NGFW and Prisma Access Managed by Panorama
Focus
Focus
AI Access Security

NGFW and Prisma Access Managed by Panorama

Table of Contents


NGFW
and
Prisma Access
Managed by
Panorama

Enable role-based access to
AI Access Security
for
NGFW (Managed by Panorama)
and
Prisma Access (Managed by Panorama)
.
  1. (
    Prisma Access
    ) Enable role-based access for
    Prisma Access (Managed by Panorama)
    .
    This defines which admins can push configuration changes from
    Panorama
    to your
    Prisma Access
    tenants.
  2. (
    Optional
    ) Enable role-based access for
    Enterprise Data Loss Prevention (E-DLP)
    for your
    NGFW
    and
    Prisma Access
    on
    Panorama
    .
    This defines the access privileges to configure
    Enterprise DLP
    data patterns and profiles which define what is considered sensitive data that must be blocked. Skip this step if you have already configured role-based access to
    Enterprise DLP
    or do not want to configure access to
    Enterprise DLP
    for the user.
  3. Assign role-based access for
    AI Access Security
    .
    You don’t need to configuring a tenant role for a user if access to only
    Enterprise DLP
    is required.
    1. Select
      User
      and for the
      Identity Address
      , enter the email address for which you granted access in the previous step.
    2. For
      Apps & Services
      , select
      AI Access Security
      .
    3. Select a predefined
      Common Services
      Role
      .
  4. Add Another
    to enable additional role-based access to subscriptions for the admin on
    Strata Cloud Manager
    .
    You must click
    Add Another
    for each you subscription you want to enable role-based access. Skip this step if you only want to enable role-based access to
    AI Access Security
    .
    1. Enable role-based access for
      Prisma Access
      .
      This controls which parts of
      Strata Cloud Manager
      the admin has access to. For example, if the assigned role privileges does not allow the admin access to Web Security policy rules then the admin cannot implement policy rules to control access to GenAI apps.
    2. Enable role-based access for
      Enterprise Data Loss Prevention (E-DLP)
      on
      Strata Cloud Manager
      .
      This defines the access privileges to configure
      Enterprise DLP
      data patterns and profiles which define is what considered sensitive data that must be blocked.
    3. Add Another
      and enable role-based access for
      SaaS Security Inline
      on
      Strata Cloud Manager
      .
      Review the role privileges if you are assigning a predefined role to the admin. Role based access to
      SaaS Security Inline
      can giver your admin the privileges to tag and configure the risk score for GenAI apps.
  5. Submit
    .


Recommended For You