We have PC's that are only registered inside Azure AAD and managed via Intune they have no connection to the on-prem AD and are connecting via a Wifi zone behind PA to the internet. How can i determine the USER id, without user interaction.
Or do i need Global protect for this and SSO?
Is there someting like a User ID agent for Azure AAD.
Or maybe i can use SAML SSO with Azure AAD for captive portal, can somebody point me to a good article on how to configure this.
Thanks for your question! This is an awesome use-case however, it's not one that we natively support at this time. There are other customers that have expressed interest in this capability.
If there's a chance you're running in a hybrid mode and have a Windows Server running AD and synchronizing with Azure AD then, of course, you can use the User-ID agent to communicate with the domain controller. SAML authentication works great with GlobalProtect, but it is not intended for use with User-ID.
If you'd like, you can contact me directly (email is first initial last name - no spaces or hyphens [at] paloaltonetworks[dot]com and provide me with your contact information, I'd be happy to add you to the enhancement request list.
Thanks for reaching out!
Jeff Hochberg | Sr. Systems Engineer - Technical Business Development
Palo Alto Networks | Atlanta, GA | USA
Mobile: 404.432.1112 | www.paloaltonetworks.com
The content of this message is the proprietary and confidential property of Palo Alto Networks and should be treated as such. If you are not the intended recipient and have received this message in error, please delete this message from your computer system and notify me immediately by reply e-mail. Any unauthorized use or distribution of the content of this message is prohibited.
I have dropped you an e-mail with my contact details. To get around this limitation i could maybe user a captive portal and SAML SSO?
In my case these user are all on a seperate segment.
I will have to test this out.
Never the less integrating User-ID with Azure AAD would be a good enhancement.
I'm in the same boat as FDEMUYTER - all machines being managed via AzureAD/Azure Intune without any AD infra to speak of ( not in Hybrid ). Having to enter a userID kind of breaks the SSO experience IMO. Hoping there is a better way to do this.
what you could to to get the user id is use global protect client with SAML authentication to azure.
You can connect to internal or external portal and use always on.
No user-id agent for azure directly but you can solve this issue by using global protect and SAML authentication.
It depends on what you need and what is your use-case.
What do you want to accomplish in the end?
You can also look into Prisma.
We are currently using UserID in schools to implement internet filtering during exams. The number of students far exceed our VPN tunnel capacity in our Palo Alto firewall so we can't use Globalprotect either. Another issue with Azure AD mentioned elsewhere is that you'll see the public NAT IP externally, so maybe UserID isn't an option at all? Maybe we have to look at alternativ implementation in our Cisco wifi solution.
If you are using Cisco ISE you could try forwarding you logs to a palo alto user id agent configured as a syslog listener.
I have not tried it myself but was also something i was thinking about.
Another thing you could to is use an internal portal only without creating a tunnel but only for authentication. This is called a non-tunnel mode gateway. (always on configuration)
This will require you to deploy global protect to all your clients.
This solution will give you the most accurate solution I think.
I am assuming all your users and computer are in azure ad only? How are your users authenticated on the WIFI?
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!
The Live Community thanks you for your participation!