Manage the Cloud Identity Engine App
Table of Contents
Expand all | Collapse all
-
- Cloud Identity Engine Attributes
- Collect Custom Attributes with the Cloud Identity Engine
- View Directory Data
- Cloud Identity Engine User Context
- Create a Cloud Dynamic User Group
- Configure Third-Party Device-ID
- Configure an IP Tag Cloud Connection
- View Mappings and Tags
- Configure Dynamic Privilege Access in the Cloud Identity Engine
- Send Cortex XDR Risk Signals to Okta
- Configure SSF Okta Receiver as a Risk Connection
- Configure the Secrets Vault
-
- Set Up Password Authentication
-
- Configure Azure as an IdP in the Cloud Identity Engine
- Configure Okta as an IdP in the Cloud Identity Engine
- Configure PingOne as an IdP in the Cloud Identity Engine
- Configure PingFederate as an IdP in the Cloud Identity Engine
- Configure Google as an IdP in the Cloud Identity Engine
- Configure a SAML 2.0-Compliant IdP in the Cloud Identity Engine
- Set Up a Client Certificate
- Configure an OIDC Authentication Type
- Set Up an Authentication Profile
- Configure Cloud Identity Engine Authentication on the Firewall or Panorama
- Configure the Cloud Identity Engine as a Mapping Source on the Firewall or Panorama
- Configure Dynamic Privilege Access in the Cloud Identity Engine
- Get Help
Manage the Cloud Identity Engine App
Learn how to manage your Cloud Identity Engine tenants and how to collect
customized directory attributes.
After you have configured the Cloud Identity Engine, you can add, rename, or
delete tenants and collect any custom attributes in your directory, as well
as view a list of the default attribute formats. You can also view the
comprehensive information that the Cloud Identity Engine collects.
To ensure consistent security policy enforcement, you can configure segments for
granular data sharing across your network You can also configure
context-based groups that update membership automatically based on criteria
that you select.
If you use Device-ID and third-party
devices to identify IoT devices on your network, you can use the Cloud
Identity Engine to share device mappings with your Prisma Access Nodes.
If you use dynamic address groups for your
tag-based security policy, you can use the Cloud Identity
Engine to collect and redistribute mappings across your network to help
ensure consistent policy enforcement.
- Cloud Identity Engine Instances
- Cloud Identity Engine Attributes
- Collect Custom Attributes with the Cloud Identity Engine
- View Directory Data
- Cloud Identity Engine User Context
- Create a Cloud Dynamic User Group
- Configure Third-Party Device-ID
- Configure an IP Tag Cloud Connection
- Configure Dynamic Privilege Access in the Cloud Identity Engine
- Send Cortex XDR Risk Signals to Okta
- Configure the Secrets Vault