Enforce Security Policy with Cloud Identity Engine
Learn about enforcing security policy usign CIE.
| Where Can I Use This? | What Do I Need? |
|
| The Cloud Identity Engine service is free; however, the enforcement
points utilizing directory data may require specific licenses. Click
here for more
information. |
nforcing security policy with the Cloud Identity Engine transforms network defense from a
static, IP-based model into a dynamic, identity-centric framework essential for Zero
Trust. By serving as a centralized source of identity truth, the engine enables your
enforcement points—whether Next-Generation Firewalls, Panorama, or Prisma Access—to
validate users and devices consistently before granting access to network resources.
To implement this, you must
associate your Cloud Identity Engine tenant
with your Palo Alto Networks applications. This association grants your
security infrastructure read-only access to synchronized directory data, allowing you to
populate security policy rules with user and group names retrieved directly from the
cloud. This integration supports both on-premises directories and cloud-based identity
providers, ensuring comprehensive coverage across hybrid environments.
Once configured, policy enforcement becomes adaptive. The engine continually synchronizes
attributes from your source directories; therefore, if a user changes roles or
departments, their access privileges automatically update to reflect their new context
without requiring manual firewall configuration changes. This capability allows you to
maintain a strict principle of least privilege, ensuring that users can only access the
applications and data necessary for their specific roles, regardless of their physical
location.