12-10-2021 06:10 PM
I have Cloud Identity Engine synced to Azure AD and see both groups and users in the hub. I configured a firewall to use CIE, but it doesn't appear to be working. I can see the groups and select them in policies, but no users from those groups are seen on the firewall. "show user cloud-identity-engine client stat" shows groups, but they show as unmapped (not sure if it should show mapped). "show user cloud-identity-engine status all" shows the name of the directory APP, but all stats are 0 or say never. Same with "show user cloud-identity-engine statistics all". Any help would be appreciated.
03-08-2022 11:01 AM
Thanks for the reply. The error I see is that the user didn't match a policy in the portal.
I have two users in the Azure group that is seen on the firewall via CIE. One user synced from on-prem has the email as the UPN and the other user is a guest in Azure and has a guestuser_email.com#EXT#@xxxxxx.onmicrosoft.com UPN. The users have to log in with email address format to Azure via SAML which works for both users. The on-prem user can map to a portal policy, but guest user cannot. The on-prem user appears in the group with email (same as login), but the guest user shows as UPN which isn't the same as the email login format.
Even though the guest user shows as UPN in the group, the email address used for login is an alternative user id and therefore should be able to map the user to the group referenced in the portal policy. I believe that should be the case.
11-07-2022 11:49 PM
Hi All,
I am having an issue whereby we have activated CIE on Panorama however no groups or users are coming through.the command show user cloud-identity-engine client stat" shows 0 for everything. Any ideas?
11-08-2022 04:20 PM - edited 11-09-2022 11:14 AM
I had 0s for everything until I changed Palo Alto Network Services to use the outside interface instead of the management interface.
11-22-2022 02:56 AM
Have the exact same issue, can't get guest user to select configuration and the user is listed under "Unmapped Groups" when running show user cloud-identity-engine client statistics.
Did you get any further?
01-19-2023 01:00 PM
PanOS 10.2.3-h2
I've configured CIE in Panorama; it shows Enabled. All behavior I see is exactly like all others in this thread. Via CLI, I have zeros on everything relating to CIE.
On the same config elements on a firewall (also connected/managed by panorama FWIW), I have configured in the same way. CLI shows zeros just like with panorama. But... creating a security policy on the firewall and browsing groups shows all groups synched from azureAD. It's there. I haven't found documentation about the CLI commands, nor any relating to CIE and group-mapping beyond "here is a section where you can pick what attributes a group is in your cloud environment."
I double checked this on Panorama by way of creating a sample security rule and browsing for source groups and I got nothing on that end.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!