When you configure the Cloud Identity Engine (CIE) as a User-ID source, the firewall or Panorama retrieves the group mapping information from the Cloud Identity Engine. You can then use the group information from the CIE to create and enforce group-based security policy rules.
The CIE retrieves the information for your tenant based on your device certificate.
Configure the Cloud Identity Engine as a Mapping Source
https://docs.paloaltonetworks.com/identity/cloud-identity-engine/identify-users-and-devices-with-cie/redistribute-identification-information-from-ngfws-to-the-cloud/configure-the-cloud-identity-engine-as-a-mapping-source
Setup summary
- On-prem Palo Alto firewall with GlobalProtect configured
- GlobalProtect authentication: SAML via Azure Entra ID
- Cloud Identity Engine (CIE) tenant configured with directory sync enabled
- Configured CIE as a User-ID source under Device > User Identification > Cloud Identity Engine
- Enabled directory sync in CIE with Azure Entra ID
- Users authenticate successfully via GlobalProtect with SAML
here's what should happen:
- GlobalProtect automatically provides IP-to-username mapping when users authenticate via SAML
- CIE (configured as User-ID source) provides the group membership information
- The firewall combines both to apply security policies based on user/group
High‑Level Architecture
- Authentication: GlobalProtect → SAML → Microsoft Entra ID
- User / Group Mapping: Cloud Identity Engine (CIE) synchronized with Entra ID
- Firewall Consumption: Palo Alto firewall uses CIE as the User-ID source (not SAML groups)
Key concept:
- SAML groups → used only for GlobalProtect authentication allow/deny
- CIE groups → used for security policy, GP gateway rules, App-ID, logging
Step 1 – Prepare Microsoft Entra ID (IdP)
- Create Enterprise Application
- Add “Palo Alto Networks – GlobalProtect” from the gallery.
- Configure SAML SSO
- Entity ID:
https://<firewall-fqdn>:443/SAML20/SP - Reply URL (ACS):
https://<firewall-fqdn>:443/SAML20/SP/ACS - Sign‑on URL:
https://<firewall-fqdn>
- Entity ID:
- User & Group Assignment
- Assign users or Entra security groups allowed to use VPN.
- Download Federation Metadata XML
- Used later on the firewall.
[learn.microsoft.com], [packetswitch.co.uk]
Step 2 – Configure Cloud Identity Engine (CIE)
- Deploy / Access CIE Tenant
- Add Microsoft Entra ID as Identity Provider
- Configure Entra → CIE synchronization.
- Enable Directory Sync
- Sync:
- Users
- Security groups
- User attributes (UPN, email, etc.)
- Sync:
- Verify Sync Health
- Confirm users and groups appear correctly in CIE.
At this stage, CIE becomes your authoritative User‑ID source.
Step 3 – Integrate CIE with Palo Alto Firewall (User‑ID)
- On the firewall:
- Device → Cloud Identity Engine
- Register Firewall with CIE
- Authenticate the firewall to the CIE tenant.
- Enable User‑ID from CIE
- Users and groups become available for:
- Security policies
- GlobalProtect gateway rules
- Logging & monitoring
- Users and groups become available for:
✅ No LDAP, no User‑ID agent required.
Step 4 – Configure SAML on Palo Alto Firewall (Authentication)
- Import Entra Metadata
- Device → Server Profiles → SAML Identity Provider
- Import the Entra Federation Metadata XML
- Create Authentication Profile
- Type: SAML
- IdP: Entra SAML profile
- Optional:
- Use Allow List with SAML group names (access control only)
Reminder:
SAML groups cannot be referenced in policies or gateways.
[docs.paloa...tworks.com], [bing.com]
Step 5 – Attach SAML Auth to GlobalProtect
- GlobalProtect Portal
- Authentication Profile → SAML profile
- GlobalProtect Gateway
- Authentication Profile → same SAML profile
- (Optional) Enable MFA / Conditional Access in Entra ID
Step 6 – Policy & Gateway Configuration (Using CIE Groups)
- Security Policies
- Source User = CIE groups
- GlobalProtect Gateway Rules
- Client authentication / IP pools based on CIE groups
- Verify User‑ID
- Monitor → User‑ID
- Traffic logs show resolved user and group
Step 7 – Test & Validate
- User connects GlobalProtect
- Redirected to Entra ID for SAML authentication
- Firewall:
- Accepts authentication via SAML
- Resolves user/groups via CIE
- Policies match on CIE group membership
Key Design Notes (Best Practice)
- ✅ Use SAML only for authentication
- ✅ Use CIE for all group‑based enforcement
- ❌ Do not rely on SAML groups for security policy
- ✅ Scales well for cloud/hybrid and Zero Trust designs
- ✅ Works cleanly with MFA and Conditional Access
Comments
Post a Comment