description>
      <pubDate>Fri, 07 Jun 2024 02:50:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/pancast-episodes/pancast-episode-38-cloud-identity-engine/tac-p/589029#M103</guid>
      <dc:creator>ozheng</dc:creator>
      <dc:date>2024-06-07T02:50:58Z</dc:date>
    </item>
  </channel>
</rss>

