- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
07-12-2023 05:56 AM
In our on-prem firewalls, some policies are based on user-ID.
User-to-IP mapping for the corresponding users are sourced via different mechanisms such as;
- User-ID agents installed on domain-controllers
- terminal server agents.
This setup has been working pretty well so far.
However, now we have a challenge after the introduction of Microsoft "modern devices". Users logged in to these devices are authenticated against Azure AD instead of the on-prem AD servers. Because of this, on-prem firewalls are unable to acquire any user-to-IP mapping information. To address this problem, we are looking at deploying GP internal gateway on modern devices hoping that it can provide the required mapping information to the firewall. However, we have some unknowns about this approach.
When a GP client connect to the internal gateway, firewall needs to authenticate it first.
This authentication need to be seamless as the user already authenticated to the device already.
We have the options of certificate authentication or SAML ( by communicating with Azure AD )
Since the user is authenticated against the Azure AD, we have a suspicion that the UPN (i.e. the email address ) will be populated as the username instead of the sAMAccountName (ie. Domain/username format)
If the UPN is populated as the user name, the firewall will not be able to use it any of the policies as the firewall is not integrated with Azure AD.
In that case, we will have to the cloud-ID-engine function as well to pull Azure-AD group mapping
Just wondering whether anyone has implemented a similar solution ?
Apologies for the lengthy message.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!