|
Adhering to zero trust policies requires that your security policies
are based not just on the IP address of the user but also the
username, known as user-based security policy. To enforce user-based
security policy, enforcement points (such as firewalls or Prisma
Access) require access to up-to-date username-to-IP address
mappings. The Cloud Identity Engine collects attributes from your
directory to establish these mappings during synchronization (also
known as a “sync”). To minimize the data that the Cloud Identity
Engine collects from your directory and reduce sync time, you can
now specify which groups you want the Cloud Identity Engine to sync.
By specifying the attributes (either name, unique identifier, or
both) that you want to use to define the Azure Active Directory
groups that the Cloud Identity Engine syncs, you can now
sync the information from your directory more quickly and more
frequently than would be possible using the SCIM Connector while
still limiting group data collection. Updates using the SCIM
Connector are limited to once every 40 minutes, but by filtering
groups, you can update your directory information as frequently as
every five minutes.
You can optionally add an operand to filter groups based on multiple
attributes, allowing you even more fine-grained filtering to select
only the groups that you need to sync to enforce policy.
By ensuring that you collect only the groups that are applicable to
your policy, you can minimize the time necessary to sync your data.
This capability means that your enforcement points can receive more
frequent updates for the mappings they use to enforce your
user-based security policy, ensuring consistent application of your
security policy rules.
|