Pulling in users directly from ADDS?

cancel
Showing results for 
Search instead for 
Did you mean: 

Pulling in users directly from ADDS?

L0 Member

I have a requirement to pull in our users from Azure AD (or AADDS depending on the solution) into Prisma Cloud in order to create policy rules based on the source user/group but I'm unsure as to which method I would need to set this up? (Device\LDAP, Panorama\LDAP or Cloud Identity Engine - perhaps there's more than one way?!)

 

We do not have a Windows domain and therefore have no on-prem DC to connect to. Has anyone else got this set up that could point me in the right direction?

 

TIA

1 ACCEPTED SOLUTION

Accepted Solutions

L3 Networker

There is a guide for this:

 

https://www.paloaltonetworks.com/resources/guides/prisma-access-for-users-deployment-guide

 

 

I think also SAML is a nice option where the Prisma Access will be SP and Azure AD will be the IdP.

 

 

https://www.consigas.com/best-practice/remote-access-authentication/

View solution in original post

6 REPLIES 6

L3 Networker

There is a guide for this:

 

https://www.paloaltonetworks.com/resources/guides/prisma-access-for-users-deployment-guide

 

 

I think also SAML is a nice option where the Prisma Access will be SP and Azure AD will be the IdP.

 

 

https://www.consigas.com/best-practice/remote-access-authentication/

View solution in original post

L0 Member

Thank you for your help

L3 Networker

This is not for Azure AD but it shows how to extract the SAML atributes for user and group membership:

 

https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-GlobalProtect.h...

Hi Nikolay - just to clarify, I'd like to import Azure AD groups into Palo Alto so that I can create rules based on them. E.g. create a policy rule that allows the Marketing dept to connect to an external application. Do the instuctions you have given me go through the steps to enable this?

 

Thanks.

L3 Networker

From the Palo Alto side of things yes but you still need to configure the correct attributes for user/group on the Azure AD (Azure AD should have good guides how it can be  used as SAML IdP). After the SAML has imported the users and groups in the Palo Alto/Prisma Access look at :

 

 

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXWCA0

 

 

 

User redistribution inside prisma access should happen automatically but if you also have on premise devices look at:

 

https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-b...

Thanks again for your help!

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!