- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
on 04-10-2020 12:06 PM - edited on 07-11-2022 08:30 AM by jennaqualls
GlobalProtect: User/Device Context and Compliance
In my previous article, "GlobalProtect: Expanded Setup," we covered the expanded setup of GlobalProtect, which included multiple authentication types, as well as the creation of an internal gateway.
In this post, we are going to modify security policy matching based on user identity and device context provided via the GlobalProtect app. We will also enable notifications to the end user based on compliance of the endpoint. You can see a diagram of the environment here.
The value in leveraging user identity and device context in security policy along with end user notifications allow for greater visibility as well as more granular control over what users can access. This same methodology is applicable regardless of user location, and best practices dictate that they should be leveraged wherever possible. If a user is outside of what is required in order to access resources, they can be notified or mapped to a different rule to provide the minimum level of access required in order to become compliant.
NOTE: This article assumes that you have already followed the previous articles in this series.
HIP Object - General Tab - AV
HIP Object - Anti-Malware Tab
HIP Object - General Tab - iPhone
HIP Profile - Compliant HIP Profile
HIP Notification - Compliant HIP Profile - Match Message
HIP Notification - Compliant HIP Profile - Not Match Message
Security Policies - Add User Group and HIP Profile
You should also be able to see rule matches via the Traffic logs.
In my next article, "GlobalProtect: Authentication Policy with MFA," we will configure authentication policy with MFA for both HTTP and non-HTTP access to sensitive resources.
Hi,
Struggling to find any documentation related to user based policy configuration. Yours is the closest I could find.
I managed to setup auth for user following documentation here : https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U48CAE
but there is no mention of how we can add a user authenticated with SAML profile on security policies there.
How do we manage to add an azure saml authenticated user to security policy?
Is it via Cloud Identity engine + User ID?
Kindly help
Hello,
I like to think of User-ID as synonymous with all things identity. With this in mind, there are two different aspects of User-ID that we need to configure as it relates to traditional GlobalProtect or Prisma Access: authentication and authorization. Think of authentication as what grants the initial login. A user logs in (is authenticated). Think of authorization as what resources are accessible by a user once they are connected (what they are authorized to access).
In the case of Azure, it can be used both for authentication and authorization. You would configure Azure as an iDP for authentication (see here), and use Azure AD for authorization (see here). If you just set up SAML auth, this is not enough to be able to leverage user/group information in security policy. You also have to setup Azure AD in CIE.