- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
Enhanced Security Measures in Place: To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.
08-05-2021 03:13 AM - edited 08-05-2021 03:36 AM
I have a requirement to pull in our users from Azure AD (or AADDS depending on the solution) into Prisma Cloud in order to create policy rules based on the source user/group but I'm unsure as to which method I would need to set this up? (Device\LDAP, Panorama\LDAP or Cloud Identity Engine - perhaps there's more than one way?!)
We do not have a Windows domain and therefore have no on-prem DC to connect to. Has anyone else got this set up that could point me in the right direction?
TIA
08-05-2021 03:51 AM
There is a guide for this:
https://www.paloaltonetworks.com/resources/guides/prisma-access-for-users-deployment-guide
I think also SAML is a nice option where the Prisma Access will be SP and Azure AD will be the IdP.
https://www.consigas.com/best-practice/remote-access-authentication/
08-05-2021 03:51 AM
There is a guide for this:
https://www.paloaltonetworks.com/resources/guides/prisma-access-for-users-deployment-guide
I think also SAML is a nice option where the Prisma Access will be SP and Azure AD will be the IdP.
https://www.consigas.com/best-practice/remote-access-authentication/
08-05-2021 04:15 AM
Thank you for your help
08-05-2021 04:26 AM
This is not for Azure AD but it shows how to extract the SAML atributes for user and group membership:
08-05-2021 07:46 AM
Hi Nikolay - just to clarify, I'd like to import Azure AD groups into Palo Alto so that I can create rules based on them. E.g. create a policy rule that allows the Marketing dept to connect to an external application. Do the instuctions you have given me go through the steps to enable this?
Thanks.
08-05-2021 09:46 AM - edited 08-05-2021 09:48 AM
From the Palo Alto side of things yes but you still need to configure the correct attributes for user/group on the Azure AD (Azure AD should have good guides how it can be used as SAML IdP). After the SAML has imported the users and groups in the Palo Alto/Prisma Access look at :
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClXWCA0
User redistribution inside prisma access should happen automatically but if you also have on premise devices look at:
08-05-2021 09:58 AM
Thanks again for your help!
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!