Cloud Identity User Context (PAN-OS)
Learn about user context for PAN-OS & Panorama with CIE.
To control data shared over your network with User Context:
Onboard your Cloud Identity Engine instance.
Obtain the serial number for the firewall you want to onboard, and
Register the firewall with the
Palo Alto Networks Customer Support Portal (CSP).
Click the magic link provided by Palo Alto Networks to begin onboarding
your Cloud Identity Engine tenant.
The magic link is provided by Palo Alto Networks by email.
Click
MSP Cloud Management.
Continue the onboarding process.
Claim the license for the tenant you want to
onboard.
Select the
Customer Support Account you want to
use.
Select the
Parent Tenant you want to use or
click
Create New to create a new tenant.
Click
Claim and continue to continue the
onboarding process.
Click
Add Licensed Product to continue the
onboarding process.
Select the contract you want to use.
Select the
Region for your Cloud Identity Engine
instance.
Click
Activate Now to complete the onboarding
process.
Confirm that the
Status for the
Cloud
Identity Engine is
Complete.
You can access your Cloud Identity Engine instance by selecting
Cloud Identity Engine.
In the bottom left of the window, select the icon for your tenant and
select
Device Associations.
Select .
Select your Customer Support Account and enter your firewall serial
number.
Select the firewall
Save your changes.
Select
Associate Apps.
Select the firewall, select the
Cloud Identity
Engine, and
Save your
selections.
In the Cloud Identity Engine, activate sharing for mappings.
Log in to the Cloud Identity Engine app and select
Activate sharing for mappings.
Configure the default segment as a publishing segment.
Select the
Firewalls tab and select one or more
firewalls.
After selecting the firewalls that you want to include in this segment,
Assign Segments to the selected firewalls.
Assigning a segment to a firewall allows you to define which data the
Cloud Identity Engine receives from or provides to that firewall.
You can only assign segments to a firewall that uses PAN-OS 11.0;
User Context does not support other source types.
(Optional) If you want to include additional firewalls in the segment,
Add Firewalls to the segment to specify the
firewalls you want to include.
For each
Data Type that you want to share,
select the
Segment where you want to publish the
data type.
Firewalls publish each data type to one
segment. To share data between firewalls, you will need to configure
a segment for each data type you want share.
You can select the following data types:
IP User Mappings—(GlobalProtect,
Authentication Portal, XFF Headers, Username Header
Insertion, XML APIs, Syslog, Server Monitoring, Panorama
TrustSec plugin) Maps the IP address to a username.
- IP Tag Mappings—(Dynamic Address Group
only) Maps the IP address to a tag.
- User Tag Mappings—(Dynamic User Group
only) Maps the tag to a user.
- Quarantine List—(GlobalProtect only)
Lists the firewalls that GlobalProtect has in quarantine.
- IP Port Mappings—(Terminal Server agent
only) Maps the IP address to the port range allocated to a
Windows-based terminal server user.
Click
Review Changes to review your
configuration before submitting the changes.
Save the changes to confirm the
configuration.
Create a segment to subscribe to the publishing segment you created in the
previous step.
Publishing segments provide the specified data type that the Cloud Identity
Engine collects from other firewalls to the segment containing the firewalls
that you select.
You can subscribe up to 100 segments per
firewall.
Select and click
Add New Segment.
Enter a unique
Segment Name and optionally a
Description for the segment.
Click
Add New Segment to save the changes.
Click
Segments to add the segments you want to
receive data.
Select the segments that you want to include and
Add the segments.
(Optional) Edit segments as needed to customize how the Cloud Identity Engine
provides mappings to the firewalls.
If sharing for data type is
Enabled and you do
not want to share this data type in this segment, select it to change
the setting to
Disabled.
If you no longer need a segment, delete it from the configuration.
When your configuration is complete,
Review Changes and
Save the configuration.
On your firewall, enable the service that the Cloud Identity Engine uses to
communicate with your firewall.
Ensure that you have configured a device certificate.
Log in to the firewall and
Edit the
PAN-OS Edge Service Settings ().
Enable User Context Cloud Service and click
OK to confirm the changes.
If the firewall traffic uses a management interface, create
security policy rules to allow connectivity between the firewall
and the User Context Cloud Service.
Commit your changes on the firewall.
Verify the User Context configuration is successful and view the mappings and
tags that the Cloud Identity Engine collects from the firewall.
On the firewall, verify the User Context Cloud Service
Connection Status is active.
In the Cloud Identity Engine app, select to review the information for the data types.
You can review the following data types:
- User-ID—Search User-ID mappings by
Username or IP
address.
- User Tags—Search Dynamic User Group
tags by Username or by
Tag.
- IP Tags—Search Dynamic Address Group
tags by IP address or by
Tag.
- IP-Port User—(Terminal Server agent only)
Search Terminal Server agent mappings by
IP address.
- Host IDs—(GlobalProtect only) Search
devices (both quarantined and not quarantined) by
Host ID.