Cloud Identity Engine (CIE) Overview

The Cloud Identity Engine (CIE) provides centralized user identification and authentication for various network environments (on-premise, cloud-based, hybrid). It enables security policies based on users and groups rather than just IP addresses, enhancing security asset protection through behavior-based actions.

CIE offers flexibility by simplifying identity source configuration and scales as needs change. It maintains accurate, up-to-date user information by continually syncing directories, ensuring policy enforcement even if a cloud identity provider is temporarily unavailable.

CIE provides Palo Alto Networks cloud applications and services with read-only access to your directory information for user visibility and policy enforcement. The specific components required for deployment vary depending on whether CIE accesses an on-premises directory (like Active Directory) or a cloud-based directory (like Azure Active Directory).

CIE's authentication component allows configuring profiles for SAML 2.0-compliant identity providers (IdPs) (Google, Azure, Okta, PingOne, PingFederate) or client certificates. When an Authentication policy and the Authentication Portal are configured on the firewall, user access requests can be redirected through the IdP for authentication before granting access.

On-Premises Directory Configuration

To integrate CIE with an on-premises Active Directory or OpenLDAP directory:

The agent collects attributes initially during tenant setup and then syncs them with CIE every five minutes (if a sync isn't in progress) based on the agent host's system time. This ensures directory information is available to Palo Alto Networks apps/services.

For communication:

Important Point: We strongly recommend configuring TLS 1.3 for all CIE traffic. Agent versions 1.7.0+ use the latest TLS version by default.

Data transmitted to CIE and on the agent host is encrypted end-to-end. CIE locally encrypts agent data and removes it after transmission.

To set up CIE for on-premises directories, log in to the CIE app on the hub to generate a certificate for agent-CIE authentication.

Network Configuration for Cloud Identity Agent Traffic (On-Premises)

Ensure network connectivity for the agent, directory, and CIE based on your deployment and region.

Configure Domains for the Cloud Identity Engine

On-Premises Active Directory Domains

A single agent can communicate with multiple domains if the service account has query permissions for all configured domains. We recommend multiple domain controllers per domain for redundancy. For agent redundancy, configure multiple agents for a domain, ideally located near the domain controllers they query.

To get cross-domain memberships, configure those domains on the agent(s) and use LDAP or LDAPS (ports 389/636). Do not configure the agent to use the Global Catalog port (3268 for LDAP or 3269 for LDAPS).

Gotcha!: Do NOT use the Global Catalog ports (3268/3269) for AD configuration on the Cloud Identity agent.

Set Up the Cloud Identity Engine (On-Premises)

After activating CIE, select On-Premises as your directory type.

  1. Install and configure the Cloud Identity agent on a Windows server to communicate with your On-Prem AD/OpenLDAP and CIE. Generate a certificate for mutual authentication.
  2. Install the Cloud Identity Agent:
    • Verify time sync on the agent host.
    • Activate your CIE tenant.
    • Download the agent from the CIE app on the hub.
    • Install on a supported Windows server. Ensure TLS 1.2+ is enabled.

    Critical Point: The Cloud Identity agent requires a dedicated host. Do NOT install it on the same host as the User-ID agent or Terminal Server (TS) agent (unless you change the TS agent port).

  3. Configure the Cloud Identity Agent:
  4. Gotcha!: Avoid configuring the agent or performing the initial sync during the daily CRL reload time (typically 9:00-10:00 PM CDT/CEST).

    Important Point: Do NOT manually edit agent configuration files; it may cause unexpected behavior.

    1. Ensure network allows agent traffic.
    2. Install the directory's CA certificate in the Local Computer Trusted Root CA store on the agent host.
    3. Launch the agent ( Start > Palo Alto Networks > Cloud Identity Agent ).
    4. Select Cloud Identity Configuration and enter the regional agent configuration endpoint URL matching your CIE tenant region. Screenshot of Agent Configuration Endpoint

      Screenshot showing the field for entering the regional agent configuration endpoint.

    5. Region Agent Configuration Endpoint
      United States (US) agent-directory-sync.us.paloaltonetworks.com
      European Union (EU) agent-directory-sync.eu.paloaltonetworks.com
      United Kingdom (UK) agent-directory-sync.uk.paloaltonetworks.com
      Singapore (SG) agent-directory-sync.sg.paloaltonetworks.com
      Canada (CA) agent-directory-sync.ca.apps.paloaltonetworks.com
      Japan (JP) agent-directory-sync.jp.apps.paloaltonetworks.com
      Australia (AU) agent-directory-sync.au.apps.paloaltonetworks.com
      Germany (DE) agent-directory-sync.de.apps.paloaltonetworks.com
      United States - Government agent-directory-sync.gov.apps.paloaltonetworks.com
      India (IN) agent-directory-sync.in.apps.paloaltonetworks.com
      Switzerland (CH) agent-directory-sync.ch.apps.paloaltonetworks.com
      Spain (ES) agent-directory-sync.es.apps.paloaltonetworks.com
      Italy (IT) agent-directory-sync.it.apps.paloaltonetworks.com
      France (FR) agent-directory-sync.fr.apps.paloaltonetworks.com
      China (CN) agent-directory-sync.cn.apps.prismaaccess.cn (Region accessible only within specified region)
      Poland (PL) agent-directory-sync.pl.apps.paloaltonetworks.com
      Qatar (QA) agent-directory-sync.qa.apps.paloaltonetworks.com
      Taiwan (TW) agent-directory-sync.tw.apps.paloaltonetworks.com
      Israel (IL) agent-directory-sync.il.apps.paloaltonetworks.com
      Indonesia (ID) agent-directory-sync.id.apps.paloaltonetworks.com
      South Korea (KR) agent-directory-sync.kr.apps.paloaltonetworks.com
      Saudi Arabia (SA) agent-directory-sync.sa.apps.paloaltonetworks.com
    6. (Optional) Enter Proxy IP Server and Port if using a proxy.
    7. Configure LDAP Configuration: Screenshot of LDAP Configuration

      Screenshot showing the LDAP configuration settings for the CIE agent.

      1. Enter the Bind DN for the service account. Use dsquery user -name username on AD server to find it.
      2. Enter the Bind Password. It's saved encrypted.
      3. Select a Protocol: LDAP (389, unencrypted), LDAPS (636, encrypted, requires CA cert), or LDAP with STARTTLS (389, encrypted, requires CA cert).
      4. Verify Bind Timeout (default 30s).
      5. Verify Search Timeout (default 15s).
    8. Add your on-premises directory. Screenshot of Add Directory settings

      Screenshot showing the fields to add an on-premises directory to the CIE agent configuration.

      1. (Optional) Enter a Name.
      2. Enter the full Domain name. (Max 20 domains per agent).
      3. Enter the Network Address (IP or FQDN). Must be the original FQDN if used.
      4. (Optional) Enter Port (defaults: 636 LDAPS, 389 LDAP/STARTTLS). Gotcha!: Do NOT configure Global Catalog ports (3268/3269).
      5. (Required for OpenLDAP) Enter the Base DN (e.g., DC=example,DC=com ). Screenshot of OpenLDAP Base DN field

        Screenshot highlighting the required Base DN field for OpenLDAP configurations.

        OpenLDAP requires Base DN for searches.
      6. Select Type: OpenLDAP or Active Directory. OpenLDAP requires groupsOfUniqueNames objectClass. Use Common-Name as Primary Name for apps like GlobalProtect.
      7. (Optional) Test Connectivity to Directory.
      8. Click OK. Adding a directory triggers a full sync. Ensure agents/domains are active before adding a new one.
    9. Commit changes to restart the agent and apply the configuration.
    10. Verify sync status in the CIE app (Directories page).
    11. (Optional) Configure additional agents for High Availability (HA) by configuring multiple agents for the same domain in the same tenant. Configurations must be identical. CIE communicates with one agent at a time; agents don't communicate with each other.
    12. (Optional) Update the bind password using the command:
      CloudIdAgentCLI.exe ldap_bind_password:<password>
      Use escape characters for special characters.
    13. (Optional) Check log file CloudIdAgentCLIDebug.log for troubleshooting.
  5. Authenticate the Agent and the Cloud Identity Engine:
  6. CIE and the agent use mutual TLS authentication via a certificate. Generate a certificate in the CIE app and import it to the Local Computer store on the agent host. Certificates expire in 3 months; agent 1.5.0+ auto-renews.

    Critical Point: Each agent needs a UNIQUE certificate for its specific tenant. Do NOT reuse certificates across agents or tenants.

    1. Enter a unique Certificate Name (5-128 alphanumeric).
    2. Enter and re-enter a secure password (12-25 characters).
    3. Click Download Certificate. Screenshot of Download Certificate button

      Screenshot showing the Download Certificate button in the CIE app.

    4. Store the certificate in the Local Computer Personal certificate store on the agent host.

    After authentication, the agent provides directory attributes to CIE, which shares them with associated apps.

Cloud-Based Directory Configuration

For cloud-based directories like Azure Active Directory (Azure AD), you must grant CIE permission to access your directory during configuration. You do *not* need to install or configure a Cloud Identity agent for cloud-based directories.

Configure Azure AD, Okta, or Google Directory for communication with CIE. Grant necessary permissions.

Optionally use SCIM provisioning to customize collected attributes. For Azure AD, filtering groups instead of using SCIM can allow 5-minute updates vs. 40 minutes.

Configure Azure Active Directory

Allows CIE to collect attributes for policy enforcement and visibility. Can be configured via the CIE Enterprise App or Client Credential Flow.

Set Up Azure Directory

Requires Application Administrator or Cloud Application Administrator roles in Azure AD. Global Administrator is needed initially if using the CIE Enterprise App for setup.

CIE retrieves updates from Azure AD on a schedule (Users/Groups/Devices when CIE syncs, Apps every 3 hours max, Role Assignments every 24 hours max).

Granting permissions automatically onboards the CIE Enterprise App into Azure AD.

Configure Azure Using the CIE Enterprise App

  1. Copy the Directory (tenant) ID from the Azure admin portal Overview page. Screenshot of Azure Tenant ID

    Screenshot highlighting the Directory (tenant) ID in the Azure admin portal.

  2. Set up Azure directory in CIE: Directories > Add New Directory > Set Up Azure. Screenshot of Set Up Azure in CIE

    Screenshot showing the option to set up an Azure directory in the CIE app.

    Screenshot of Azure setup prompt

    Screenshot prompting to choose the Azure setup method.

  3. (Optional) Select additional information types to collect (User risk, Roles, Enterprise applications). Requires additional Azure permissions. Screenshot of additional Azure data options

    Screenshot showing optional data collection options for Azure AD integration.

    Screenshot of Collect Roles and Administrators option

    Screenshot showing the option to collect Roles and Administrators from Azure AD.

    Screenshot of Collect enterprise applications option

    Screenshot showing the option to collect enterprise applications data from Azure AD.

  4. Configure Azure directory information in CIE: Screenshot of Directory ID field

    Screenshot showing the field to enter the Azure Directory ID.

    1. Enter the Directory ID.
    2. Generate and Copy the CIE Enterprise App onboarding URL, open it in a new tab. Screenshot of Generate/Copy URL button

      Screenshot showing the "Generate URL" and "Copy" buttons for the CIE Enterprise App onboarding URL.

    3. Sign in to Azure via the URL using the Global Administrator account. Screenshot of Azure sign-in page

      Screenshot of the Azure sign-in page where administrator credentials are entered to grant permissions.

      Screenshot of Azure password page

      Screenshot of the Azure password entry page.

    4. Accept permissions. Screenshot of Azure permissions request

      Screenshot showing the request for permissions from the CIE Enterprise App in Azure, requiring administrator consent.

    5. Test Connection. Screenshot of Test Connection button

      Screenshot showing the "Test Connection" button in the CIE app to verify connectivity to Azure AD.

    6. (Optional) Enter a custom Directory Name. Screenshot of Customize Directory Name field

      Screenshot showing the optional field to customize the directory name displayed in CIE.

      Screenshot of CIE Azure Configuration Summary

      Screenshot showing a summary of the Azure AD configuration in the CIE app before submission.

  5. (Optional) Upload a .CSV file to filter groups. Screenshot of Upload CSV button

    Screenshot showing the "Upload CSV" button for filtering Azure AD groups.

    Screenshot of Upload CSV dialog

    Screenshot of the dialog for uploading a CSV file to filter Azure AD groups.

    1. Upload CSV.
    2. Drag/Browse for the file.
    3. Select Upload Type (Update or Replace Filters). Screenshot of Upload Type options

      Screenshot showing the options to update or replace existing group filters via CSV upload.

    4. Select Attribute Name (Name or Unique Identifier).
    5. Apply. Screenshot of Apply button for CSV filter

      Screenshot showing the "Apply" button to confirm the CSV filter settings.

  6. (Optional) Filter Azure Active Directory Groups by attribute (Name or Unique Identifier) using operators (begins with, is equal to). Screenshot of Filter Groups option

    Screenshot showing the option to filter Azure AD groups by attribute.

    Screenshot of Group Filter options

    Screenshot showing the attribute, operator, and value fields for configuring Azure AD group filters.

    Screenshot of Group Filter operators

    Screenshot showing the available operators for filtering Azure AD groups by name or identifier.

    Screenshot of Group Filter value field

    Screenshot showing the field to enter the value for Azure AD group filtering.

    1. Select attribute.
    2. Select filter method.
    3. Enter search query. Screenshot of Group Filter search query

      Screenshot showing the field for the group filter search query.

      Screenshot of Group Filter options with value

      Screenshot showing the configured group filter criteria.

    4. (Optional) Add OR/AND filters. Screenshot of Add OR/AND filters

      Screenshot showing the options to add multiple criteria using AND/OR logic for group filters.

      Screenshot of multiple group filters

      Screenshot showing multiple criteria configured for Azure AD group filtering.

  7. Submit changes.

Configure Azure Using the Client Credential Flow

Recommended alternative to Enterprise App flow, using a service account for more secure access without requiring user login for changes. Requires granting read-only permissions in Azure Portal beforehand.

  1. Activate CIE tenant if not done.
  2. Grant permissions in Azure Portal: Azure Active Directory > App Registrations > New registration. Screenshot of Azure App Registrations

    Screenshot showing the App Registrations section in the Azure Portal.

    1. Enter Name, Register. Screenshot of New Registration details

      Screenshot showing the New registration details page in Azure Portal.

    2. API permissions > Add a permission. Screenshot of API permissions

      Screenshot showing the API permissions section for an Azure app registration.

    3. Microsoft Graph > Application permissions. Screenshot of Microsoft Graph permissions

      Screenshot showing the options to select permissions from Microsoft Graph.

    4. Select required permissions: Device.Read.All, GroupMember.Read.All, User.Read.All, User.Read . Add permissions.
    5. Important Point: Minimum required permissions: Device.Read.All, GroupMember.Read.All, User.Read.All, User.Read (Delegated) . Alternatively, Directory.Read.All and Organization.Read.All can be used.

    6. Grant admin consent. Screenshot of Grant Admin Consent

      Screenshot showing the button to grant admin consent for the configured permissions in Azure.

    7. Confirm Yes. Screenshot of confirmation dialog

      Screenshot of the confirmation dialog for granting admin consent.

  3. Collect info from Azure Portal: Screenshot of Certificates & secrets

    Screenshot showing the Certificates & secrets section in Azure Portal.

    1. App Registrations > Select the created app.
    2. Certificates & secrets > New client secret. Screenshot of New client secret

      Screenshot showing the New client secret page in Azure Portal.

    3. Enter Description, Add. Screenshot of Add client secret

      Screenshot showing the field to enter the client secret description.

    4. Gotcha!: Keep track of the client secret expiration . Must configure a new one and update CIE when it expires.

    5. Copy the Value of the secret. Screenshot of client secret value

      Screenshot showing the generated client secret value. Copy this securely as it's shown only once.

    6. Overview > Copy Application (client) ID . Screenshot of Application (client) ID

      Screenshot highlighting the Application (client) ID in the Azure Portal overview.

    7. Copy Directory (tenant) ID . Screenshot of Directory (tenant) ID

      Screenshot highlighting the Directory (tenant) ID in the Azure Portal overview.

  4. Add Azure AD directory in CIE: Directories > Add New Directory > Set Up Azure. Screenshot of Set Up Azure in CIE

    Screenshot showing the option to set up an Azure directory in the CIE app.

  5. Select optional data collection (User risk, Roles, Enterprise applications).
  6. Enter Directory ID (Tenant ID) and Client ID (Application ID). Screenshot of Directory ID and Client ID fields

    Screenshot showing fields for Directory ID and Client ID in CIE Azure configuration.

  7. Test Connection. Screenshot of Test Connection button

    Screenshot showing the "Test Connection" button in the CIE app to verify connectivity to Azure AD using Client Credential Flow.

  8. (Optional) Customize Directory Name. Screenshot of Customize Directory Name field

    Screenshot showing the optional field to customize the Azure directory name in CIE.

  9. (Optional) Filter Azure AD Groups by attribute (Name or Unique Identifier). Screenshot of Filter Azure AD Groups option

    Screenshot showing the option to filter Azure AD groups by attribute.

    Screenshot of Group Filter options

    Screenshot showing attribute, operator, and value fields for filtering Azure AD groups.

    Screenshot of Group Filter search query

    Screenshot showing the search query field for Azure AD group filtering.

    Screenshot of multiple group filters

    Screenshot showing multiple criteria configured for Azure AD group filtering.

  10. Submit changes.

Configure Okta Directory

Integrates Okta Directory info for user/group attributes. Requires creating an OpenID Connect (OIDC) app, NOT a SAML app. Can use Auth Code Flow (requires login for changes) or Client Credential Flow (more secure, no login for changes).

CIE retrieves updates from Okta (Users/Groups/Devices when CIE syncs, Apps every 3 hours max).

Gotcha!: Do NOT use the default Okta group "Everyone" for policy rules.

Deploy Client Credential Flow for Okta (Recommended)

Uses a service account. Requires obtaining new Client ID/Secret. Need to add API Service Integrations in Okta.

  1. Download Okta integration app: Okta Admin Portal > Applications > API Service Integrations > Add Integration. Screenshot of API Service Integrations

    Screenshot showing the API Service Integrations section in Okta.

    Screenshot of Add Integration

    Screenshot showing the "Add Integration" button in Okta API Service Integrations.

  2. Install & Authorize integration: Select 'Palo Alto Networks Cloud Identity Engine' (or 'Application-enabled'). Screenshot of integration app selection

    Screenshot showing selection of the "Palo Alto Networks Cloud Identity Engine (Application-enabled)" integration app in Okta.

    Screenshot of non-application enabled integration

    Screenshot showing selection of the "Palo Alto Networks Cloud Identity Engine" integration app in Okta.

    Install & Authorize. Screenshot of Install & Authorize button

    Screenshot showing the "Install & Authorize" button for the Okta API service integration.

  3. Copy client secret (shown only once!) and client ID . Screenshot of client secret

    Screenshot showing the generated client secret in Okta. Copy this securely as it is shown only once.

  4. Copy Okta Domain (remove https:// ). Screenshot of Okta Domain and Client ID

    Screenshot highlighting the Okta Domain and Client ID for the API service integration.

  5. Activate CIE tenant if not done.
  6. Set up Cloud Directory > Okta. Screenshot of Set Up Okta

    Screenshot showing the option to set up an Okta directory in CIE.

  7. Select Client Credential Flow. Screenshot of Select Connection Flow

    Screenshot showing the option to select Client Credential Flow for Okta connection.

  8. Select Collect enterprise applications (if using that integration). Screenshot of Collect enterprise applications option

    Screenshot showing the option to collect enterprise applications data from Okta.

  9. Paste Domain, Client ID, Client Secret . Screenshot of Okta configuration fields

    Screenshot showing the fields to enter Okta domain, Client ID, and Client Secret in CIE for Client Credential Flow.

  10. Test Connection. Screenshot of Test Connection button

    Screenshot showing the "Test Connection" button for Okta configuration in CIE.

  11. (Optional) Customize Directory Name.
  12. Submit changes. Screenshot of Okta configuration summary

    Screenshot showing the summary of the Okta configuration in CIE before submission.

User Authentication with Identity Providers (SAML/OIDC)

Configure a profile for a SAML 2.0-compliant IdP (Google, Azure, Okta, PingOne, PingFederate) or OIDC in CIE. Configure an Authentication policy and Authentication Portal on the firewall. The firewall redirects authentication requests to CIE, which then reroutes them to the configured IdP. Successful login grants user access. CIE supports configuring multiple IdPs for flexibility and scalability.

Important Point: OIDC auth type supports Prisma Access Browser, NOT GlobalProtect or Authentication Portal.

Configure Google Directory (SAML)

Integrates Google Directory info. CIE does NOT support the ForceAuthn attribute for Google IdP.

  1. Prepare: Activate CIE, download SP Metadata from CIE (Auth > SP Metadata). Screenshot of Download SP Metadata

    Screenshot showing the "Download SP Metadata" button in CIE.

    Log in to Google Admin Console > Apps > SAML Apps > Add App > Add custom SAML app. Screenshot of SAML Apps in Google Admin

    Screenshot showing the SAML Apps section in the Google Admin console.

    Screenshot of Add Custom SAML app

    Screenshot showing the option to add a custom SAML app in Google Admin.

    Enter App name, Continue. Download IdP metadata, Continue. Screenshot of Download IdP metadata

    Screenshot showing the button to download IdP metadata in Google Admin.

    Copy SP metadata from CIE (Entity ID, ACS URL), enter in Google Admin (Entity ID, ACS URL), Continue. Table showing mapping of CIE SP Metadata to Google Admin fields

    Table showing how to map CIE SP Metadata fields to Google Admin SAML settings.

    Screenshot of Attribute Mapping in Google Admin

    Screenshot showing attribute mapping configuration in Google Admin for the custom SAML app.

    Add mapping for Google Directory attributes to App attributes, Finish. View details, turn ON for everyone, Save. Screenshot of Google App details

    Screenshot showing the app details page in Google Admin, including the option to turn on the app.

    Directory > Users > Specify users for Google auth. Screenshot of Users list in Google Admin

    Screenshot showing the users list in Google Admin.

  2. Add Google as auth type in CIE: Auth > Auth Types > Add New > Set Up SAML 2.0. Screenshot of Add New Authentication Type

    Screenshot showing the Add New Authentication Type button in CIE.

    Screenshot of Set Up SAML 2.0

    Screenshot showing the option to set up a SAML 2.0 authentication type in CIE.

    Enter Profile Name, select Google as IdP Vendor. Screenshot of Profile Name and IdP Vendor

    Screenshot showing fields for Profile Name and Identity Provider Vendor in CIE SAML configuration.

  3. Add Metadata: Manually (copy IdP ID, SSO URL, Certificate from Google, enter in CIE) or Upload Metadata File (download metadata from Google, upload in CIE) or Get URL (copy SSO URL from Google, paste in CIE, Get URL). Screenshot of manual metadata entry fields

    Screenshot showing fields for manual Identity Provider metadata entry in CIE.

    Screenshot of Upload Metadata option

    Screenshot showing the "Upload Metadata" option in CIE.

    Screenshot of Get URL option

    Screenshot showing the "Get URL" option for adding metadata in CIE.

    Screenshot of SSO URL in Google Admin

    Screenshot highlighting the SSO URL in Google Admin metadata.

    Screenshot of Get URL field in CIE

    Screenshot showing the field to paste the metadata URL in CIE using the "Get URL" method.

    Screenshot after getting URL metadata

    Screenshot showing CIE automatically populating IdP ID and SSO URL after successfully getting metadata from the URL.

  4. Select HTTP Binding for SSO Request.
  5. Specify Maximum Clock Skew (default 60s, range 1-900s).
  6. Enable Force Authentication (if required for GlobalProtect reconnect). Screenshot of Force Authentication option

    Screenshot showing the Force Authentication option in CIE SAML configuration.

  7. Test SAML setup. Screenshot of Test SAML setup button

    Screenshot showing the "Test SAML setup" button in CIE.

  8. Select SAML attributes ( Username, Usergroup, Access Domain, User Domain, Admin Role ), Submit. Screenshot of SAML attribute selection

    Screenshot showing fields to select SAML attributes (Username, Usergroup, etc.) in CIE.

Configure a SAML 2.0-Compliant IdP in the Cloud Identity Engine (Others)

For IdPs not listed as vendors, use the 'Others' option.

  1. Obtain IdP info: Copy IdP ID, Certificate, SSO URL from your IdP. Download SP Metadata from CIE (Auth > SP Metadata). Screenshot of Download SP Metadata

    Screenshot showing the "Download SP Metadata" button in CIE.

  2. Configure in CIE: Auth > Auth Types > Add New > Set Up SAML 2.0. Screenshot of Add New Authentication Type

    Screenshot showing the Add New Authentication Type button in CIE.

    Screenshot of Set Up SAML 2.0

    Screenshot showing the option to set up a SAML 2.0 authentication type in CIE.

    Enter Profile Name, select 'Others' as IdP Vendor. Screenshot of Profile Name and IdP Vendor

    Screenshot showing fields for Profile Name and Identity Provider Vendor set to 'Others' in CIE SAML configuration.

  3. Add Metadata: Manually (enter info from step 1.1), Upload File (upload metadata from IdP), or Get URL (paste metadata URL from IdP). Screenshot of Metadata Type options

    Screenshot showing the options for adding IdP metadata in CIE (Manual, Upload File, Get URL).

  4. Specify Maximum Clock Skew (default 60s).
  5. Enable Force Authentication (if required for GlobalProtect reconnect).
  6. Test SAML setup.
  7. Select SAML attributes ( Username, Usergroup, Access Domain, User Domain, Admin Role ), Submit. Screenshot of SAML attribute selection

    Screenshot showing fields to select SAML attributes (Username, Usergroup, etc.) in CIE.

User Authentication with a Client Certificate

Client certificates via a Certificate Authority (CA) chain can be configured in addition to or as an alternative to SAML 2.0 authentication.

Important Point: Client Certificate auth requires CA certificate installation on the agent host (for on-prem scenarios if agent is used) or devices accessing the portal.

Set Up an Authentication Profile

Configures how users authenticate with CIE (single or multiple auth types). Required for firewall authentication policy, optional for admin/GP/Prisma Access.

Important Point: For multiple authentication types or client certificates, a directory must be configured in CIE. Not required for a single SAML type.

  1. Authentication > Authentication Profiles > Add Authentication Profile. Screenshot of Add Authentication Profile button

    Screenshot showing the "Add Authentication Profile" button in CIE.

  2. Ensure authentication types are configured.
  3. Enter Profile Name.
  4. Select Authentication Mode (Single or Multiple). Screenshot of Authentication Mode

    Screenshot showing the Authentication Mode options (Single or Multiple) in CIE.

    If Single, select the authentication type. Screenshot of Select authentication type

    Screenshot showing the option to select a single authentication type.

  5. (Multiple Mode or Single Client Cert) Select Directory Sync Username Attribute and Group Attribute . Screenshot of Directory Sync Attributes

    Screenshot showing the Directory Sync Username and Group Attribute fields.

    Critical Point: Client Cert: Directory Sync Username Attribute MUST match Username Attribute in Client Cert config .

  6. (Multiple Mode) Define Authentication mapping order. Screenshot of Authentication mapping order

    Screenshot showing the Authentication mapping order configuration for multiple authentication types.

  7. Select Default authentication type. Screenshot of Default authentication type

    Screenshot showing the selection for the default authentication type.

    Important Point: Best practice is to assign an auth type per group.

  8. Choose directories and groups (select directory or All Directories). Screenshot of Choose directories and groups

    Screenshot showing the options to choose directories and groups for authentication profile mapping.

    Can search by Directory Sync Group Attribute. Screenshot of Directory Sync Group Attribute search

    Screenshot showing the search bar for Directory Sync Group Attributes.

  9. Select groups to authenticate. Screenshot of selecting groups

    Screenshot showing the list of groups to select for assigning authentication types.

  10. Select authentication type and Assign. Screenshot of Assign authentication type

    Screenshot showing the selection of an authentication type to assign to groups.

  11. Review assignments. Screenshot of reviewing assigned authentication types

    Screenshot showing the review of assigned authentication types by group/directory.

  12. Submit changes.

Configure Cloud Identity Engine Authentication on the Firewall or Panorama

Links the CIE authentication profile to the firewall/Panorama for enforcement (Authentication policy, admin auth, GlobalProtect, Prisma Access).

  1. Configure authentication profile on firewall/Panorama: Device > Authentication Profile > Add. On Panorama: Device > Auth Profile (for managed devices) or Panorama > Auth Profile (for Panorama admins). Screenshot of Authentication Profile on Firewall

    Screenshot showing the Authentication Profile configuration page on a Palo Alto Networks firewall.

    1. Enter Name.
    2. Select Type: Cloud Authentication Service .
    3. Select Region of CIE tenant.
    4. Select CIE Instance.
    5. Select Authentication Profile (from CIE).
    6. Specify Maximum Clock Skew (default 60s).
    7. Select Force multi-factor authentication in cloud (if applicable).
  2. (Required for authentication policy rule only) Configure Authentication Portal: Device > User Identification > Authentication Portal Settings > Edit. Select Auth Profile from step 1, set Mode to Redirect. OK.

    Important Point: Needed for Auth Policy rule (redirecting users to login page).

  3. (Required for authentication policy rule only) Create Authentication Enforcement object: Objects > Authentication > Add. Name, Authentication Method: web-form, Select Auth Profile from step 1. OK.
  4. Create a custom URL category for CIE traffic URLs: Add URLs from table below.
    show cloud-auth-service-regions
    CLI command shows URLs.
  5. Region Cloud Identity Engine Region-Based URL
    United States cloud-auth.us.apps.paloaltonetworks.com
    cloud-auth-service.us.apps.paloaltonetworks.com
    Europe cloud-auth.nl.apps.paloaltonetworks.com
    cloud-auth-service.nl.apps.paloaltonetworks.com
    United Kingdom cloud-auth.uk.apps.paloaltonetworks.com
    cloud-auth-service.uk.apps.paloaltonetworks.com
    Singapore cloud-auth.sg.apps.paloaltonetworks.com
    cloud-auth-service.sg.apps.paloaltonetworks.com
    Canada cloud-auth.ca.apps.paloaltonetworks.com
    cloud-auth-service.ca.apps.paloaltonetworks.com
    Japan cloud-auth.jp.apps.paloaltonetworks.com
    cloud-auth-service.jp.apps.paloaltonetworks.com
    Australia cloud-auth.au.apps.paloaltonetworks.com
    cloud-auth-service.au.apps.paloaltonetworks.com
    Germany cloud-auth.de.apps.paloaltonetworks.com
    cloud-auth-service.de.apps.paloaltonetworks.com
    United States - Government cloud-auth-service.gov.apps.paloaltonetworks.com
    cloud-auth.gov.apps.paloaltonetworks.com
    India cloud-auth-service.in.apps.paloaltonetworks.com
    cloud-auth.in.apps.paloaltonetworks.com
    Switzerland cloud-auth-service.ch.apps.paloaltonetworks.com
    cloud-auth.ch.apps.paloaltonetworks.com
    Spain cloud-auth-service.es.apps.paloaltonetworks.com
    cloud-auth-service.es.apps.paloaltonetworks.com
    Italy cloud-auth-service.it.apps.paloaltonetworks.com
    cloud-auth.it.apps.paloaltonetworks.com
    China cloud-auth-service.cn.apps.prismaaccess.cn
    cloud-auth.cn.apps.prismaaccess.cn (Region accessible only within specified region)
    Poland cloud-auth-service.pl.apps.paloaltonetworks.com
    cloud-auth.pl.apps.paloaltonetworks.com
    Qatar cloud-auth-service.qa.apps.paloaltonetworks.com
    cloud-auth.qa.apps.paloaltonetworks.com
    Taiwan cloud-auth-service.tw.apps.paloaltonetworks.com
    cloud-auth.tw.apps.paloaltonetworks.com
    Israel cloud-auth-service.il.apps.paloaltonetworks.com
    cloud-auth.il.apps.paloaltonetworks.com
    Indonesia cloud-auth-service.id.apps.paloaltonetworks.com
    cloud-auth.id.apps.paloaltonetworks.com
    South Korea cloud-auth-service.kr.apps.paloaltonetworks.com
    cloud-auth.kr.apps.paloaltonetworks.com
    Saudi Arabia cloud-auth-service.sa.apps.paloaltonetworks.com
    cloud-auth.sa.apps.paloaltonetworks.com
  6. Create internet management profile enabling response pages.
  7. (Required for authentication policy rule only) Configure Authentication policy rule using the Auth Enforcement object and allowing traffic to the custom URL category.
  8. (Panorama only) Configure CIE for Panorama: Device > User Identification > Cloud Identity Engine (for managed devices) or Panorama > User Identification > Cloud Identity Engine (for Panorama admins). Then Panorama > Setup > Management > Edit Auth Settings > Select CIE auth profile. Panorama > Device Groups > Add/Edit > Select CIE, Add tenant. OK.
  9. Commit changes. Verify firewall redirects authentication requests to Cloud Authentication Service by accessing a webpage requiring authentication on a client device. Enter credentials.

Configure Security Risk for the Cloud Identity Engine

Obtains risk info (user/device) from sources like Azure Identity Protection and SentinelOne to create dynamic risky groups for adaptive policy enforcement. Enables closed-loop automation (users/devices removed from risky group upon remediation).

Integrates with Azure Identity Protection (user risk) and SentinelOne EDR (device risk). Bidirectional integration with Prisma Access and SentinelOne for automated quarantine.

User Risk from Azure AD Identity Protection requires Client Credential Flow for Azure AD and specific Azure permissions ( IdentityRiskyUser.Read.All , IdentityRiskEvent.Read.All ).

  1. In CIE: Security Risk > Risk Sources > Add Risk Source. Screenshot of Add Risk Source button

    Screenshot showing the "Add Risk Source" button in the CIE Security Risk section.

  2. Select risk source type (Azure or SentinelOne). Can configure max one of each. Screenshot of Risk Source types

    Screenshot showing the available Risk Source types (Azure, SentinelOne) in CIE.

  3. Configure Azure risk source: Click Connect > Configure new Azure directory or select Existing Directory. Screenshot of Azure risk source configuration

    Screenshot showing the options to configure a new or select an existing Azure directory as a risk source.

  4. Configure SentinelOne risk source: Click Connect. (See next section).

Configure Azure for Security Risk in the Cloud Identity Engine

  1. View/Edit dynamic risky user groups: Security Risk > Cloud Dynamic Groups > Risky User Group tab. View details or search. Edit to add contexts/attributes. Remove group if needed. Screenshot of Risky User Groups

    Screenshot showing the list of Dynamic Risky User Groups in CIE.

    Screenshot of search bar for groups

    Screenshot showing the search bar for filtering dynamic groups.

    Screenshot of search type options

    Screenshot showing text and substring search type options for filtering groups.

    Screenshot of Edit option for group

    Screenshot showing the "Edit" option for a dynamic user group.

    Screenshot of Remove option for group

    Screenshot showing the "Remove" option for a dynamic user group.

  2. (Optional) Create new risky user group: Click Create New Risky User Group. Screenshot of Create New Risky User Group button

    Screenshot showing the "Create New Risky User Group" button.

    Select Category: Risky User. Screenshot of Risky User category selection

    Screenshot showing the selection of "Risky User" as the category for a dynamic group.

    Enter Common Name. Screenshot of Common Name field

    Screenshot showing the field to enter the Common Name for the dynamic risky user group.

    (Optional) Enter Email, Description. Screenshot of Group Email and Description

    Screenshot showing optional fields for Group Email and Description.

    Select context/attributes (e.g., risk level). Screenshot of context and attribute selection

    Screenshot showing the options to select context and attributes for the dynamic group criteria.

    (Optional) Add OR/AND criteria. Screenshot of Add OR/AND criteria

    Screenshot showing the options to add multiple criteria using AND/OR logic for dynamic group definition.

    Submit. Screenshot of Submit button

    Screenshot showing the Submit button to create the dynamic group.

  3. Verify user risk collection (locked user icon with green check). Screenshot of Collect User Risk status

    Screenshot indicating successful collection of user risk information from Azure AD Identity Protection.

Configure SentinelOne for Security Risk in the Cloud Identity Engine

  1. Collect SentinelOne info: Copy Endpoint URL (without /login). Screenshot of SentinelOne login URL

    Screenshot of the SentinelOne login URL, indicating to copy the part before '/login'.

    Log in to SentinelOne > Settings > Users > Service Users > Create New Service User. Screenshot of SentinelOne Service Users

    Screenshot showing the Service Users section in SentinelOne settings.

    Enter Name, Expiration Date, Next. Screenshot of Create New Service User details

    Screenshot showing fields to create a new service user in SentinelOne.

    Select Scope, Create User. Screenshot of Select Scope of Access

    Screenshot showing the option to select the scope of access for the SentinelOne service user.

    Enter 2FA code, Confirm. Screenshot of 2FA confirmation

    Screenshot of the 2-Factor Authentication confirmation prompt in SentinelOne.

    Copy API Token (shown only once!). Screenshot of SentinelOne API Token

    Screenshot showing the generated API Token in SentinelOne. Copy this securely as it is shown only once.

    (Optional) Verify Site creation. Screenshot of Site button

    Screenshot showing the "Site" button to verify the creation of a site in SentinelOne.

  2. Configure SentinelOne in CIE: Enter Source Name (lowercase). Screenshot of Source Name field

    Screenshot showing the field to enter the Source Name for SentinelOne configuration in CIE. Must be lowercase.

    Paste Endpoint URL (from step 1.1). Screenshot of Endpoint URL field

    Screenshot showing the field to paste the SentinelOne Endpoint URL in CIE.

    Paste API token as Authorization Method . Screenshot of Authorization Method field

    Screenshot showing the field to paste the API token for Authorization Method in CIE SentinelOne configuration.

    Test Connection. Screenshot of Test Connection button

    Screenshot showing the "Test Connection" button for SentinelOne configuration in CIE.

    Submit. Screenshot of Submit button

    Screenshot showing the Submit button for SentinelOne configuration in CIE.

  3. View/Edit dynamic risky endpoint groups: Security Risk > Cloud Dynamic Groups > Risky Endpoint Group tab. Screenshot of Risky Endpoint Groups

    Screenshot showing the list of Dynamic Risky Endpoint Groups in CIE.

    Search/Filter. Screenshot of search bar for groups

    Screenshot showing the search bar for filtering dynamic groups.

    Screenshot of search type options

    Screenshot showing text and substring search type options for filtering groups.

    Specify context/attributes by Editing. Screenshot of Edit option for group

    Screenshot showing the "Edit" option for a dynamic endpoint group.

    (Optional) Delete group. Screenshot of Remove option for group

    Screenshot showing the "Remove" option for a dynamic endpoint group.

    Gotcha!: Cannot create a new dynamic risky endpoint group if one already exists.

  4. Use Strata Cloud Manager to view quarantined devices: Manage > Configuration > NGFW and Prisma Access > Select Prisma Access scope. Screenshot of Configuration Scope in Strata Cloud Manager

    Screenshot showing the Configuration Scope selection in Strata Cloud Manager.

    Objects > Quarantined Device List. Screenshot of Quarantined Device List

    Screenshot showing the Quarantined Device List menu in Strata Cloud Manager.

    Review list for remediation. Screenshot of Quarantined Device List in Strata Cloud Manager

    Screenshot showing the list of quarantined devices in Strata Cloud Manager.

    Important Point: Do not manually remove devices from quarantine in Strata Cloud Manager/Panorama if quarantined by SentinelOne via CIE.

Configure Dynamic Privilege Access (DPA) in the Cloud Identity Engine

Allows isolating network resources per-project. Requires activation by Palo Alto Networks. DPA auth type is only for DPA; do not reuse for other auth types.

Gotcha!: Syncing new user groups for Azure SAML apps for DPA may take up to 3 hours. Wait for sync before assigning projects.

  1. Configure an authentication type in CIE (Currently supports Azure AD SAML). Use Dynamic service provider metadata . Screenshot of Dynamic service provider metadata

    Screenshot showing the selection of "Dynamic service provider metadata" for SAML configuration in CIE.

  2. Copy SP metadata (Entity ID, ACS URL) or download SP Metadata file from CIE. Import to IdP (Azure Portal). Screenshot of SP Metadata info in CIE

    Screenshot showing Entity ID, Assertion Consumer Service URL, and Download SP Metadata options in CIE SP Metadata.

  3. In IdP (Azure Portal), download CIE SAML application from gallery ('Palo Alto Networks Cloud Identity Engine - Cloud Authentication Service'). CIE SAML Gallery App icon

    Icon representing the Palo Alto Networks Cloud Identity Engine - Cloud Authentication Service gallery application in Azure.

    Create config, Set up single sign-on > SAML. Screenshot of Azure SAML setup

    Screenshot showing the "Set up single sign-on" section in the Azure app configuration.

  4. Configure SAML app in IdP: Either paste Entity ID/ACS URL, enter regional Sign on URL ( https://<RegionUrl>.paloaltonetworks.com/sp/acs ), Save, Copy App Federation Metadata URL. OR Upload SP metadata file, Edit Basic SAML config, enter regional Sign on URL, Save, Copy App Federation Metadata URL.
  5. Assign your account (and others) to the application in IdP. Save.
  6. Continue IdP config in CIE: Enter App Federation Metadata URL (from IdP) as Identity Provider Metadata URL in CIE, Click Get URL. Screenshot of IdP Metadata URL field

    Screenshot showing the field to paste the IdP Metadata URL in CIE.

    This Get URL step is mandatory.
  7. Configure SAML attributes ( Username Attribute is critical , use /identity/claims/name: format for Azure). Screenshot of SAML attribute selection

    Screenshot showing fields to select SAML attributes (Username, Usergroup, etc.) in CIE.

  8. Collect enterprise applications data from Azure directory if not already done. Submit update. This step is mandatory for DPA config.
  9. Enable Dynamic Privilege Access in the CIE authentication profile. Click Detect Directory and SAML. Submit. Screenshot of Enable Dynamic Privilege Access option

    Screenshot showing the "Enable Dynamic Privilege Access" checkbox and "Detect Directory and SAML" button in CIE authentication profile.

  10. Configure an authentication profile in CIE using the DPA authentication type.

Cloud Identity Engine User Context

Provides granular control over data sharing (mappings, quarantine lists) across security devices. Requires PAN-OS 11.0+ . Centralizes visibility, increases scalability for VDI users.

User Context shares IP-to-username mappings, IP-port mappings (TS agent), user tags, IP tags, Host IDs, and quarantine lists via segments .

Firewalls/Panorama can share multiple data types to one segment, but each data type from a single firewall/Panorama can only go to *one* segment. A firewall/Panorama can receive data from up to 100 segments.

Important Point: If a firewall is a User-ID hub, configure it as a subscriber in the segment to ensure all VSYS have access to both local and Cloud Service data.

  1. Onboard CIE instance (activate, claim license, select CSP/tenant/region). Screenshot of MSP Cloud Management

    Screenshot showing the "MSP Cloud Management" screen during CIE onboarding.

    Screenshot of Continue button

    Screenshot showing the "Continue" button during the onboarding process.

    Screenshot of Claim License

    Screenshot showing the "Claim" license step during CIE onboarding.

    Screenshot of Select Customer Support Account

    Screenshot showing the selection of the Customer Support Account during CIE onboarding.

    Screenshot of Select Parent Tenant

    Screenshot showing the selection of the Parent Tenant during CIE onboarding.

    Screenshot of Claim and continue

    Screenshot showing the "Claim and continue" button to proceed with onboarding.

    Screenshot of Add Licensed Product

    Screenshot showing the "Add Licensed Product" button to add the CIE license.

    Screenshot of Select contract

    Screenshot showing the selection of the contract during CIE onboarding.

    Screenshot of Select Region

    Screenshot showing the selection of the Region for the CIE instance during onboarding.

    Screenshot of Activate Now

    Screenshot showing the "Activate Now" button to complete the CIE onboarding.

    Verify status is Complete. Screenshot of CIE status Complete

    Screenshot showing the CIE status as "Complete" after successful onboarding.

    Device Associations > Add Device. Screenshot of Device Associations

    Screenshot showing the Device Associations menu in CIE.

    Screenshot of Add Device button

    Screenshot showing the "Add Device" button in Device Associations.

    Select CSP, enter firewall serial number, Select firewall, Save. Associate Apps > Select firewall > Select Cloud Identity Engine > Save. Screenshot of Associate Apps

    Screenshot showing the "Associate Apps" menu in Device Associations.

  2. In CIE, User Context > Segments > Activate sharing for mappings. Screenshot of Activate sharing for mappings

    Screenshot showing the option to activate sharing for mappings in CIE User Context Segments.

  3. Configure default segment as publishing: Firewalls tab > select firewalls > Assign Segments (only PAN-OS 11.0+). Screenshot of Firewalls tab

    Screenshot showing the Firewalls tab in CIE User Context Segments.

    Screenshot of Assign Segments

    Screenshot showing the "Assign Segments" button.

    (Optional) Add Firewalls. For each Data Type (IP User, IP Tag, User Tag, Quarantine List, IP Port), select Segment to publish to. Screenshot of Data Type publishing

    Screenshot showing the options to select which segment each Data Type is published to.

    Important Point: Each data type can be published to ONLY ONE segment per firewall .

    Review Changes > Save. Screenshot of Review Changes

    Screenshot showing the "Review Changes" button for segment configuration.

    Screenshot of Save button

    Screenshot showing the Save button after reviewing changes.

    Screenshot of Save confirmation

    Screenshot showing the confirmation message after saving segment changes.

  4. Create a subscribed segment: User Context > Segments > Add New Segment. Name, Description. Add New Segment. Screenshot of Add New Segment button

    Screenshot showing the "Add New Segment" button.

    Segments tab > Add segments to receive data from. Screenshot of Segments tab

    Screenshot showing the Segments tab within a segment configuration.

    Screenshot of Add Segments button

    Screenshot showing the "Add Segments" button to subscribe to other segments.

  5. (Optional) Edit segments: Enable/Disable data types for sharing. Delete segments. Screenshot of Enable/Disable sharing

    Screenshot showing options to enable or disable sharing of specific data types within a segment.

    Screenshot of Delete Segment

    Screenshot showing the option to delete a segment.

  6. Save configuration.
  7. On firewall, enable User Context Cloud Service: Device > Management > Setup > PAN-OS Edge Service Settings > Edit. Ensure device certificate is configured. Enable User Context Cloud Service . OK. Screenshot of PAN-OS Edge Service Settings

    Screenshot showing the PAN-OS Edge Service Settings where User Context Cloud Service is enabled.

    Screenshot of Enable User Context Cloud Service

    Screenshot highlighting the "Enable User Context Cloud Service" checkbox.

  8. Commit changes on firewall.
  9. Verify User Context Status on firewall is active. View mappings/tags in CIE app: User Context > Mappings & Tags. Screenshot of User Context Status

    Screenshot showing the User Context Cloud Service Connection Status on the firewall.

    Screenshot of Mappings & Tags

    Screenshot showing the Mappings & Tags section in the CIE app to view collected data.

Can now use segments for user/group-based policy, authentication profiles, etc.

Configure Third-Party Device-ID

Leverage third-party IoT detection (verdicts) for Device-ID in Prisma Access. Third-Party service sends verdicts via API to CIE, which provides mappings to Prisma Access SPNs for device visibility and policy enforcement.

Third-Party Device-ID Architecture Diagram

Diagram illustrating the flow of device verdicts from a third-party IoT solution, through the Third-Party Device-ID service and CIE, to Prisma Access SPNs.

Important Point: Obtain a certificate signing request (CSR) and its key for each third-party vendor from your network administrator before starting.

  1. Activate Third-Party Device-ID in CIE: Hub > CIE > select tenant > User Context > Third-Party Device-ID. Screenshot of Third-Party Device-ID

    Screenshot showing the Third-Party Device-ID section in CIE User Context.

    Select Location (region - cannot change later). Screenshot of Location selection

    Screenshot showing the selection of the Location (region) for Third-Party Device-ID.

    Add New Management System. Screenshot of Add New Management System button

    Screenshot showing the "Add New Management System" button.

  2. Upload CSR: Enter Configuration Name (e.g., vendor). Screenshot of Configuration Name

    Screenshot showing the field for Configuration Name when adding a management system.

    Browse/drag CSR file. Screenshot of Upload CSR

    Screenshot showing the area to upload the Certificate Signing Request (CSR) file.

    Gotcha!: Can only upload CSR once per config. New CSR needed for updates.

  3. Obtain signed cert/API key: Sign CSR and Export (downloads signed cert). Screenshot of Sign CSR and Export

    Screenshot showing the "Sign CSR and Export" button.

    Generate New API Key. Screenshot of Generate New API Key

    Screenshot showing the "Generate New API Key" button.

    Copy API Key. Import signed cert and API key to third-party management system. Configure IoT solution to use them. Screenshot of API Key copy

    Screenshot showing the API Key displayed in CIE for copying.

    Critical Point: Store signed cert and API key securely. Each vendor config needs UNIQUE cert and API key.

  4. Review config info. Screenshot of Management System config review

    Screenshot showing the review page for the Third-Party Device-ID management system configuration.

  5. After using API commands on third-party side, view Mappings in CIE to see IP-to-device mappings. Screenshot of Mappings tab

    Screenshot showing the Mappings tab in CIE Third-Party Device-ID to view collected IP-to-device mappings.

  6. View Management Systems for details. Screenshot of Management Systems tab

    Screenshot showing the Management Systems tab in CIE Third-Party Device-ID.

  7. (Optional) Edit config (cannot change name). Screenshot of Edit action

    Screenshot showing the "Edit" action for a management system configuration.

    Screenshot of Edit Management System dialog

    Screenshot of the dialog to edit the management system configuration.

  8. (Optional) Remove config: Actions > Remove > Yes. Screenshot of Remove action

    Screenshot showing the "Remove" action for a management system configuration.

    Screenshot of Remove confirmation

    Screenshot of the confirmation dialog for removing a management system configuration.

Can now use APIs for management and Device-ID features (Device Dictionary).

Manage the Cloud Identity Agent

How to manage the agent post-installation (logs, update, certificates, start/stop).

Configure Cloud Identity Agent Logs

Logs CIE events on the agent host for monitoring/troubleshooting. Logs include timezone info in UTC.

  1. Launch agent.
  2. File > Debug.
  3. Select log level (None, Information, Warning, Error, Debug, Verbose). Higher levels include lower levels. Debug/Verbose store data permanently until deleted.

Search Cloud Identity Agent Logs

Important Point: Search terms are case-sensitive .

  1. From agent UI, Monitoring.
  2. Enter search terms.
  3. Click Search. Results highlighted blue. Screenshot of Agent Log Search

    Screenshot showing the search function in the Cloud Identity Agent monitoring interface.

Clear Cloud Identity Agent Logs

Clears logs from the agent UI (does not delete from CloudIdAgentDebug log file).

  1. From agent UI, Monitoring.
  2. Click Clear Log.

Update the Cloud Identity Agent

Important Point: Using the latest version is strongly recommended.

Agent 1.7.0+ backs up configuration before removing old version and restores it upon new installation.

  1. Stop agent connection to CIE service. Verify status is Offline in CIE app.
  2. Uninstall outdated agent: Start > Control Panel > Programs and Features > Cloud Identity Agent > Uninstall .
  3. Log in to hub, select CIE app.
  4. Select CIE tenant > Agents & Certificates.
  5. Click Download New Agent, Install the new agent. Screenshot of Download New Agent button

    Screenshot showing the "Download New Agent" button in the CIE app.

Start or Stop the Connection to the Cloud Identity Engine

Controls agent-CIE synchronization.

  1. On agent host, launch agent, select Cloud Identity Configuration. Connection status shown lower-left. Screenshot of Agent Connection Status

    Screenshot showing the Cloud Identity Agent configuration window, highlighting the connection status.

  2. Click Start (to connect) or Stop (to disconnect). Screenshot of Start button

    Screenshot showing the "Start" button to connect the agent to CIE.

    Screenshot of Stop button

    Screenshot showing the "Stop" button to disconnect the agent from CIE.

Remove the Cloud Identity Agent

  1. Stop agent connection to CIE. Agent status must be Offline.
  2. Uninstall agent from host: Start > Control Panel > Programs and Features > Cloud Identity Agent > Uninstall .
  3. Log in to hub, select CIE tenant.
  4. Agents & Certificates.
  5. Confirm agent Status is Offline, Remove Agent (button available only if Offline). Screenshot of Remove Agent button

    Screenshot showing the "Remove Agent" button in the CIE app (available only when the agent is offline).

Manage Cloud Identity Engine Certificates

View certificate info on Agents & Certificates page. Agent 1.5.0+ auto-renews. To replace a compromised certificate, Revoke, Delete Obsolete, Generate New, Install.

  1. Revoke certificate (if compromised) in CIE app: Hub > CIE > select tenant > Agents & Certificates > Revoke.
  2. Delete Obsolete certificates from agent host: MMC > Add/Remove Snap-In > Certificates > Computer Account > Local Computer > Finish. OK. Navigate to Console Root\Certificates (Local Computer)\Personal\Certificates. Select old cert, Right-click > Delete. Confirm. Screenshot of Add or Remove Snap-ins

    Screenshot of the "Add or Remove Snap-ins" window in Microsoft Management Console (MMC).

    Screenshot of Certificates snap-in

    Screenshot selecting the Certificates snap-in in MMC.

    Screenshot of Computer account option

    Screenshot selecting the "Computer account" option for the Certificates snap-in scope.

    Screenshot of Local Computer option

    Screenshot selecting the "Local computer" option for the Certificates snap-in scope.

    Screenshot of Certificates store

    Screenshot showing the path to the Personal Certificates store in MMC.

  3. Generate New certificate in CIE app > Install on agent host. Screenshot of Get New Certificate button

    Screenshot showing the "Get New Certificate" button in the CIE app.

Manage the Cloud Identity Engine App

Features for managing tenants, attributes, viewing data, and configuring User Context, Dynamic Groups, and Third-Party Device-ID.

Cloud Identity Engine Tenants

One tenant created upon activation. Can create multiple tenants per region to isolate data or serve different apps. Each tenant can collect from multiple directories of different types.

Synchronize Cloud Identity Engine Tenants

Methods: Full sync (complete directory sync) or Sync Changes (incremental sync - not for Google). Default is incremental sync every 5 min (not Google) and weekly full sync (not Google). Google sync is based on selected interval.

Synchronize All Attributes (Full Sync)

Important Point: Recommended for troubleshooting or loss of connectivity. All agents/domains must be active for On-Prem AD full sync.

  1. Log in to hub > CIE app.
  2. Select directory > Directories.
  3. Select Actions > Full Sync. Screenshot of Full Sync action

    Screenshot showing the "Full Sync" action for a directory in the CIE app.

    Screenshot of Full Sync confirmation

    Screenshot showing the confirmation message when a full sync is initiated.

  4. Gotcha!: Click Full Sync only ONCE. Wait at least 90 seconds between full syncs.

  5. Verify Sync Status is Success.

Synchronize Directory Changes (Incremental Sync)

Faster than full sync. Default for most directories every 5 min (not Google). Sync Status may show Success while in progress.

Gotcha!: Not available for Google Directory.

  1. Configure a directory.
  2. After changes, select Actions > Sync Changes. Screenshot of Sync Changes action

    Screenshot showing the "Sync Changes" action for a directory in the CIE app.

    Screenshot of Sync Changes confirmation

    Screenshot showing the confirmation message when an incremental sync is initiated.

Set Synchronization Interval (Google Directory only)

  1. Log in to hub > CIE app > select tenant > Directories.
  2. Click "Sync Every:" for the directory type > select interval (6, 12, 24 hours). Screenshot of Synchronization Interval options

    Screenshot showing the dropdown to set the synchronization interval for a directory.

Synchronize CDUG Changes (Google Directory only)

  1. Log in to hub > CIE app > select tenant > Directories.
  2. Sync CDUG Changes. Screenshot of Sync CDUG Changes button

    Screenshot showing the "Sync CDUG Changes" button for Google Directory.

  3. Verify Sync Status is Success.

Delete Cloud Identity Engine Tenants

Critical Point: Cannot delete a tenant if another application is using it.

  1. (On-Prem AD only) Stop agent connection, Remove agent.
  2. Log in to hub > Common Services > Tenant Management.
  3. Select tenant > Delete Tenant. Screenshot of Delete Tenant action

    Screenshot showing the "Delete Tenant" action in Tenant Management.

  4. Confirm deletion. Screenshot of delete confirmation

    Screenshot of the confirmation dialog for tenant deletion.

Delete Domains or Directories from Cloud Identity Engine Tenants

Procedure varies by directory type.

Delete Active Directory Domains (On-Prem)

  1. Launch agent > LDAP Configuration.
  2. Select domain from Servers list > Delete. Screenshot of Delete Domain in Agent

    Screenshot showing how to delete a domain from the Cloud Identity Agent configuration.

  3. Commit changes in agent.

    Critical Point: Must delete domain from agent config BEFORE deleting from CIE app, or it will be re-added.

  4. Log in to hub > CIE app > select tenant > Directory.
  5. Remove domain > Confirm deletion. Screenshot of Remove Domain in CIE app

    Screenshot showing the "Remove" action for a domain in the CIE app Directory section.

Delete Cloud-Based Directories

  1. Log in to hub > CIE app > select tenant > Directory.
  2. Select Actions > Remove. Screenshot of Remove Directory in CIE app

    Screenshot showing the "Remove" action for a cloud-based directory in the CIE app Directory section.

  3. Click Yes to confirm. Screenshot of delete confirmation

    Screenshot of the confirmation dialog for cloud-based directory deletion.

Cloud Identity Engine Attributes

CIE collects attributes (unique identifiers like Distinguished Name) for users, computers, groups, containers, OUs. Default formats are listed. Custom attributes must be specified in CIE.

Critical Point: Verify attributes are valid before sync. Invalid attributes cause initial sync failure.

Default attribute mappings are provided for various directory types (On-Prem AD, Azure AD, SCIM, Okta, Google, On-Prem OpenLDAP).

Collect Custom Attributes with the Cloud Identity Engine

Specify custom attributes in your directory if they don't use default formats.

  1. Log in to hub > select CIE tenant > Attributes.
  2. Select the directory type with custom attribute.
  3. Select the custom attribute row (field becomes editable). Screenshot of custom attribute field

    Screenshot showing a custom attribute field becoming editable in the CIE Attributes section.

  4. Enter the new value, confirm (checkmark). Screenshot of custom attribute with changes

    Screenshot showing a modified custom attribute row with a green triangle indicating changes.

Gotcha!: Custom attributes cannot begin with an underscore (_).

Option to Restore Default attribute value.

View Directory Data

View collected data (users, computers, groups, etc.) from your directory in the CIE app (Directories page > click number in object column). Search data (case-insensitive), view details (incl. flattened group members/user groups - max 2000 displayed), view raw data, copy details.

Screenshot of Directory Data counts

Screenshot showing directory data counts (Users, Computers, Groups, etc.) on the CIE Directories page.

Screenshot of Directory Data page

Screenshot showing the Directory Data page displaying a list of objects.

Screenshot of Directory Data search

Screenshot showing the search bar on the Directory Data page.

Screenshot of Text search option

Screenshot highlighting the "Text search" option for filtering data.

Screenshot of Substring match option

Screenshot highlighting the "Substring match" option for filtering data.

Screenshot of pagination

Screenshot showing pagination controls and rows per page selection on the Directory Data page.

Details icon

Icon representing the "Details" button to view object attributes.

Screenshot of object details

Screenshot showing detailed attributes for a selected object (user or group).

Screenshot of View Raw Data

Screenshot showing the "View Raw Data" button to view all attributes for an object.

Copy icon

Icon representing the "Copy" function.

Screenshot of Direct/Nested toggle

Screenshot showing the toggle to switch between "Direct" and "Direct and Nested" views for group/user relationships.

Note on nested groups

Note indicating that nested group information is not available for attribute-based Cloud Dynamic User Groups.

Screenshot of Apply Search button

Screenshot showing the "Apply Search" button for filtering data within object details.

Screenshot of Go Back to Directory button

Screenshot showing the "Go Back to Directory" button to return to the main Directory page.

Create a Cloud Dynamic User Group (CDUG)

Provides adaptable, granular group membership based on specified criteria/attributes, updating automatically. Can be Attribute Based or On Demand Assignment (static).

Important Point: If using CDUG for Authentication Profile (SAML), users MUST be added to the SAML app in the IdP (Azure Portal).

Can use Azure AD Identity Protection risk info for risk-based CDUGs (requires Client Credential Flow and specific Azure permissions).

  1. Configure directory (On-Prem or Cloud). (Azure AD User Risk only) Select Collect user risk information. Screenshot of Collect user risk information option

    Screenshot showing the checkbox to collect user risk information from Azure AD.

    Sync groups.
  2. In CIE app: Directories > click number in Groups column. Screenshot of Groups count link

    Screenshot showing the clickable count in the "Groups" column on the Directories page.

  3. On Directory Data page, click Create New Dynamic User Group. Screenshot of Create New Dynamic User Group button

    Screenshot showing the "Create New Dynamic User Group" button on the Directory Data page.

  4. Select Category (Attribute Based or On Demand Assignment). Screenshot of Category selection

    Screenshot showing the selection of the dynamic group category (Attribute Based or On Demand Assignment).

  5. Enter Common Name (auto-generates Distinguished Name with _cdug suffix). Screenshot of Common Name field

    Screenshot showing the field for entering the Common Name for the dynamic group.

  6. (Optional) Enter Group Email. Screenshot of Group Email field

    Screenshot showing the optional field for Group Email.

  7. (Optional) Enter Description. Screenshot of Description field

    Screenshot showing the optional field for Description.

  8. Define criteria (Attribute Based) or add users (On Demand Assignment).
    1. (Attribute Based) Select Any/All criteria match. Screenshot of Any/All criteria match

      Screenshot showing the option to require members to match "Any" or "All" selected criteria.

    2. (Attribute Based) Select context/attribute. Screenshot of Select context or attribute

      Screenshot showing the dialog to select context or attributes for dynamic group criteria.

      Screenshot of selected context/attribute

      Screenshot showing a selected context/attribute in the dynamic group criteria.

    3. (Attribute Based) Select operator (is equal to, is equal to ANY of the following, is not equal to, contains, starts with). Screenshot of Select operator

      Screenshot showing the operator selection dropdown for dynamic group criteria.

    4. (Attribute Based) Select/Enter value(s). Screenshot of Select value

      Screenshot showing the selection or entry of a value for the dynamic group criteria.

    5. (Optional, Attribute Based) Add OR/AND criteria. Screenshot of Add OR/AND options

      Screenshot showing the options to add additional criteria using OR/AND logic.

    6. (On Demand Assignment) Add Users. Screenshot of Add Users button

      Screenshot showing the "Add Users" button for On Demand Assignment groups.

    7. (On Demand Assignment) Select users, Add. Screenshot of Select Users dialog

      Screenshot showing the dialog to select users for an On Demand Assignment group.

      Search/Filter users. Screenshot of search/filter for users

      Screenshot showing the search and filter options for selecting users.

  9. (Optional) Delete context/attribute from group definition. Screenshot of Delete criteria

    Screenshot showing the delete icon for a dynamic group criteria row.

  10. (Optional) Remove user from On Demand Assignment group. Select checkbox > Remove User > Continue. Screenshot of Remove User button

    Screenshot showing the "Remove User" button for On Demand Assignment groups.

  11. Submit to create CDUG. Screenshot of Submit button

    Screenshot showing the Submit button to create the Cloud Dynamic User Group.

    Can now use CDUG for group-based Security policy.
  12. (Azure AD User Risk only) Verify Collect User Risk is active (locked user icon + green check). Screenshot of Collect User Risk status

    Screenshot indicating successful collection of user risk information from Azure AD Identity Protection.

  13. Remove CDUG: Ellipses > Remove. Screenshot of Remove CDUG action

    Screenshot showing the "Remove" action for a Cloud Dynamic User Group.

PCNSE / PCNSA Focus

Key Concepts for Exams:

  • CIE's core function: Centralized User-ID and Authentication (know the difference).
  • Deployment types: On-Prem (agent needed), Cloud (no agent) .
  • Agent requirements: Windows server, dedicated host (not User-ID/TS agent same port), TLS versions (recommend 1.3) .
  • Authentication methods supported: SAML 2.0 (various IdPs), Client Certificates, OIDC (Prisma Access Browser) .
  • CIE integration points: Firewalls (User-ID source, Auth Portal), Panorama, Prisma Access, Cortex XDR, Third-Party IoT .
  • Visibility Scope: TSG vs CSP and their impact on firewall visibility.
  • Dynamic User Groups: Attribute-based vs On Demand Assignment, use cases (risk-based policy) .
  • SCIM Connector: Purpose (customize attributes), supported clients, requirements (unique group names for Azure AD) .
  • User Context (PAN-OS 11.0+): Purpose (granular data sharing), segments (publishing/subscribed), data types shared .
  • Agent management: Log levels, update process, certificate management (auto-renewal, manual revoke/delete).

Gotchas & Critical Points Recap:

  • Do NOT install CIE agent on the same host/port as User-ID or TS agent.
  • Do NOT use Global Catalog ports (3268/3269) for On-Prem AD configuration on the agent.
  • Avoid configuring/initial sync during CRL reload time.
  • Manual removal of circular references in Azure AD is strongly recommended for correct group membership.
  • Each Cloud Identity agent needs a UNIQUE certificate for its specific tenant.
  • Client Credential Flow requires prior permission granting in Azure/Okta. Client secrets have expiration dates and must be renewed.
  • Custom Azure SAML DPA username attribute MUST be /identity/claims/name: format.
  • User groups for Azure SAML DPA may take up to 3 hours to sync initially.
  • Cannot manually remove devices from quarantine (via Strata Cloud Manager/Panorama) if they were quarantined by SentinelOne via CIE.
  • Custom attributes cannot begin with an underscore (_).
  • SCIM directory sync requires unique group names for the displayName attribute in Azure AD.
  • Cannot create a new dynamic risky endpoint group if one already exists.
  • Cannot delete a tenant if another application is using it.
  • Must delete domain from agent config BEFORE deleting from CIE app.

Important Points Recap:

  • Recommend TLS 1.3 for all CIE traffic.
  • Assigning multiple roles can grant broader privileges (potentially Superuser).
  • Associate Panorama with CIE if managing Prisma Access in the same TSG, especially with TSG scope.
  • OpenLDAP requires specific attributes and group objectClass (groupsOfUniqueNames).
  • Client Certificate auth requires CA certificate installation on the agent host.
  • OIDC auth type supports Prisma Access Browser, NOT GlobalProtect or Authentication Portal.
  • SCIM gallery app doesn't support userType attribute.
  • SCIM filtering for Azure AD allows faster updates (5min vs 40min for native SCIM).
  • Azure AD User Risk requires specific permissions for collection.
  • SentinelOne integration provides device security posture and risk.
  • Cloud Identity Agent log levels impact permanent data storage.
  • Cloud Identity Agent log search is case-sensitive.
  • CIE agent update requires stopping the service and uninstalling the old version.
  • User-ID source configuration on firewall/Panorama retrieves info based on device certificate and service route.
  • Firewall collects attributes ONLY for users/groups used in security policy rules from CIE.
  • Maximum Clock Skew default is 60s for SAML.
  • User Context requires PAN-OS 11.0+. Each data type on a firewall/Panorama can only be shared to ONE segment.
  • Obtain CSR and key for Third-Party Device-ID setup.

Mermaid Diagrams

Mermaid Sequence Diagram: On-Prem AD Sync

sequenceDiagram
    participant Agent as Cloud Identity Agent
    participant OnPremAD as On-Premises Active Directory
    participant CIE as Cloud Identity Engine
    participant Firewall as Palo Alto Networks Firewall
    participant Panorama as Palo Alto Networks Panorama
    participant CloudApps as PN Cloud Apps (e.g. Cortex XDR)

    Agent->>OnPremAD: Query Directory Attributes (LDAP/LDAPS)
    activate OnPremAD
    OnPremAD-->>Agent: Return User, Group, Computer Attributes
    deactivate OnPremAD
    Agent->>CIE: Send Attributes (TLS)
    activate CIE
    CIE-->>Agent: Acknowledge Receipt
    deactivate Agent
    CIE->>CloudApps: Provide User/Group/Attribute Data
    activate CloudApps
    CloudApps-->>CIE: Acknowledge Data (Optional)
    deactivate CloudApps
    CIE->>Firewall: Provide User Mapping/Group Mapping/Attributes (via User-ID Source Profile)
    activate Firewall
    Firewall-->>CIE: Acknowledge Data
    deactivate Firewall
    opt If Firewall Managed by Panorama
        CIE->>Panorama: Provide User Mapping/Group Mapping/Attributes (via User-ID Source Profile)
        activate Panorama
        Panorama-->>CIE: Acknowledge Data
        deactivate Panorama
        Panorama->>Firewall: Push Configuration/Policies using User/Group Data
    end

    Note over CIE: Performs Initial Sync & Incremental Syncs
    

Mermaid Sequence Diagram illustrating the data flow for synchronizing user and group attributes from an On-Premises Active Directory to the Cloud Identity Engine and then to Palo Alto Networks Firewalls and Cloud Apps.

Mermaid Graph: CIE Architecture Overview

graph TD
    A[User/Device] --> B{Access Request}
    B --> C[Firewall/Panorama]
    C --> D{Authentication?}
    D -- Yes --> E[Cloud Authentication Service (CAS) via CIE]
    E --> F{IdP or Client Cert?}
    F -- IdP --> G[External SAML/OIDC Provider]
    F -- Client Cert --> H[CIE CA Chain Validation]
    G --> E
    H --> E
    E --> C
    D -- No / User-ID --> I[Cloud Directory Sync (CDS) via CIE]
    I --> J{Directory Type?}
    J -- On-Prem AD/LDAP --> K[Cloud Identity Agent]
    K --> L[On-Prem Directory]
    J -- Cloud AD/Okta/Google --> M[Cloud Directory API]
    M --> N[Cloud Directory]
    K --> I
    M --> I
    N --> M
    L --> K
    I --> C
    subgraph Security Risk
        O[Azure Identity Protection] --> P[CIE Security Risk]
        Q[SentinelOne EDR] --> P
        P --> I
        P --> C(via User Context Segments)
    end
    subgraph Identity Mapping Sources
        R[Cloud Providers (AWS/Azure/GCP)] --> S[CIE IP Tag Collection]
        T[3rd Party IoT Solution] --> U[CIE 3rd Party Device-ID]
        V[Local User-ID Agent] --> W[Firewall]
        W --> C(via User Context Segments)
        S --> I
        U --> I
        S --> C(via User Context Segments)
        U --> C(via User Context Segments)
    end

    C --> X[PN Cloud Apps (e.g. Cortex XDR)]
    I --> X
    P --> X
    S --> X
    U --> X


    style E fill:#f9f,stroke:#333
    style I fill:#ccf,stroke:#333
    style P fill:#e0e0ff,stroke:#333
    style S fill:#cfe2f3,stroke:#333
    style U fill:#f9f3cf,stroke:#333
    style W fill:#d0f0c0,stroke:#333
    style C fill:#d0f0c0,stroke:#333
    style X fill:#c0f0f0,stroke:#333
    style G fill:#f0c0c0,stroke:#333
    style H fill:#f0c0c0,stroke:#333
    style L fill:#f0c0c0,stroke:#333
    style N fill:#f0c0c0,stroke:#333
    style V fill:#f0f0f0,stroke:#333

Mermaid Graph illustrating the overall architecture of the Cloud Identity Engine, showing its components (CAS, CDS, Security Risk, IP Tag, Device ID) and their interactions with directories, identity providers, firewalls, and cloud applications.

Interactive Quiz

Test your knowledge of Palo Alto Networks Cloud Identity Engine.

1. What is the primary goal of the Cloud Identity Engine (CIE)?





2. Which component is REQUIRED to integrate CIE with an on-premises Active Directory?





3. What network protocol(s) are typically used for the Cloud Identity agent to query an on-premises Active Directory?





4. Which of the following is a "Gotcha!" when configuring an on-premises Active Directory with the Cloud Identity agent?





5. What is the recommended method for allowing Cloud Identity agent traffic through a Palo Alto Networks firewall located between the agent and CIE?





6. When integrating CIE with a cloud-based directory like Azure AD, what is NOT required?





7. What is a critical requirement when using Client Credential Flow for Azure AD integration with CIE?





8. What is the purpose of configuring the Visibility Scope in CIE?





9. Which CIE component allows customizing directory attributes collected using protocols like SCIM?





10. According to the document, what is a required attribute for users when configuring an On-Premises OpenLDAP directory?





11. What is the primary benefit of configuring Cloud Dynamic User Groups based on attributes?





12. Which Palo Alto Networks Cloud Service integrates with SentinelOne EDR via CIE to enforce adaptive security policy based on device risk?





13. What does the CLI command debug user-id dscd subdomains on enable on a firewall regarding CIE and Okta?





14. What is a "publishing segment" in the context of CIE User Context?





15. When configuring a firewall to receive User Context data from CIE, which PAN-OS feature must be enabled on the firewall?





16. What happens if you try to delete a CIE tenant that is currently being used by another application?





17. What is the default maximum clock skew allowed between the Identity Provider (IdP) and the firewall when validating SAML messages via CIE?





18. When using the Cloud Identity Agent for on-premises AD/LDAP, where are the agent logs permanently retained?





19. Which authentication method supports Prisma Access Browser but NOT GlobalProtect or Authentication Portal?





20. What is the purpose of Third-Party Device-ID in CIE?