Cloud Identity Engine Overview
Focus
Focus
Identity

Cloud Identity Engine Overview

Table of Contents

Cloud Identity Engine Overview

Learn about how the Cloud Identity Engine helps organize user identification and authentication to keep your network safe and secure.
Where Can I Use This?What Do I Need?
  • NGFW
  • Prisma Access
The Cloud Identity Engine service is free; however, the enforcement points utilizing directory data may require specific licenses. Click here for more information.
In the past, securing a company’s data was relatively simple because everyone worked in the same building, connected to the same network, and used the same system to log in. Today, however, employees work from home, coffee shops, and branch offices, using a variety of devices and cloud-based applications. This shift has made it difficult for security teams to keep track of who is accessing what. Typically, user information is scattered across different systems—some kept on servers in the office (like Active Directory) and others in the cloud (like Google or Microsoft Azure).
The Cloud Identity Engine (CIE) solves this problem by acting as a central translation layer for user identity. Instead of forcing your security devices to connect individually to every different list of users you have, the Cloud Identity Engine collects all those user lists and combines them into a single, unified view. Think of it as a master contact list that is always up to date. It allows your security system to verify exactly who a person is and what they are allowed to do, regardless of where they are located or which system holds their account information.
By centralizing this information, the Cloud Identity Engine ensures that your security rules are applied consistently everywhere. If an employee joins the company, moves to a new department, or leaves, the Cloud Identity Engine detects this change immediately and updates your security devices automatically. This capability helps organizations move toward a "Zero Trust" security model—a strategy where no one is trusted by default and everyone must be verified—without the headache of managing complex connections between dozens of different systems.
For a deeper understanding of the system's architecture and its core security functions, explore the Cloud Identity Engine Topology, User Identification with Cloud Identity Engine, and User Authentication with Cloud Identity Engine.
If you have not yet activated the Cloud Identity Engine, click here.