Configure the Prisma Access Agent (Coexistence Tenant)
Focus
Focus
Prisma Access Agent

Configure the Prisma Access Agent (Coexistence Tenant)

Table of Contents
To manage both the Prisma Access Agent and GlobalProtect app on the same Prisma Access tenant (instance), you can onboard the Prisma Access Agent using a tenant that is configured for GlobalProtect.
Where Can I Use This?What Do I Need?
  • Prisma Access (Managed by Strata Cloud Manager)
  • Prisma Access (Managed by Panorama)
  • NGFW (Managed by Panorama)
  • Check the prerequisites for the deployment you're using
  • Contact your Palo Alto Networks account representative to activate the Prisma Access Agent feature
The settings for both the GlobalProtect app and Prisma Access Agent can coexist on the same Prisma Access or NGFW tenant (instance).
After you have configured the GlobalProtect app on a tenant and want to deploy the Prisma Access Agent to your mobile users, you can onboard the Prisma Access Agent on the same tenant.
By onboarding the Prisma Access Agent on an existing GlobalProtect-enabled tenant, you can reduce the operational overhead for managing separate tenants and configurations, such as creating backend resources like service connections and remote networks on each tenant.
Because the Prisma Access Agent and GlobalProtect app can be installed on the same endpoint, you can deploy both apps from the same tenant, reducing the effort for maintaining two separate tenants. If needed, your end users switch between the Prisma Access Agent and GlobalProtect app. This enables a seamless migration from the GlobalProtect app to the Prisma Access Agent.
Before you begin, ensure that you:
  • Contact your Palo Alto Networks account representative to activate the feature for the Prisma Access Agent and GlobalProtect coexistence-enabled tenant.
  • Contact your Palo Alto Networks account representative to activate the Prisma Access Agent feature.
  • Obtain the required licenses (Prisma Access license for mobile users and a Strata Logging Service license with proper firewall storage space). If mobile users will be connecting to other connected networks, you will need either the Zero Trust Network Access or Enterprise Edition Prisma Access license that will provide the corporate access node (CAN) necessary to connect.
  • Ensure that your Prisma Access deployment is running at the minimum required Prisma Access dataplane version (10.2.10 or 11.2.0 and later).
  • Configure at least one authentication profile on the tenant.
  • Configure GlobalProtect, including the GlobalProtect portal.
To configure the Prisma Access Agent, start by setting up the infrastructure for Prisma Access Agent.

Prisma Access Agent and GlobalProtect Coexistence Considerations

Review the following considerations for the coexistence of the Prisma Access Agent and GlobalProtect on the same Prisma Access tenant:
  • Coexistence is supported on both new Prisma Access deployments and existing deployments, as long as you upgrade the tenant to the required Prisma Access dataplane version.
  • Support for the Prisma Access Agent on Prisma Access Insights is not yet available.
  • The Dynamic Privilege Access is not supported on a GlobalProtect-enabled tenant.
  • The agent infrastructure settings include the configurations for both the Prisma Access Agent domain name and the GlobalProtect portal name.
  • For user authentication, the Prisma Access Agent supports SAML authentication with Cloud Identity Engine and can coexist with GlobalProtect running with any of the existing authentication methods for GlobalProtect.
  • The allowlist (Users Allowed to Authenticate) in the Prisma Access authentication profile for the Prisma Access Agent (Identity ServicesAuthenticationAuthentication Profile) must match the allowlist for GlobalProtect.
  • Gateway selection:
    • Both Prisma Access Agent and GlobalProtect can connect to on-premises and Prisma Access Mobile User (MU) gateways.
    • For a deployment that uses the authentication override certificate, Prisma Access Agent users can connect to on-premises NGFW gateways, as long as you export the authentication override certificate.
  • Endpoint considerations: