Prisma Access
Configure Mobile Users using Cloud Identity Engine (Recommended)
Table of Contents
Expand All
|
Collapse All
Prisma Access Docs
-
5.2 Preferred and Innovation
- 5.2 Preferred and Innovation
- 5.1 Preferred and Innovation
- 5.0 Preferred and Innovation
- 4.2 Preferred
- 4.1 Preferred
- 4.0 Preferred
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
-
-
-
-
- Allocate Licenses for Prisma Access (Managed by Strata Cloud Manager)
- Plan Service Connections for Prisma Access (Managed by Strata Cloud Manager) and Add-ons
- Add Additional Locations for Prisma Access (Managed by Strata Cloud Manager) and Add-ons
- Enable Available Add-ons for Prisma Access (Managed by Strata Cloud Manager)
- Search for Subscription Details
- Share a License for Prisma Access (Managed by Strata Cloud Manager) and Add-ons
- Increase Subscription Allocation Quantity
-
- Activate a License for Prisma Access (Managed by Strata Cloud Manager) and Prisma SD-WAN Bundle
- Activate and Edit a License for SASE 5G Through Common Services
-
- General Onboarding Instructions for Prisma Access
-
4.0 & Later
- 4.0 & Later
- 3.2 Preferred and Innovation
- 3.1 Preferred and Innovation
- 3.0 Preferred and Innovation
- 2.2 Preferred
- Prisma Access China
-
- Set Up Prisma Access
- Configure the Prisma Access Service Infrastructure
- Remote Networks: IPSec Termination Nodes and Service IP Addresses
- Remote Networks: IP Address Changes Related To Bandwidth Allocation
- Remote Networks: Service IP Address and Egress IP Address Allocation
- API Examples for Retrieving Prisma Access IP Addresses
- Get Notifications When Prisma Access IP Addresses Change
- Prisma Access Zones
- DNS for Prisma Access
- High Availability for Prisma Access
-
- Enable ZTNA Connector
- Delete Connector IP Blocks
- Set Up Auto Discovery of Applications Using Cloud Identity Engine
- Private AWS Application Target Discovery
- Security Policy for Apps Enabled with ZTNA Connector
- Monitor ZTNA Connector
- View ZTNA Connector Logs
- Preserve User-ID Mapping for ZTNA Connector Connections with Source NAT
-
- Enable Dynamic Privilege Access for Prisma Access Through Common Services
- Authorize User Group Mapping in Cloud Identity Engine for Dynamic Privilege Access
- Enable the Access Agent
- Set Up the Agent Infrastructure for Dynamic Privilege Access
- Create a Snippet
- Create a Project
- Traffic Steering for Dynamic Privilege Access
- Push the Prisma Access Agent Configuration
- Download the Dynamic Privilege Access Enabled Prisma Access Agent Package
-
- Install the Prisma Access Agent
- Log in to the Dynamic Privilege Access Enabled Prisma Access Agent
- Change Preferences for the Dynamic Privilege Access Enabled Prisma Access Agent
- Connect the Dynamic Privilege Access Enabled Prisma Access Agent to a Different Location
- Switch to a Different Project
- Connect the Dynamic Privilege Access Enabled Prisma Access Agent to a Different Server
- Disable the Dynamic Privilege Access Enabled Prisma Access Agent
- Switch Between the Prisma Access Agent and GlobalProtect App
- View and Monitor Dynamic Privilege Access Users
- View and Monitor Dynamic Privilege Access Projects
- Automatic Tunnel Restoration in Dynamic Privilege Access Prisma Access Agents
- Manage Prisma SASE 5G
- App Acceleration in Prisma Access
-
-
- Planning Checklist for GlobalProtect on Prisma Access
- Set Up GlobalProtect Mobile Users
- GlobalProtect — Customize Tunnel Settings
- GlobalProtect — Customize App Settings
- Ticket Request to Disable GlobalProtect
- GlobalProtect Pre-Logon
- GlobalProtect — Clientless VPN
- Monitor GlobalProtect Mobile Users
- How the GlobalProtect App Selects Prisma Access Locations for Mobile Users
- Allow Listing GlobalProtect Mobile Users
-
- Explicit Proxy Configuration Guidelines
- GlobalProtect in Proxy Mode
- GlobalProtect in Tunnel and Proxy Mode
- Private IP Address Visibility and Enforcement for Agent Based Proxy Traffic
- SAML Authentication for Explicit Proxy
- Set Up Explicit Proxy
- Cloud Identity Engine Authentication for Explicit Proxy Deployments
- Proxy Mode on Remote Networks
- How Explicit Proxy Identifies Users
- Explicit Proxy Forwarding Profiles
- PAC File Guidelines
- Explicit Proxy Best Practices
- Monitor and Troubleshoot Explicit Proxy
- Block Settings for Explicit Proxy
- Use Special Objects to Restrict Explicit Proxy Internet Traffic to Specific IP Addresses
- Access Your Data Center Using Explicit Proxy
- App-Based Office 365 Integration with Explicit Proxy
- Chromebook with Prisma Access Explicit Proxy
- Configure Proxy Chaining with Blue Coat Proxy
- Configure Proxy Chaining on Prisma Access Explicit Proxy
- IP Address Optimization for Explicit Proxy Users- Proxy Deployments
- DNS Resolution for Mobile Users—Explicit Proxy Deployments
- View User to IP Address or User Groups Mappings
- Report Mobile User Site Access Issues
- Enable Mobile Users to Access Corporate Resources
-
-
- Planning Checklist for Remote Networks
- Allocate Remote Network Bandwidth
- Onboard a Remote Network
- Connect a Remote Network Site to Prisma Access
- Enable Routing for Your Remote Network
- Onboard Multiple Remote Networks
- Configure Remote Network and Service Connection Connected with a WAN Link
- Remote Networks—High Performance
- Integrate a Shared Desktop VDI with Prisma Access Using Terminal Server
-
- Multitenancy Configuration Overview
- Plan Your Multitenant Deployment
- Create an All-New Multitenant Deployment
- Enable Multitenancy and Migrate the First Tenant
- Add Tenants to Prisma Access
- Delete a Tenant
- Create a Tenant-Level Administrative User
- Sort Logs by Device Group ID in a Multitenant Deployment
-
- Add a New Compute Location for a Deployed Prisma Access Location
- How BGP Advertises Mobile User IP Address Pools for Service Connections and Remote Network Connections
- Proxy Support for Prisma Access and Strata Logging Service
- Block Incoming Connections from Specific Countries
- Prisma Access for No Default Route Networks
-
-
- Default Routes With Prisma Access Traffic Steering
- Traffic Steering in Prisma Access
- Traffic Steering Requirements
- Default Routes with Traffic Steering Example
- Default Routes with Traffic Steering Direct to Internet Example
- Default Routes with Traffic Steering and Dedicated Service Connection Example
- Prisma Access Traffic Steering Rule Guidelines
- Configure Zone Mapping and Security Policies for Traffic Steering Dedicated Connections
- Configure Traffic Steering in Prisma Access
- Preserve User-ID and Device-ID Mapping for Service Connections with Source NAT
-
- Prisma Access Internal Gateway
-
- Configure Privileged Remote Access Settings
- Set Up the Privileged Remote Access Portal
- Configure Applications for Privileged Remote Access
- Set Up Privileged Remote Access Profiles
- Define Permissions for Accessing Privileged Remote Access Apps
- Configure Split Tunneling for Privileged Remote Access Traffic
- Manage Privileged Remote Access Connections
- Use Privileged Remote Access
-
- Integrate Prisma Access With Other Palo Alto Networks Apps
- Integrate Third-Party Enterprise Browser with Explicit Proxy
- Integrate Third-Party NDRs with Prisma Access
- Juniper Mist Integration for SASE Health
-
-
- Connect your Mobile Users in Mainland China to Prisma Access Overview
- Configure Prisma Access for Mobile Users in China
- Configure Real-Name Registration and Create the VPCs in Alibaba Cloud
- Attach the CEN and Specify the Bandwidth
- Create Linux Instances in the Alibaba Cloud VPCs
- Configure the Router Instances
- Onboard the GlobalProtect Gateway and Configure the Prisma Access Portal
-
-
-
- INC_CIE_AGENT_DISCONNECT
- INC_CIE_DIRECTORY_DISCONNECT
- INC_GLOBALPROTECT_GW_USER_AUTH_ TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_ALL_PA_LOCATIONS
- INC_GLOBALPROTECT_GW_USER_AUTH_ TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_PER_PA_LOCATION
- INC_GLOBALPROTECT_PORTAL_AUTH_ TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_ALL_PA_LOCATIONS
- INC_GLOBALPROTECT_PORTAL_AUTH_ TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_PER_PA_LOCATION
- INC_MU_AUTH_SERVER_UNREACHABLE_ALL_ PA_LOCATIONS
- INC_MU_AUTH_SERVER_UNREACHABLE_PER_ PA_LOCATION
- INC_MU_DNS_SERVER_UNREACHABLE_ALL_ PA_LOCATIONS
- INC_MU_DNS_SERVER_UNREACHABLE_ PER_PA_LOCATION
- INC_PORTAL_CLIENTLESS_VPN_AUTH_ TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_ALL_PA_LOCATIONS
- INC_PORTAL_CLIENTLESS_VPN_AUTH_ TIMEOUT_FAILURES_COUNT_EXCEEDED_ ABOVE_BASELINE_PER_PA_LOCATION
- INC_RN_AUTH_SERVER_UNREACHABLE_ALL_ PA_LOCATIONS
- INC_RN_AUTH_SERVER_UNREACHABLE_PER_ PA_LOCATION
- INC_RN_DNS_SERVER_UNREACHABLE_ALL_ PA_LOCATIONS
- INC_RN_DNS_SERVER_UNREACHABLE_PER_ PA_LOCATION
- INC_RN_ECMP_TUNNEL_RTT_EXCEEDED_ BASELINE
- INC_RN_PRIMARY_WAN_TUNNEL_RTT_ EXCEEDED_BASELINE
- INC_RN_SECONDARY_TUNNEL_DOWN
- INC_RN_SECONDARY_WAN_TUNNEL_RTT_ EXCEEDED_BASELINE
- INC_RN_SITE_CAPACITY_PREDICTION
- INC_SC_PRIMARY_WAN_TUNNEL_RTT_ EXCEEDED_BASELINE
- INC_SC_SECONDARY_WAN_TUNNEL_RTT_ EXCEEDED_BASELINE
- INC_SC_SITE_CAPACITY_PREDICTION
-
- INC_CERTIFICATE_EXPIRY
- INC_GP_CLIENT_VERSION_UNSUPPORTED
- INC_MU_IP_POOL_BLOCK_UTILIZATION_ EXCEEDED_CAPACITY
- INC_MU_IP_POOL_BLOCK_UTILIZATION_ EXCEEDED_THRESHOLD
- INC_PA_INFRA_DEGRADATION
- INC_PA_SERVICE_DEGRADATION_PA_LOCATION
- INC_PA_SERVICE_DEGRADATION_RN_ SITE_CONNECTIVITY
- INC_PA_SERVICE_DEGRADATION_SC_ CONNECTIVITY
- INC_RN_ECMP_BGP_DOWN
- INC_RN_ECMP_BGP_FLAP
- INC_RN_ECMP_PROXY_TUNNEL_DOWN
- INC_RN_ECMP_PROXY_TUNNEL_FLAP
- INC_RN_ECMP_TUNNEL_DOWN
- INC_RN_ECMP_TUNNEL_FLAP
- INC_RN_PRIMARY_WAN_BGP_FLAP
- INC_RN_PRIMARY_WAN_PROXY_TUNNEL_DOWN
- INC_RN_PRIMARY_WAN_PROXY_TUNNEL_FLAP
- INC_RN_PRIMARY_WAN_TUNNEL_DOWN
- INC_RN_PRIMARY_WAN_TUNNEL_FLAP
- INC_RN_SECONDARY_WAN_BGP_DOWN
- INC_RN_SECONDARY_WAN_BGP_FLAP
- INC_RN_SECONDARY_WAN_PROXY_TUNNEL_DOWN
- INC_RN_SECONDARY_WAN_PROXY_TUNNEL_FLAP
- INC_RN_SECONDARY_WAN_TUNNEL_DOWN
- INC_RN_SECONDARY_WAN_TUNNEL_FLAP
- INC_RN_SITE_DOWN
- INC_RN_SITE_LONG_DURATION_CAPACITY_ EXCEEDED_THRESHOLD
- INC_RN_SITE_LONG_DURATION_EXCEEDED_ CAPACITY
- INC_RN_SPN_LONG_DURATION_CAPACITY_EXCEEDED _THRESHOLD
- INC_RN_SPN_LONG_DURATION_EXCEEDED_ CAPACITY
- INC_SC_PRIMARY_WAN_BGP_DOWN
- INC_SC_PRIMARY_WAN_BGP_FLAP
- INC_SC_PRIMARY_WAN_PROXY_TUNNEL_DOWN
- INC_SC_PRIMARY_WAN_PROXY_TUNNEL_FLAP
- INC_SC_PRIMARY_WAN_TUNNEL_DOWN
- INC_SC_PRIMARY_WAN_TUNNEL_FLAP
- INC_SC_SECONDARY_WAN_BGP_DOWN
- INC_SC_SECONDARY_WAN_BGP_FLAP
- INC_SC_SECONDARY_WAN_PROXY_TUNNEL_DOWN
- INC_SC_SECONDARY_WAN_PROXY_TUNNEL_FLAP
- INC_SC_SECONDARY_WAN_TUNNEL_DOWN
- INC_SC_SECONDARY_WAN_TUNNEL_FLAP
- INC_SC_SITE_DOWN
- INC_SC_SITE_LONG_DURATION_CAPACITY_ EXCEEDED_THRESHOLD
- INC_SC_SITE_LONG_DURATION_EXCEEDED_ CAPACITY
- INC_ZTNA_CONNECTOR_APP_STATUS_DOWN
- INC_ZTNA_CONNECTOR_APP_STATUS_DOWN_PARTIAL
- INC_ZTNA_CONNECTOR_CPU_HIGH
- INC_ZTNA_CONNECTOR_MEMORY_HIGH
- INC_ZTNA_CONNECTOR_TUNNEL_DOWN
-
- AL_CIE_AGENT_DISCONNECT
- AL_CIE_DIRECTORY_DISCONNECT
- AL_MU_IP_POOL_CAPACITY
- AL_MU_IP_POOL_USAGE
- AL_RN_ECMP_BGP_DOWN
- AL_RN_ECMP_BGP_FLAP
- AL_RN_PRIMARY_WAN_BGP_DOWN
- AL_RN_PRIMARY_WAN_BGP_FLAP
- AL_RN_PRIMARY_WAN_TUNNEL_DOWN
- AL_RN_PRIMARY_WAN_TUNNEL_FLAP
- AL_RN_SECONDARY_WAN_BGP_DOWN
- AL_RN_SECONDARY_WAN_BGP_FLAP
- AL_RN_SECONDARY_WAN_TUNNEL_DOWN
- AL_RN_SECONDARY_WAN_TUNNEL_FLAP
- AL_RN_SITE_DOWN
- AL_RN_SITE_LONG_DURATION_CAPACITY_ EXCEEDED_THRESHOLD
- AL_RN_SITE_LONG_DURATION_EXCEEDED_ CAPACITY
- AL_RN_SPN_LONG_DURATION_CAPACITY_ EXCEEDED_THRESHOLD
- AL_SC_PRIMARY_WAN_BGP_DOWN
- AL_SC_PRIMARY_WAN_BGP_FLAP
- AL_SC_PRIMARY_WAN_TUNNEL_DOWN
- AL_SC_PRIMARY_WAN_TUNNEL_FLAP
- AL_SC_SECONDARY_WAN_BGP_DOWN
- AL_SC_SECONDARY_WAN_BGP_FLAP
- AL_SC_SECONDARY_WAN_TUNNEL_DOWN
- AL_SC_SECONDARY_WAN_TUNNEL_FLAP
- AL_SC_SITE_DOWN
- AL_SC_SITE_LONG_DURATION_CAPACITY_ EXCEEDED_THRESHOLD
- AL_SC_SITE_LONG_DURATION_EXCEEDED_CAPACITY
- AL_ZTNA_CONNECTOR_APP_STATUS_DOWN
- AL_ZTNA_CONNECTOR_APP_STATUS_DOWN_PARTIAL
- AL_ZTNA_CONNECTOR_CPU_HIGH
- AL_ZTNA_CONNECTOR_MEMORY_HIGH
- AL_ZTNA_CONNECTOR_TUNNEL_DOWN
- New Features in Incidents and Alerts
- Known Issues
Configure Mobile Users using Cloud Identity Engine (Recommended)
Where Can I Use This? | What Do I Need? |
---|---|
|
|
Cloud Identity Engine (Directory Sync) gives
Prisma Access read-only access to your Active Directory information, so that you can
easily set up and manage security and decryption policies for users and groups. Cloud
Identity Engine works with both on-premises Active Directory and Microsoft Entra ID
(formerly Azure Active Directory).
Prisma Access retrieves user and group information from your organization’s cloud
directory or Active Directory (AD), to enforce user- and group-based policy. Optionally,
Prisma Access retrieves user behavior-based risk signals from some cloud directory
vendors, such as Microsoft Entra ID, to enforce automated security actions. In
addition to simplifying user and group information retrieval, integrating the Cloud
Identity Engine with Prisma Access can free up the bandwidth and load on your cloud
directory or AD. To set up Cloud Identity Engine with Prisma Access, start by going to
the hub to activate Cloud Identity Engine and add it to Prisma Access. Then go to Prisma
Access to validate that Prisma Access is able to access directory data.
Configure Mobile Users using Cloud Identity Engine (Recommended) (Strata Cloud Manager)
You first configure SAML in Microsoft Entra ID (formerly Azure Active Directory (Azure AD), then
import the metadata XML file (the file
that contains SAML registration information) from Microsoft Entra ID and upload it to a
SAML Identity Provider you create in Prisma Access. You
then create an Authentication Profile that references the IdP
server profile, add the authentication profile into the Explicit Proxy or
GlobalProtect configuration, and commit and push your changes.
If you are a GlobalProtect mobile user, upgrade your GlobalProtect app to 6.0 version
or to a later version.
- From Prisma Access, open the Cloud Identity Engine app associated with your tenant.
- Go to Prisma AccessTenants and ServicesCloud Identity Engine.
- Download the SP Metadata in the Cloud Identity Engine app.
- Go to AuthenticationAuthentication TypesAdd New.
- Set Up a SAML 2.0 authentication type.
- Download SP Metadata.
- Log in to the Azure Portal and select Microsoft Entra ID.Make sure you complete all the necessary steps in the Azure portal.If you have more than one directory, Switch directory to select the directory you want to use with the Cloud Identity Engine.
- Select Enterprise applications and click New application.
- Search for Palo Alto Networks Cloud Identity Engine - Cloud Authentication Service and create the Microsoft Entra ID single-sign on integration.Customize the app name if required while creating the application.
- After the application loads, select Users and groups, then Add user/group to Assign them to this application.Select the users and groups you want to have use the Azure IdP in the Cloud Identity Engine for authentication.Be sure to assign the account you are using so you can test the configuration when it is complete. You may need to refresh the page after adding accounts to successfully complete the test.
- Set up single sign-on then select SAML.
- Upload Metadata File by browsing to the metadata file that you downloaded from the Cloud Identity Engine app in step2.cand click Add.
- After the metadata uploads, enter your regional endpoint as the Sign-on URL using the following format: https://<RegionUrl>.paloaltonetworks.com/sp/acs (where <RegionUrl> is your regional endpoint).Alternatively, copy the reply URL to the sign on URL.
- Save your configuration.
- Download the Federation Metadata XML under SAML Certificates.
- Add Azure as an authentication type in the Cloud Identity Engine app.
- In Cloud Identity Engine app, select AuthenticationAuthentication TypesAdd New.
- Set Up a SAML 2.0 authentication type.
- Enter a Profile Name.
- Select Azure as your IDP Vendor.
- Upload Metadata from step2.lto Add Metadata.
- Click to Upload.
- Test SAML Setup to verify the profile configuration.
- Select the SAML attributes you want Prisma Access to use for authentication and Submit the IdP profile.
- Add an authentication profile.
- Select AuthenticationAuthentication ProfilesAdd Authentication Profile.
- Enter a PROFILE NAME.
- Select an Authentication Mode.
- Select the Authentication Type from step3and Submit.
- Add the authentication profile from Cloud Identity Engine to Prisma Access.
- In Prisma Access, select ManageConfigurationIdentity ServicesAuthenticationAuthentication Profiles.Ensure to set the scope to GlobalProtect or Explicit Proxy mobile users.
- Add Profile.
- Select Cloud Identity Engine as your Authentication Method.
- Enter a Profile Name.
- Select the Profile you added in the Cloud Identity Engine app from step4.
- Save the changes.
- Attach the authentication to mobile users.
- For GlobalProtect mobile users
- Select ManageService SetupGlobalProtectInfrastructureAdd Authentication.
- Select all required fields and the Profile you added to Prisma Access in step5.
- Save the changes.
- Move the authentication to the top of the list to prioritize it.
-
For explicit proxy mobile users
- Select ManageService SetupExplicit Proxy.
- Edit the User Authentication settings.
- Create New profile.
- Select the Cloud Identity Engine authentication method.
- Enter a profile name.
- Select the Profile you added to Prisma Access in step5.
- Save the changes.
- Move the authentication to the top of the list to prioritize it.
- (For GlobalProtect mobile users only) Edit the default browser settings for the GlobalProtect app.
- Select the Default app settings.
- Go to App ConfigurationShow Advanced OptionsAuthentication.
- Select the Use Default Browser for SAML Authentication.
- Save the changes.
- Push the changes.
- (Optional) Verify the user authentication.
-
For GlobalProtect mobile users
- Log in to a Windows machine and connect to the GlobalProtect app.The default browser takes you to SAML authentication.
- Enter the credentials and sign in.
- View Settings in the GlobalProtect app to see the connection details.
- Log in to Prisma Access and select ActivityLogsLog Viewer.You can see that the authentication is successful.
-
For explicit proxy mobile users
- Copy the PAC file URL to the endpoint.Go to ManageService SetupExplicit ProxyInfrastructure Settings to view the PAC file URL.
- Log in to a Windows machine.
- Edit the Proxy Settings and paste the PAC file URL to the Script Address.
- Access a URL that requires authentication.
- Enter the credentials.
- In Prisma Access, view the user mapping information by running the show user ip-user-mapping all command.
- (Optional) In Strata Cloud Manager, select InsightsActivity InsightsUsers.View details about mobile users connected for a time range you select.
-
Configure Mobile Users using Cloud Identity Engine (Recommended) (Panorama)
The Cloud Identity Engine provides both user
identification and user authentication for mobile users in a Prisma Access—GlobalProtect
deployment. Using the Cloud Identity Engine for user authentication and username-to-user
group mapping allows you to write security policy based on users and groups, not IP
addresses, and helps secure your assets by enforcing behavior-based security actions. By
continually syncing the information from your directories, the Cloud Identity Engine
ensures that your user information is accurate and up to date and policy enforcement
continues based on the mappings even if the SAML identity provider (IdP) is temporarily
unavailable.
Configure GlobalProtect Mobile Users using Cloud Identity Engine (Recommended) (Panorama)
Use the Cloud Authentication (CAS) component of the Cloud Identity Engine to
authenticate Prisma Access mobile users in a Mobile Users—GlobalProtect deployment.
This functionality is only available for Panorama Managed Prisma Access 3.0
Innovation and later Innovation deployments.
The Cloud Identity Engine has two components to provide authentication and
enforcement of user- and group-based policy:
- The Cloud Authentication Service component allows you to authenticate mobile users in a Prisma Access—GlobalProtect deployment. You configure a SAML identity IdP during configuration of the Cloud Identity Engine to use with the Cloud Authentication Service.
- The Directory Sync component provides username-to-user group mapping for the authenticated user. You can use this mapping to enforce user- and group-based policy in Prisma Access.
To configure the Cloud Authentication Service to authenticate GlobalProtect mobile
users, you must have the following minimum required product and software versions:
- A minimum Prisma Access version of 3.0 Innovation or a later Innovation version, which requires a dataplane version of 10.1.To verify your dataplane version, select PanoramaCloud ServicesConfigurationService Setup and view the Current Dataplane version in the DataPlane PAN-OS version area.If your dataplane is running 10.1, you are running the Prisma Access 3.0 Innovation or later Innovation release and can use the Cloud Identity Engine to authenticate GlobalProtect mobile users. If your dataplane is running 10.0, you are running a Prisma Access Preferred release and you cannot authenticate mobile users with the Cloud Identity Engine.
- A minimum GlobalProtect app version of 6.0.
- A SAML IdP provider that is supported with the Cloud Identity Engine.Prisma Access supports all IdP providers that are supported by the Cloud Identity Engine, including Azure, Okta, PingOne, PingFederate, and Google.
- A minimum Panorama version of 10.1.
To configure authentication for a mobile users using the Cloud Authentication Engine,
complete the following steps.
- Install the device certificate on the Panorama that manages Prisma Access.You must generate a one-time password (OTP) and retrieve the device certificate to successfully authenticate Panorama with the Cloud Identity Engine.
- Log into the Customer Support Portal to generate the One Time Password (OTP).
- Select AssetsDevice Certificates and Generate OTP.
- For the Device Type, select Generate OTP for Panorama and Generate OTP.
- Select the Panorama Device serial number.
- Generate OTP and copy the OTP. and copy the OTP.
- From the Panorama that manages Prisma Access, select PanoramaSetupManagementDevice Certificate Settings and Get certificate.When you have successfully installed the certificate, the Current Device Certificate Status (PanoramaSetupManagementDevice Certificate) displays as Valid.
- Activate the Cloud Identity Engine if you have not yet done so to create your first instance.
- Log in to the hub.
- Activate the Cloud Identity Engine.If the Activate button is not available, ensure that your role has the necessary privileges.
- Enter the information for your Cloud Identity Engine instance.
- Select the Company Account for the instance.
- Specify a Name to identify the instance.
- (Optional) Enter a Description to provide more information about the Cloud Identity Engine instance (for example, details about the instance’s purpose).
- Select a Region.Make a note of the region you selected; you use that region when you activate the Cloud Identity Engine in a later step.
- Agree to the EULA.
- Agree & Activate the instance.
- On the Activation Details page, select the hub in the upper left.
- The Cloud Identity Engine displays.
- (Optional) If you require a separate instance for Explicit Proxy, configure a Cloud Identity Engine Instance.If you want to isolate your Explicit Proxy directory data, or allow different Palo Alto Networks cloud applications and services to access different sets of directory data, you can create a Cloud Identity Engine instance specifically for Explicit Proxy.When you select a Region, select the same region you used when you activated the Cloud Identity Engine.
- From the Cloud Identity Engine app, configure a SAML IdP in the Cloud Identity Engine.The Cloud Identity Engine Getting Started guide has the procedures you need to configure a SAML IdP in the Cloud Identity Engine:Use the following values in the when configuring Explicit Proxy authentication in your IdP:
- Single sign on URL: global.acs.prismaaccess.com
- SAML Assertion Consumer Service URL: https://global.acs.prismaaccess.com/saml/acs
- Entity ID URL: https://global.acs.prismaaccess.com/saml/metadata
- Configure an authentication profile to use with the Cloud Authentication Service.Be sure that you are in the Mobile_User_Template. By setting up an authentication profile in Panorama, you can redirect GlobalProtect mobile users to the IdP you configure for authentication.
- Change the pre-deployed settings on mobile users’ Windows, macOS, Linux, Android, and iOS endpoints to use the default system browser for SAML authentication.You must set the pre-deployed settings on the client endpoints before you can enable the default system browser for SAML authentication. GlobalProtect retrieves these entries only once, when the GlobalProtect app initializes.If there is no pre-deployed value specified on the end users’ Windows or macOS endpoints when using the default system browser for SAML authentication, the Use Default Browser for SAML Authentication option is set to Yes in the portal configuration, and users upgrade the app from release 5.0.x or release 5.1.x to release 5.2.0 for the first time, the app will open an embedded browser instead of the default system browser. After users connect to the GlobalProtect app and the Use Default Browser for SAML Authentication option is set to Yes in the portal configuration, the app will open the default system browser on Windows and macOS endpoints at the next login.If the default browser value is set to Yes in the pre-deployed setting of the client machine and the Use Default Browser for SAML Authentication option is set to No in the portal configuration, end users will not have the best user experience. The app will open the default system browser for SAML authentication for the first time. Because the default browser values differ between the client machine and the portal, the app detects a mismatch and opens an embedded browser at the next login.The Use Default Browser for SAML Authentication option of the GlobalProtect portal and the pre-deployed settings in the client machine must have the same value to provide the best user experience.
- On Windows endpoints, you can use the System Center Configuration Manager (SCCM) to pre-deploy the GlobalProtect app 5.2 and set the DEFAULTBROWSER value to yes from the Windows Installer (Msiexec) using the following syntax:msiexec.exe /i GlobalProtect.msi DEFAULTBROWSER=YES
- On macOS endpoints, set the default-browser value to yes in the macOS plist (/Library/Preferences/com.paloaltonetworks.GlobalProtect.settings.plist) for the GlobalProtect app using the following syntax:sudo defaults write /Library/Preferences/com.paloaltonetworks.GlobalProtect.settings.plist ’{"Palo Alto Networks" ={GlobalProtect={Settings={default-browser=yes;};};};}’You must specify the plist key to launch the default system browser for SAML authentication after GlobalProtect app 5.2 is installed.After you add the plist key, you must restart the GlobalProtect app in order for the plist key to take effect. After you restart the GlobalProtect app, the default system browser for SAML authentication launches. To restart the GlobalProtect app:
- Launch the Finder.
- Open the Applications folder by selecting Applications from the Finder sidebar.If you do not see Applications in the Finder sidebar, select GoApplications from the Finder menu bar.
- Open the Utilities folder.
- Launch Terminal.
- Execute the following commands:
username>$ launchctl unload -S Aqua /Library/LaunchAgents/com.paloaltonetworks.gp.pangpa.plist username>$ launchctl unload -S Aqua /Library/LaunchAgents/com.paloaltonetworks.gp.pangps.plist username>$ launchctl load -S Aqua /Library/LaunchAgents/com.paloaltonetworks.gp.pangpa.plist username>$ launchctl load -S Aqua /Library/LaunchAgents/com.paloaltonetworks.gp.pangps.plist
- On Linux endpoints, set the default-browser value to yes in the /opt/paloaltonetworks/globalprotect/pangps.xml pre-deployment configuration file under <Settings>. After you add the default-browser value, follow the pre-deployment instructionsbefore you reboot the Linux endpoint in order for the change to take effect.
- On Android and iOS endpoints, create a VPN profile by using the supported mobile device management system (MDM) such as Airwatch.
- Log in to Airwatch as an administrator.
- Select an existing VPN profile (DevicesProfiles & ResourcesProfiles) in the list.
- Select VPN to add a VPN profile.On Android endpoints, enter the Custom Data Key (use_default_browser_for_saml). Enter the Custom Data Value (true).On iOS endpoints, enter the Custom Data Key (saml-use-default-browser). Enter the Custom Data Value (true).
- Click Save and Publish to save your changes.
- Configure the Prisma Access portal to use Cloud Identity Engine authentication.
- In the Mobile_User_Template, select NetworkGlobalProtectPortalsGlobalProtect_PortalAuthentication.
- Select the Default GlobalProtect portal configuration.
- Select the Authentication Profile you created for Cloud Identity Engine authentication and click OK.
- Select Agent, then select the Default agent.
- (Optional) If you have on-premises GlobalProtect gateways and want the Prisma Access gateway to generate a cookie to override authentication for on-premises gateways, select Generate cookie for authentication override.
- (Optional) If you want Prisma Access to accept cookies from on-premises gateways that allows them to override authentication for Prisma Access, select Accept cookie for authentication override.
- Click OK.
- In the App settings, make sure that Use Default Browser for SAML Authentication is set to Yes.Selecting this portal setting ensures that mobile users can leverage the same login for GlobalProtect with their saved user credentials on the default system browser such as Chrome, Firefox, or Safari.
- Click OK.
- Configure the Prisma Access gateway to use Cloud Identity Engine authentication.
- In the Mobile_User_Template, select NetworkGlobalProtectGatewaysGlobalProtect_External_Gateway.
- Select Authentication.
- Select the Default authentication profile.
- Select the Authentication Profile you created for Cloud Identity Engine authentication and click OK.
- Select AgentClient Settings, then select the Default configuration.
- (Optional) Select Generate cookie for authentication override and Accept cookie for authentication override.When you use the Cloud Identity Engine for authentication, Palo Alto Networks recommends that you allow authentication cookie overrides on gateways, since you have already configured authentication on the portal. If you do not configure cookie overrides on the gateway, two authentication pages display on the mobile user’s default browser when they log in to a gateway—one page for portal authentication and one page for gateway authentication.
- Click OK.
- Complete the Cloud Identity Engine configuration in Panorama.
- Select PanoramaSetupManagement and Edit the Authentication Settings, then select the Authentication Profile you created in Step5.
- Select PanoramaDevice Groups and Add or Edit a device group.
- Select the Cloud Identity Engine and Add the Cloud Identity Engine instance you want to associate with Panorama; then, click OK.
- Commit and Push your changes.
- Verify that the Cloud Identity Engine is successfully authenticating your mobile users.
- On a mobile user endpoint, open the GlobalProtect app (minimum GlobalProtect version of 6.0 required).
- If prompted, Get Started.
- Enter the Portal URL in the app and Connect to it.
- When you are challenged for authentication, verify that you are redirected to the SAML IdP and are presented with a login page.After you successfully authenticate to the SAML IdP, it redirects you to Prisma Access. Prisma Access then validates the SAML responses from the SAML IdP and the mobile user is able to log in to the GlobalProtect portal.
- Enter your credentials to log in.
- After you have successfully logged in, Open GlobalProtect in the browser or, if you are provided with a URL, Click Here to open the GlobalProtect app.
- If your system browser prompts you to allow opening GlobalProtect in the browser, Allow it.
- Verify that you receive a banner from the GlobalProtect app, indicating that you are Connected to GlobalProtect and showing the GlobalProtect Portal and Gateway.
- (Optional) To see more information about the GlobalProtect connection, select Settings from the GlobalProtect app.From this area, you can see the user that is logged in, view connection statistics and notifications, and download GlobalProtect logs for Troubleshooting.
Configure Explicit Proxy Mobile Users using Cloud Identity Engine (Recommended) (Panorama)
Use the Cloud Authentication (CAS) component of the Cloud Identity Engine to
authenticate Prisma Access mobile users in a Mobile Users—Explicit Proxy deployment.
To configure the Cloud Authentication Service to authenticate Explicit Proxy mobile
users, you must have the following minimum required product and software versions:
- A minimum Prisma Access version of 3.2 (either Preferred or Innovation).
- A minimum Panorama version of 10.1.3.
- A minimum dataplane version of 10.1.3.To verify your dataplane version, select PanoramaCloud ServicesConfigurationService Setup and view the Current Dataplane version in the DataPlane PAN-OS version area. If your dataplane version is lower than 10.1.3, reach out to your Palo Alto Networks account representative and submit a request.
- A SAML IdP provider that is supported with the Cloud Identity Engine.All IdP providers that are supported by the Cloud Identity Engine are supported, including Azure, Okta, PingOne, PingFederate, and Google.
To configure authentication for a Mobile Users—Explicit Proxy deployment using the
Cloud Identity Engine, complete the following steps.
- From the Panorama that manages Prisma Access, set up and configure a Mobile Users—Explicit Proxy deployment.Before you configure Explicit Proxy guidelines, be aware of how explicit proxy works and how explicit proxy identifies users, go through the planning checklist, and learn how to set up the Explicit Proxy PAC file.
- From the Panorama that manages Prisma Access, install the Panorama device certificate.You must generate a one-time password (OTP) and retrieve the device certificate to successfully authenticate Panorama with the Cloud Identity Engine.
- Log into the Customer Support Portal to generate the One Time Password (OTP).
- Select AssetsDevice Certificates and Generate OTP.
- For the Device Type, select Generate OTP for Panorama and Generate OTP.
- Select the Panorama Device serial number.
- Generate OTP and Copy to Clipboard.
- From the Panorama that manages Prisma Access, select PanoramaSetupManagementDevice Certificate Settings and Get certificate.When you have successfully installed the certificate, the Current Device Certificate Status (PanoramaSetupManagementDevice Certificate) displays as Valid.
- From the hub, activate the Cloud Identity Engine if you have not yet done so to create your first instance.
- Log in to the hub.
- Activate the Cloud Identity Engine.If the Activate button is not available, ensure that your role has the necessary privileges.
- Enter the information for your Cloud Identity Engine instance.
- Select the Company Account for the instance.
- Specify an Name to identify the instance.
- (Optional) Enter a Description to provide more information about the Cloud Identity Engine instance (for example, details about the instance’s purpose).
- Select a Region.Make a note of the region; you specify the same region when you create an authentication profile in Panorama.
- Agree to the EULA.
- Agree & Activate the instance.
- On the Activation Details page, select the hub in the upper left.
- The Cloud Identity Engine displays.
- (Optional) If you require a separate instance for Explicit Proxy, configure a Cloud Identity Engine Instance.If you want to isolate your Explicit Proxy directory data, or allow different Palo Alto Networks cloud applications and services to access different sets of directory data, you can create a Cloud Identity Engine instance specifically for Explicit Proxy.
- Log in to the hub.
- Click the gear in the upper right corner of the page to manage the settings; then, select Manage Apps and click Add Instance.
- Configure the instance.
- Select the Company Account for the instance.
- Specify an Name to identify the instance.
- (Optional) Enter a Description to provide more information about the Cloud Identity Engine instance (for example, details about the instance’s purpose).
- Select a Region.Make a note of the region; you specify the same region when you create an authentication profile in Panorama.
- Agree to the EULA.
- Agree & Activate the instance.
- From the Cloud Identity Engine app, configure a SAML 2.0 IdP in the Cloud Identity Engine.The Cloud Identity Engine Getting Started guide has the procedures you need to configure a SAML IdP in the Cloud Identity Engine:Do not configure single logout, it is not supported. .
- Set up an authentication profile in the Cloud Identity Engine and select the users and groups that can use this authentication method.You specify this profile when you create an authentication profile in Panorama in a later step.
- Return to the Panorama that manages Prisma Access and configure an authentication profile to use with the Cloud Authentication Engine.
- Select DeviceAuthentication Profile and Add an authentication profile.Be sure that you are in the Explicit_Proxy_Template.
- Enter a Name for the Authentication profile.
- Select Cloud Authentication Service as the Type.
- Select the Region of your Cloud Identity Engine instance.Specify the same region you used when you created your Cloud Authentication Engine instance.
- Select the Cloud Identity Engine Instance to use for this Authentication profile.
- Select an authentication Profile that specifies the authentication type you want to use to authenticate users.Specify the authentication profile you created in the Cloud Identity Engine.
- Specify the Maximum Clock Skew (seconds), which is the allowed difference in seconds between the system times of the IdP and the firewall at the moment when the firewall validates IdP messages (default is 60; range is 1–900). If the difference exceeds this value, authentication fails.
- (Optional) If the profile you selected has multi-factor authentication (MFA) enabled, select Force multi-factor authentication in cloud.Selecting this option means that the IdP (for example, Okta) specified by the profile is responsible for performing MFA. If you select this check box and incorrect MFA information is received from the Cloud Identity Engine, authentication fails.
- Click OK.
- Allow the necessary authentication traffic to be passed to Explicit Proxy.
- Create a URL list as a custom URL category to allow the necessary traffic for the Cloud Identity Engine.
- Add the following Cloud Identity Engine URLs to the URL category.If you do not need to strictly limit traffic to your region, you can enter *.apps.paloaltonetworks.com. Otherwise, determine your region-based URL using the show cloud-auth-service-regions command in the Cloud Identity Engine to display the URLs for the region associated with your Cloud Identity Engine instance and enter each region-based URL. The following table includes the URLs for each region:
Region Cloud Identity Engine Region-Based URL United States cloud-auth.us.apps.paloaltonetworks.com cloud-auth-service.us.apps.paloaltonetworks.comEurope cloud-auth.nl.apps.paloaltonetworks.com cloud-auth-service.nl.apps.paloaltonetworks.comUnited Kingdom cloud-auth.uk.apps.paloaltonetworks.com cloud-auth-service.uk.apps.paloaltonetworks.comSingapore cloud-auth.sg.apps.paloaltonetworks.com cloud-auth-service.sg.apps.paloaltonetworks.comCanada cloud-auth.ca.apps.paloaltonetworks.com cloud-auth-service.ca.apps.paloaltonetworks.comJapan cloud-auth.jp.apps.paloaltonetworks.com cloud-auth-service.jp.apps.paloaltonetworks.comAustralia cloud-auth.au.apps.paloaltonetworks.com cloud-auth-service.au.apps.paloaltonetworks.comGermany cloud-auth.de.apps.paloaltonetworks.com cloud-auth-service.de.apps.paloaltonetworks.comUnited States - Government cloud-auth-service.gov.apps.paloaltonetworks.com cloud-auth.gov.apps.paloaltonetworks.comIndia cloud-auth-service.in.apps.paloaltonetworks.com cloud-auth.in.apps.paloaltonetworks.com - Enter the URLs that your IdP requires for user authentication (for example, *.okta.com) in the custom URL category.
- Create a security policy rule to allow traffic to the authentication type and Cloud Identity Engine and select the custom URL category as the match criteria.
- Specify the authentication profile for Explicit Proxy.
- Select PanoramaCloud ServicesConfigurationMobile Users—Explicit Proxy.
- Select the Connection Name.
- Specify the Cloud Identity Engine Authentication Profile.
- Commit and Push your changes.
- Verify that the Cloud Identity Engine is successfully authenticating your Explicit Proxy mobile users.
- From the Panorama that manages Prisma Access, select MonitorLogsAuthentication.
- View the Event status.If the authentication fails, view the Description for more details about the failure.
- From the mobile user’s endpoint, use dev tools to view the Cloud Identity Engine authentication flow.