Cloud Identity Engine is a broker service and not IAM. It collects user and group information from multiple IAM vendors—like Okta Ping, and similar platforms—making the info uniformly available across all firewalls. Customers will continue to leverage their IAM providers; however, they no longer need to connect every IAM with every firewall.
Cloud IAM tools (like OKTA, Ping, Azure AD, etc.) are meant for identities—i.e. for maintaining users and user group information. But they are not firewall companies, and so cannot and do not enforce security policies. With Palo Alto Networks, customers can authenticate users using groups/users in these Cloud IdPs and enforce identity-based security policies—such as Credential Phishing—along with our URL Filtering subscription.
A cloud-offered service like Cloud Identity Engine keeps users and group information in sync with the Cloud IdP and On-prem Idps to PANW firewall at all times. By dynamically updating user information, complexity and operational burden are greatly reduced.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!