Configure an IP Tag Cloud Connection

An IP-Tag Cloud Connection allows the Cloud Identity Engine to collect IP address-to-tag information from cloud service providers. To enforce a tag-based security policy that adapts to IP address changes, configure  Dynamic Address Groups  using the IP address-to-tag information.

To configure the Cloud Identity Engine to collect IP address-to-tag (also known as IP-tag) information for policy enforcement, configure a connection to your cloud service provider to  synchronize  the mappings. The identity management system provides the IP-tag information to the Cloud Identity Engine for processing, which then provides the information to the firewalls for policy enforcement.

To collect IP-tag information from your cloud service provider, you must grant the Cloud Identity Engine the required permissions.

If you use  Strata Cloud Manager , you can view your IP-tag information using the unified interface and use it to create your  tag-based security policy .

For each region, you can synchronize up to 60,000 IP-tag mappings from a cloud service in a monitoring configuration at one time. The Cloud Identity Engine sync only the new or modified mappings each time. You can view up to 32,000 IP-tag mappings per page.

You can also view all IP-tag information in the Cloud Identity Engine ( User ContextMappings and tags ).

  1. If you have not already done so, activate User Context and use the default segment or configure a new  segment  to receive the mapping information.
  2. Select  User ContextIP-Tag Collection .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Select the  Credential Configuration  tab (if it does not already display).
  2. To  Set Up a New Credential Configuration , select the cloud service provider you want to use.

—Connect to an Amazon Web Services (AWS) instance.

—Connect to a Microsoft Azure Active Directory instance.

—Connect to a Google Cloud Platform (GCP) instance.

  1. A screenshot of a computer

AI-generated content may be incorrect.
  2. Enter a unique and descriptive  Name  for the configuration.
  3. ( AWS only ) Configure your AWS connection.

To open your AWS administrator portal in a new window so you can create or edit any necessary ARNs, select the type of Cloud Formation Template (CFT) you want to configure and log in with your AWS credentials.

To enable monitoring using the current account, you only need to configure the application account prerequisites. If you want to use a different account, such as a service account or a  cross-account role , to collect the data, you must configure the application account prerequisites, the security account prerequisites, and a role ARN for the account. For more information, refer to the  Amazon  documentation.

A screenshot of a computer

AI-generated content may be incorrect.

3.                   Enter your  Access Key ID .

To learn how to obtain your access key ID and secret access key, refer to the  AWS documentation.

4.                   Enter your  Secret Access Key .

5.                   Reenter your secret access key to  Confirm Secret Access Key .

6.                   (Optional) Enter a  Role ARN Name  and  Role ARN Value .

To configure additional Role ARNs, click  Add Role ARN  for each Role ARN you want to include.

  1. ( Azure only ) Configure your Azure connection.

1.                   Enter your  Client ID .

To learn how to obtain the client ID and client secret, refer to the  Azure documentation .

A screenshot of a computer

AI-generated content may be incorrect.

2.                   Enter your  Client Secret .

3.                   Enter your  Tenant ID .

To learn how to obtain the tenant ID and subscription ID, refer to the  Azure documentation.

4.                   Enter your  Subscription ID .

  1. ( Google Cloud Platform only ) Configure your GCP connection.

1.                   Create credentials  for a service account in your Google Cloud console, then download and save the JSON file in a safe location.

2.                   Click  Browse files  and click  Open  to navigate to the JSON file or drag and drop the GCP credential JSON file.

A screenshot of a computer

AI-generated content may be incorrect.

3.                   (Optional) Select the  Region  for the instance.

You can optionally  Search  for a region. If you don't select a region, the Cloud Identity Engine uses the  us-west-2  region. You can select one region per instance.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Verify the connection by clicking the  Test Connection  button.

( AWS and Google Cloud Platform only ) You can optionally select the  Region  before testing the connection. By default, the Cloud Identity Engine selects the  US West  region; if this region does not allow API requests, select a region that can allow API requests.

Even if the connection test isn't successful, you can still submit your configuration; until you resolve the connectivity issues, the configuration status is  Not connected . You must resolve the connection issues for the configuration to successfully retrieve the IP address-to-tag mappings.

  1. Submit  the configuration.

To collect and view your IP-Tag mappings, you must configure a 

IP-Tag monitor configuration

.

  1. ( Strata Cloud Manager only ) If you're using  Strata Cloud Manager , view the tags that the Cloud Identity Engine shares with Strata Cloud Manager by selecting an  address group  then select the  Tags from CIE  tab when you  add match criteria .

A screenshot of a computer

AI-generated content may be incorrect.

  1. To configure a connection to your cloud service provider for monitoring purposes (such as audits) or to share the IP address-to-tag mapping information using a  segment , select the  Monitor & Status  tab.

There are four states for the connection to the cloud service provider:

For more information on the connection status, select  Click to see details .

A screenshot of a computer

AI-generated content may be incorrect.

5.                   Set Up a New Monitor Configuration  and select the monitor configuration for the cloud service provider that you configured for credential configuration in step 

4

.

A screenshot of a computer

AI-generated content may be incorrect.

6.                   Enter a unique and descriptive  Name  for the configuration.

A screenshot of a computer

AI-generated content may be incorrect.

7.                   Select the  Credential Configuration  that you configured in step 

4

.

8.                   ( AWS only ) Optionally select the  Role ARN  you want to use.

9.                   Select if you want to configure the connection for  All Regions  All VPCs  (AWS only) or  All Project IDs  (GCP only).

To select a specific region or virtual private cloud (VPC), deselect the  All Regions  or  All VPCs  check box and allow the list of regions or VPCs to populate, then select the region or VPC you want to include. To select a specific VPC, you must first select one or more regions or select all regions.

10.              ( Azure only ) Select whether you want to  Fetch Service Tags .

Azure Service tags simplify security for Azure virtual machines and Azure virtual networks because you can restrict network access to just the Azure services you want to use. A service tag represents a group of IP address prefixes for a particular Azure service. For example, a tag can represent all storage IP addresses.

11.              Define the  Polling Interval (in seconds)  to specify how frequently the Cloud Identity Engine checks for new data.

The default is 60 seconds and the range is 60–1800 seconds.

12.              If you want to share the mappings, select the  segment  you configured in step 1. Otherwise, if you want to create this configuration only for monitoring without sending mappings to any firewalls, select  None .

If you need to change the segment after you submit the configuration, you must create a new configuration and select the segment you want to use.

13.              Submit  the configuration.

  1. Search and monitor your configurations in the Cloud Identity Engine.

1.                   Select the  Monitor & Status  tab.

2.                   Use the filters to highlight the information you want to find.

      • Name —Enter the name of a configuration to filter results to this configuration.

The search query does not need to be an exact match for the name.

      • Vendor —Select the vendor type of the cloud service provider to filter the results to this vendor type.
      • Status — Select the status type (such as  Connected  or  Partially Connected ) to filter the results to this status type.
      • Segment — Select the  Segment  name to view the monitor segments that send mappings to the segment you select.
      • Associated Credential — Select the name of the  Associated Credential  configuration to view monitor segments that use the credential configuration type you select.

A screenshot of a computer

AI-generated content may be incorrect.

3.                   (Optional) To remove the filter, click  Reset .

  1. Manage your IP-Tag Collection configuration.

1.                   (Optional) To sync all new IP-tag mappings and use them in the security policy immediately or to resolve any discrepancies in the IP-tag mappings, click  Full Sync .

A screenshot of a computer

AI-generated content may be incorrect.

The  Sync Status  displays the time and date of the last sync.

A screenshot of a computer

AI-generated content may be incorrect.

2.                   (Optional) To change the IP-Tag Collection configuration, click  Edit .

A screenshot of a computer

AI-generated content may be incorrect.

3.                   (Optional) To remove the IP-Tag Collection configuration, click  Delete  and confirm the deletion.

When you confirm the deletion, the Cloud Identity Engine removes all IP-tag mappings from the cloud service provider and from any firewalls that collect the IP-tag mappings to enforce security policy.

A screenshot of a computer

AI-generated content may be incorrect.

  1. View more details for a specific configuration.

1.                   Select the name of the configuration that you want to view from the  IP-Tag Collection  page.

A screenshot of a computer

AI-generated content may be incorrect.

2.                   On the  Monitor & Status  page, review the  Connection Details  to view information such as the connection status.

A screenshot of a computer

AI-generated content may be incorrect.

  1. View the IP address-to-tag mapping information.

Options vary depending on your configuration type.

1.                   ( AWS only ) On the  VPC  tab,  Search by VPC ID  to view information for a specific VPC or select the number in the  IPs  column to view the IP addresses associated with the  VPC ID  in that row.

A screenshot of a computer

AI-generated content may be incorrect.

2.                   Select the  Tag To IP  tab and  Search by Tag  to view all IP addresses that contain the tag you specify.

You can view the results for an exact or partial match for your query. You can optionally limit the search to a specific region or select  All Regions .

A screenshot of a computer

AI-generated content may be incorrect.

3.                   Select the number in the  IPs  column to view the IP addresses that the Cloud Identity Engine has collected for the selected  Tag .

4.                   Search by IP Address  then close the window or click  Cancel  after reviewing the IP addresses.

A screenshot of a computer

AI-generated content may be incorrect.

5.                   Select the  IP To Tag  tab to  Search by IP Address .

For an AWS-based configuration, you can also search by VPC ID.

A screenshot of a computer

AI-generated content may be incorrect.

6.                   Click the number in the  Tags  column to view the tags associated with the  IP Address  of that row.

7.                   Search by Tag  then close the window or click  Cancel  after reviewing the tags.

A screenshot of a browser window

AI-generated content may be incorrect.

Configure Dynamic Privilege Access in the Cloud Identity Engine

Enabling Dynamic Privilege Access (DPA) allows you to isolate network resources so they are only accessible to users on a per-project basis.

Contact your Palo Alto Networks account representative to activate this functionality.

Complete the following steps to enable and configure DPA in the Cloud Identity Engine. For more information, refer to the  Prisma Access documentation . The  Prisma Access release notes  have information on known issues for DPA.

Syncing new user groups for SAML applications in Azure may require up to 3 hours for the Cloud Identity Engine to complete the sync. Wait until the sync is complete before assigning projects to the new group.

  1. Configure an authentication type in the Cloud Identity Engine.

The authentication type you configure in the Cloud Identity Engine is only for use with DPA authentication; don't use the same authentication type you use for DPA for another authentication type.

    1. In the Cloud Identity Engine, select  Authentication TypesAdd New Authentication Type .

The Cloud Identity Engine supports Azure Active Directory (Azure AD) in this release. To use an existing Azure IdP configuration, select  Authentication TypesActionsEdit .

    1. If you  Set Up  a new  SAML 2.0  authentication type,  configure  Azure as the identity provider (IdP) in a new configuration.

If you edit the configuration for an existing Azure IdP authentication type,  synchronize all attributes  for the directory (also known as a full sync) after editing and submitting the configuration.

    1. Select  Dynamic service provider metadata  as the  Metadata Type .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Copy and save the information from the Cloud Identity Engine that you must configure in your identity provider.

Select one of the following methods to obtain the information you need to configure for the Cloud Identity Engine to communicate with your identity provider:

Don't edit the Entity ID or use the Entity ID for other applications. You don't need to download the SP metadata if you use the Entity ID.

This step is mandatory for successful DPA configuration using SP metadata, even if you edit an existing Azure IdP configuration. The SP metadata provides the Entity ID, the Reply URL (Assertion Customer Service URL) and the Logout URL; you must manually enter the Sign on URL.

A screenshot of a computer

AI-generated content may be incorrect.

If you want to configure the authentication type so you can obtain the necessary information and you don't want to enter the metadata now, you can choose to  Do It Later . This option allows you to generate the data you need to enter in the IdP for the next steps; however, you must enter the metadata before submitting the configuration to successfully use the authentication type with the Cloud Identity Engine.

  1. In the IdP administrator portal, download the SAML application for the Cloud Identity Engine from the gallery.
    1. Log in to the Azure Portal and select  Enterprise Applications .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Search for the  Palo Alto Networks Cloud Identity Engine - Cloud Authentication Service  gallery application and select it.

A close-up of a logo

AI-generated content may be incorrect.

    1. (Optional) Edit the application  Name .
    2. Create  the configuration.

A screenshot of a computer

AI-generated content may be incorrect.

    1. For  Set up single sign-on , click  Get started .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Depending on the method you used in step 

2

, complete the necessary steps to configure the SAML application.

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Assign your account to the application and save the configuration.
    1. Assign your account to ensure your access to the application and to any other users you want to authenticate using the SAML application. For more information, refer to step 3 in  configuring Azure as an IdP .
    2. Save  the configuration.
  2. Continue the IdP configuration in the Cloud Identity Engine.
    1. Enter the remaining information to  configure your identity provider  (refer to step 5).
    2. In the Cloud Identity Engine, enter the  App Federation Metadata URL  you copied as the  Identity Provider Metadata URL  .
    3. Click  Get URL  to confirm the Cloud Identity Engine can connect to the URL.

This step is mandatory to confirm the configuration. If you don't click  Get URL  before clicking  Test SAML Setup , the test isn't successful.

    1. Select whether  Multi-factor Authentication is Enabled on the Identity Provider  and whether you want to  Force Authentication .

Refer to steps 6-7 in  Configure Azure as an IdP in the Cloud Identity Engine  for more information.

  1. Configure the SAML attributes for the Cloud Identity Engine to use for authentication.
    1. Click  Test SAML Setup  to verify the configuration.
    2. Select the  Username Attribute  for the Cloud Identity Engine to use for authentication.

Select the username attribute that uses the  Name  ( /identity/claims/name: ) format. If you do not select the correct username attribute, user authentication for projects is not successful. For more information, refer to the  Microsoft documentation .

A screenshot of a computer

AI-generated content may be incorrect.

    1. (Optional) Select other attributes to use for authentication, such as  Usergroup Attribute Access Domain User Domain , and  Admin Role .
  1. If you have not already done so,  Collect enterprise applications  data from your  Azure directory Sign in  to confirm the changes and  Submit  the update to the configuration.

The Cloud Identity Engine begins a complete synchronization of the attributes (also known as a  full sync ) when you submit the configuration. Wait until the sync is complete before continuing.

This step is mandatory to complete the configuration regardless of whether you're creating a new configuration or editing an existing configuration. You must complete this step before enabling Dynamic Privilege Access in the Cloud Identity Engine.

  1. Enable Dynamic Privilege Access in the Cloud Identity Engine authentication profile.
    1. Select  Enable Dynamic Privilege Access .
    2. Click  Detect Directory and SAML  to allow the Cloud Identity Engine to detect available directories and SAML attributes.

When the Cloud Identity Engine completes the collection of the attributes, the  Directory  and  SAML 2.0 Application  information displays.

If the Cloud Identity Engine can't detect the SAML application, complete a  full sync  then reattempt this step.

    1. After confirming the information is correct,  Submit  the configuration.
  1. Configure an  authentication profile  in the Cloud Identity Engine to use the authentication type you configured.

Configure Security Risk for the Cloud Identity Engine

Security Risk for the Cloud Identity Engine obtains specific information to evaluate risk (such as an outdated OS, failed password attempts, or suspicious device activity) for users and devices. By using telemetry and receiving risk scores for these sources, the Cloud Identity Engine allows you to define the risk criteria for a group, then the Cloud Identity Engine automatically assigns users and devices to that group using the information it receives from your risk assessment sources. This enables closed-loop automation, since after you address the source of the risk for a user or device, the Cloud Identity Engine removes it from the group.

Microsoft Azure analyzes user behavior and sign-in events to determine a user risk score and create a list of risky users. By identifying suspicious or anomalous user activity and assigning a risk score, you can quickly assess user risk level, evaluate priority, and take actions to reduce risk.

SentinelOne reviews all device activity (such as processes) on the endpoint to assign specific attributes that determine the risk level of the endpoint.

The SentinelOne Endpoint Detection and Response (EDR) agent monitors device activity and behavior. By specifying the attributes you want the agent to collect, you can identify at-risk device endpoints.

The bidirectional integration between Prisma Access and SentinelOne helps ensure your Zero Trust Security policy by continuously receiving device information and risk signals from SentinelOne and automatically enforcing access restrictions, such as quarantining the device.

You can also use the Strata Cloud Manager to view the list of devices currently in quarantine.

Configure Azure for Security Risk in the Cloud Identity Engine

.

Configure SentinelOne for Security Risk in the Cloud Identity Engine

.

By continuously monitoring the device security posture and risk information from SentinelOne, updating and enforcing quarantine lists across all devices, and removing devices after remediation, Security Risk for the Cloud Identity Engine helps you enforce adaptive Security policy and just-in-time access.

  1. In the Cloud Identity Engine, select  Security RiskRisk Sources .
  2. Click  Add Risk Source .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Select the type of risk source you want to configure.

You can configure up to one Azure Active Directory source and up to one SentinelOne source.

A screenshot of a computer

AI-generated content may be incorrect.

The Cloud Identity Engine uses the risk source you configure to obtain risk information.

A screenshot of a computer

AI-generated content may be incorrect.

If you configure Security Risk to use a directory and you want to remove the directory from the Cloud Identity Engine, you must first remove the directory from the Security Risk configuration.

Configure SentinelOne for Security Risk in the Cloud Identity Engine

 as a risk source to obtain risk information about devices.

Configure Azure for Security Risk in the Cloud Identity Engine

  1. View and optionally edit the dynamic risky user groups.
    1. In the Cloud Identity Engine, select  Security RiskCloud Dynamic Groups .
    2. Select the  Risky User Group  tab to view the groups that the Cloud Identity Engine creates to isolate users who it identifies as risky. You can optionally click the  Details  icon to view more information about the specific group.

A screenshot of a computer

AI-generated content may be incorrect.

    1. (Optional) Search the groups by entering a search query then click  Apply Search .

A screenshot of a computer

AI-generated content may be incorrect.

You can specify a  Text Search  or a  Substring Search .

A screenshot of a computer

AI-generated content may be incorrect.

    1. (Optional) To include additional  context and attributes  for the cloud dynamic risky user group, select  ActionsEdit , add the additional context and attributes, and  Submit  the changes.

A screenshot of a computer

AI-generated content may be incorrect.

    1. (Optional) To delete a group, select  ActionsRemove  and click  Yes  to confirm removal of the group.

A screenshot of a computer

AI-generated content may be incorrect.

  1. (Optional) Create a new cloud dynamic risky user group.
    1. Click  Create New Risky User Group .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select  Risky User  as the  Category .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Enter the  Common Name  you want to use for the dynamic risky user group.

A screenshot of a computer

AI-generated content may be incorrect.

    1. (Optional) Enter a  Group Email  a  Description  for the group.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select the  context and attributes  to use for the dynamic risky user group.

A screenshot of a computer

AI-generated content may be incorrect.

    1. (Optional) To include additional context and attributes, click  Add OR  and optionally  Add AND  and select the context and attributes to use for the dynamic risky user group.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Submit  the configuration.

A screenshot of a computer

AI-generated content may be incorrect.

Configure SentinelOne for Security Risk in the Cloud Identity Engine

  1. To configure SentinelOne as a risk source for Security Risk, collect the necessary information from your SentinelOne configuration.
    1. Before logging in to SentinelOne, copy the URL without the  /login  part of the address and save it in a secure location.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Log in to SentinelOne and select  SettingsUsersService Users .
    2. Click  ActionsCreate New Service User .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Enter a  Name  for the service user account and select the  Expiration Date  then click  Next .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select Scope of Access  and click  Create User .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Enter the  Two-Factor Authentication Code  within the 30-minute duration and click  Confirm Action .

A screenshot of a confirmation form

AI-generated content may be incorrect.

    1. Click  Copy API Token  to copy the API token and save it in a secure location. Because the API token only displays once, ensure you copy the token before clicking the  Close  button.

A screenshot of a computer

AI-generated content may be incorrect.

    1. (Optional but recommended) Click the  Site  button to confirm the creation of the site.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Configure SentinelOne as a risk source in the Cloud Identity Engine.
    1. Enter the SentinelOne  Source Name .

The source name must use lowercase.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Paste the  Endpoint URL  you copied from SentinelOne in step 

1.a

.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Paste the  Authorization Method  API token you copied in step 

1.7

 and paste it in your SentinelOne configuration.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Click  Test Connection  to verify that the Cloud Identity Engine can communicate with your SentinelOne configuration.

A screenshot of a computer

AI-generated content may be incorrect.

    1. After confirming that the Cloud Identity Engine can successfully communicate with your provider using your SentinelOne configuration,  Submit  the SentinelOne configuration.

A screenshot of a computer

AI-generated content may be incorrect.

  1. View or edit the dynamic risky endpoint groups.
    1. In the Cloud Identity Engine, select  Security RiskCloud Dynamic Groups .
    2. Select the  Risky Endpoint Group  tab to view the groups that the Cloud Identity Engine creates to isolate endpoints that it identifies as risky. You can optionally click the  Details  icon to view more information about the specific endpoint group.

The Cloud Identity Engine creates a default group without any attributes; you must specify the attributes you want to use for the group (see step 

3.4

).

A screenshot of a computer

AI-generated content may be incorrect.

    1. (Optional) Search the groups by entering a search query then click  Apply Search .

A screenshot of a computer

AI-generated content may be incorrect.

You can specify a  Text Search  or a  Substring Search .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Specify the  context and attributes  for the cloud dynamic risky endpoint group by selecting  ActionsEdit , adding the context and attributes, and clicking  Submit  to confirm the changes.

A screenshot of a computer

AI-generated content may be incorrect.

    1. (Optional) To delete a group, select  ActionsRemove  and click  Yes  to confirm removal of the group.

A screenshot of a computer

AI-generated content may be incorrect.

The Cloud Identity Engine does not currently support creation of a dynamic risky endpoint group if there is an existing group.

  1. Use Strata Cloud Manager to view the devices that have been  quarantined .

The Cloud Identity Engine places devices in quarantine using device security posture information and risk signals from SentinelOne. It removes devices from the quarantine list only when the device no longer meets any of the match criteria in the Cloud Identity Engine configuration. If a device is in quarantine due to SentinelOne information, Palo Alto Networks does not recommend manually removing the device from the quarantine list using Strata Cloud Manager or Panorama.

    1. Log in to Strata Cloud Manager.
    2. Select  ManageConfigurationNGFW and Prisma Access .
    3. Select  Prisma Access  as the  Configuration Scope .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select  ObjectsQuarantined Device List .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Review the devices in the quarantine list to determine what remediation actions to take.

A screenshot of a computer

AI-generated content may be incorrect.

Manage the Cloud Identity Agent

After you have installed and configured the agent, learn how to ensure you are using the latest agent version. If you need to perform maintenance, you can stop and restart the agent’s connection to your tenant. To help troubleshoot any issues, learn more about the events logged by the agent and how to use the logs.

Configure Cloud Identity Agent Logs

The Cloud Identity agent logs Cloud Identity Engine events that occur on the agent host. You can use these logs to monitor informational events such as new connections ( Information—New connection 192.0.2.0: 49161 ), or for troubleshooting ( Error—Verification of Server Cert failed, stopping Cloud Identity Agent ). For example, the agent automatically generates logs if you test connectivity when you  Configure the Cloud Identity Agent . You can also use the Event Viewer on the agent host to review logs created if the agent is unable to connect to the Cloud Identity Engine due to an incorrect bind DN or password, server unavailability, or other issue.

The agent displays logs in the order in which they were generated. To provide a consistent timestamp across timezones, logs include the timezone information in Coordinated Universal Time (UTC), where the time offset is indicated by + or -. For the complete log history, check the CloudIdAgentDebug log file on the agent host, which permanently retains all logs.

  1. Launch the agent.
  2. Select  FileDebug .
  3. Select the type of event you want to log.

The agent logs the events of the selected type and all subsequent types. For example, if you select  Debug , the logs include error, warning, information, and debug events.

To remove log files from the agent’s user interface, you can optionally  Clear Cloud Identity Agent Logs .

Search Cloud Identity Agent Logs

To troubleshoot issues with the Cloud Identity Engine, use keywords to search the Cloud Identity agent logs. For example, you could search for the IP address of a directory where the agent wasn’t able to connect to learn more about why the error occurred.

Search terms are case-sensitive.

  1. From the Cloud Identity agent, select  Monitoring .
  2. Enter the search terms in the entry field to the left of  Search .
  3. Click  Search . The results are highlighted in blue below the entry field.

A screen shot of a computer

AI-generated content may be incorrect.

Clear Cloud Identity Agent Logs

You can clear outdated logs on the agent’s user interface. This does not delete the entries from the CloudIdAgentDebug log file on the agent host.

  1. From the Cloud Identity agent, select  Monitoring .
  2. Click  Clear Log .

Update the Cloud Identity Agent

Using the latest version of the agent is strongly recommended. If your Cloud Identity agent is not the latest version available, the Cloud Identity Engine app displays a notification.

Use the following procedure to update your Cloud Identity agent to the latest version.

When you upgrade the agent to version 1.7.0, it creates a backup of the existing agent configuration before removing the deprecated version of the agent. During installation of the new version of the agent, the existing configuration is automatically restored.

  1. Stop  the connection to the Cloud Identity Engine service.

You must stop the connection between the agent and the service before you can update the agent. Check  Agents & Certificates  in the Cloud Identity Engine app to confirm the agent’s status.

  1. Uninstall the outdated agent from the host ( StartControl PanelPrograms and FeaturesCloud Identity AgentUninstall ).

You must uninstall the outdated agent from the host before installing the latest version of the agent.

  1. Log in to the  hub  and select the Cloud Identity Engine app.
  2. Select your Cloud Identity Engine tenant (if you have more than one) then select  Agents & Certificate .
  3. Click  Download New Agent , then  Install the Cloud Identity Agent .

A screenshot of a computer

AI-generated content may be incorrect.

Start or Stop the Connection to the Cloud Identity Engine

When you start the Cloud Identity agent, it automatically starts communicating with the Cloud Identity Engine to synchronize the attributes. To prevent this communication (for example, if a directory server is unavailable or if you want to  Remove the Cloud Identity Agent ), you can stop communication between the Cloud Identity agent and the Cloud Identity Engine. You can then restart the connection later to allow communication.

  1. On the agent host, start the Cloud Identity agent if it is not already running, then select  Cloud Identity Configuration .

The current connection status of the agent displays at the lower-left corner of the window.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Stop or re-establish the connection between the agent and the service.

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

Remove the Cloud Identity Agent

If you no longer need a Cloud Identity agent, you can remove it from your Cloud Identity Engine tenant.

  1. Stop  the connection to the Cloud Identity Engine.

You must stop the connection between the agent and the Cloud Identity Engine before you can remove the agent.

  1. Uninstall the agent from the host server ( StartControl PanelPrograms and FeaturesCloud Identity AgentUninstall ).
  2. Log in to the hub and select the Cloud Identity Engine tenant that contains the agent you want to remove.
  3. Select  Agents & Certificates .
  4. Confirm that the agent’s  Status  is  Offline  and  Remove Agent .

You can only remove an agent that is offline (the connection between the agent and the Cloud Identity Engine is not active). If the agent is not offline, the  Remove Agent  button is not available.

Manage Cloud Identity Engine Certificates

After you generate the certificate to  Authenticate the Agent and the Cloud Identity Engine , you can view the certificate and its associated agent in the Cloud Identity Engine app.

The Cloud Identity agent version 1.5.0 and later versions automatically renews the certificate before it expires.

You can view the identification number and lifetime of the certificate on the  Agents & Certificates  page in the Cloud Identity Engine app.

If you need to  Revoke Cloud Identity Agent Certificates , you must  Delete Obsolete Cloud Identity Agent Certificates  before you generate and install the new certificate.

To generate a new certificate for an agent, click  Get New Certificate , then follow the steps to  Authenticate the Agent and the Cloud Identity Engine .

A screenshot of a computer

AI-generated content may be incorrect.

Revoke Cloud Identity Agent Certificates

If a Cloud Identity agent’s certificate is compromised, revoke the certificate.

  1. Log in to the  hub  and select  Cloud Identity Engine .
  2. Select the tenant associated with the agent with the compromised certificate.
  3. From the Cloud Identity Engine app, select  Agents & Certificates .
  4. Revoke  the certificate.
  5. Delete Obsolete Cloud Identity Agent Certificates  to remove the previous certificate.
  6. Generate a new certificate to  Authenticate the Agent and the Cloud Identity Engine  and install it on the agent host.

Delete Obsolete Cloud Identity Agent Certificates

You must delete the previous certificate for the agent before installing the new certificate. If you do not delete the previous certificate, the Cloud Identity Engine may reference the previous certificate instead of the new certificate.

  1. On the agent host, open Microsoft Management Control (MMC) by selecting  StartRun , then entering  MMC .
  2. Select  FileAdd/Remove Snap-In .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Select  CertificatesAdd .

A screenshot of a computer menu

AI-generated content may be incorrect.

  1. Select  Computer AccountNext .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Select  Local ComputerFinish .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Click  OK , then navigate to  Console RootCertificates (Local Computer)PersonalCertificates .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Select the previous certificate from the list.
  2. Right-click the certificate, then  Delete  and click  Yes  to confirm the deletion.
  3. Generate a new certificate to  Authenticate the Agent and the Cloud Identity Engine  and install it on the agent host.

Associate the Cloud Identity Engine with Palo Alto Networks Apps

The following procedures describe the steps for the support account view in the Hub. If you are using the tenant account view, association is not necessary for a tenant service group ( TSG ). For more information, refer to the  Hub Getting Started  guide.

By associating your Cloud Identity Engine tenants with other Palo Alto Networks apps, you can allow these apps and services to access your directory information for reporting and policy enforcement. You can associate the Cloud Identity Engine tenant with another app during activation or with an existing app at any time.

To share user attributes with multiple apps, associate the same Cloud Identity Engine tenant with each app.

Associate the Cloud Identity Engine During Activation

The following procedures describe the steps for the support account view in the Hub. If you are using the tenant account view, association is not necessary for a tenant service group ( TSG ). For more information, refer to the  Hub Getting Started  guide.

  1. Using your Auth Code,  activate  the Palo Alto Networks cloud app you want to associate with the Cloud Identity Engine tenant.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Enter the information required to activate the application, such as an  Instance Name  and a  Region , which will vary depending on the app.
  2. Select the  Cloud Identity Engine  tenant you want to associate with the app.

Only Cloud Identity Engine tenants that are compatible with the Palo Alto Networks cloud application are displayed in the drop-down list. For example, a Cloud Identity Engine tenant assigned to the US region would be compatible with another Palo Alto Networks cloud service app assigned to the US region. If the Cloud Identity Engine field is not available, the Palo Alto Networks cloud services app you selected does not support the Cloud Identity Engine.

  1. Agree and Activate  the app.

Associate the Cloud Identity Engine with an Existing App

The following procedures describe the steps for the support account view in the Hub. If you are using the tenant account view, association is not necessary for a tenant service group ( TSG ). For more information, refer to the  Hub Getting Started  guide.

  1. Log in to the hub, click  Settings  (

  A gray pencil with a white background

AI-generated content may be incorrect.  

) then  Manage Apps .

  1. Select the app you want to associate with the Cloud Identity Engine tenant.
  2. Select the  Cloud Identity Engine  tenant you want to associate with the app and click  OK .

A screenshot of a computer

AI-generated content may be incorrect.

Only Cloud Identity Engine tenants that are compatible with the Palo Alto Networks cloud application are displayed in the drop-down list. For example, a Cloud Identity Engine tenant assigned to the US region would be compatible with another Palo Alto Networks cloud service app assigned to the US region. If the Cloud Identity Engine field is not available, the Palo Alto Networks cloud services app you selected does not support the Cloud Identity Engine.

After you associate the app, the Cloud Identity Engine tenant name displays in the  Cloud Identity Engine  column in the hub ( SettingsManage Apps ).

Authenticate Users with the Cloud Identity Engine

Learn how to deploy the Cloud Identity Engine for user authentication by configuring a SAML 2.0-based identity provider (IdP), a client certificate and certificate authority (CA) chain, or both. After specifying how you want to authenticate your users, set up your authentication profile to define your authentication security policy and optionally configure the authentication policy on your firewall or Panorama. After you’ve done that, configure the Cloud Identity Engine as a User-ID source for group mapping and user mapping to enforce group-based policy.

Configure a SAML 2.0 Authentication Type

You can configure SAML 2.0-compliant identity providers (IdPs) in the Cloud Identity Engine to authenticate your users. The following topics provide detailed steps on how to configure specific IdPs as authentication types in the Cloud Identity Engine.

Configure Azure as an IdP in the Cloud Identity Engine

  1. Download the Cloud Identity Engine integration in the Azure Portal.
    1. If you have not already done so,  activate  the Cloud Identity Engine app.
    2. Log in to the  Azure Portal  and select  Azure Active Directory .

Make sure you complete all the necessary  steps  in the Azure portal.

A screenshot of a computer

AI-generated content may be incorrect.

If you have more than one directory,  Switch directory  to select the directory you want to use with the Cloud Identity Engine.

A screenshot of a login page

AI-generated content may be incorrect.

    1. Select  Enterprise applications  and click  New application .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Add from the gallery  then enter  Palo Alto Networks Cloud Identity Engine - Cloud Authentication Service  and  download  the Azure AD single-sign on integration.
    2. After the application loads, select  Users and groups , then  Add user/group  to  Assign  them to this application.

Select the users and groups you want to use the Azure IdP in the Cloud Identity Engine for authentication.

Be sure to assign the account you're using so you can test the configuration when it's complete. You may need to refresh the page after adding accounts to successfully complete the test.

    1. Select  Single sign-on  then select  SAML .
    2. Upload Metadata File  by browsing to the metadata file that you downloaded from the Cloud Identity Engine app and click  Add .
    3. After the metadata uploads,  Save  your configuration.
    4. (Optional)  Edit  your  User Attributes & Claims  to  Add a new claim  or  Edit  an existing claim.

If you attempt to test the configuration on the Azure Admin Console, a 404 error displays because the test is triggered by the IdP and the Cloud Identity Engine supports authentication requests initiated by the service provider.

  1. Configure Azure AD for the Cloud Identity Engine.
    1. Select  Single sign-on  then select  SAML .
    2. Edit  the  Basic SAML Configuration  settings.
    3. Upload metadata file  and select the metadata file you downloaded from the Cloud Identity Engine in the first step.
    4. Enter your regional endpoint as the  Sign-on URL  using the following format:  https://<RegionUrl>.paloaltonetworks.com/sp/acs  (where <RegionUrl> is your regional endpoint). For more information on regional endpoints, see  Configure Cloud Identity Engine Authentication on the Firewall or Panorama .
    5. Copy  the  App Federation Metadata Url  and save it to a secure location.

At this point in the process, you may see the option to  Test sign-in . If you try to test the single sign-on configuration now, the test won't be successful. You can test your configuration to verify it's correct in step 

9

.

  1. Add and assign users who you want to require to use Azure AD for authentication.
    1. Select  Azure Active Directory  then select  UsersAll users .
    2. Create a  New user  and enter a  Name User name .
    3. Select  Show password , copy the password to a secure location, and  Create  the user.
    4. In the  Palo Alto Networks Cloud Identity Engine - Cloud Authentication Service  integration in the Azure Portal, select  Users and groups .
    5. Add user  then select  Users and groups .
  2. Add Azure as an authentication type in the Cloud Identity Engine app.
    1. In the Cloud Identity Engine app, select  AuthenticationAuthentication Types  then click  Add New Authentication Type .

    1. Set Up  a  SAML 2.0  authentication type.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select the  Metadata Type  you want to use.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Copy the  Entity ID  and  Assertion Consumer Service URL  and save them in a secure location.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Download SP Certificate  and  Download SP Metadata  and save them in a secure location.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Enter a unique and descriptive  Profile Name .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select  Azure  as your  Identity Provider Vendor .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Select the method you want to use to  Add Metadata .

A screenshot of a computer

AI-generated content may be incorrect.

1.                   Copy the necessary information from the Azure Portal and enter it in the IdP profile on the Cloud Identity Engine app as indicated in the following table:

Copy or Download from Azure Portal

Enter in Cloud Identity Engine IdP Profile

Copy the  Azure AD Identifier .

Enter it as the  Identity Provider ID .

Download  the  Certificate (Base64) .

Click  Browse files  to select the  Identity Provider Certificate  you downloaded from the Azure Portal.

Copy the  Login URL .

Enter the URL as the  Identity Provider SSO URL .

2.                   A screenshot of a computer

AI-generated content may be incorrect.

3.                   (Optional) Select the  HTTP Binding for SSO Request to Identity Provider (Optional)  method you want to use for the SAML binding that allows the firewall and IdP to exchange request and response messages:

A screenshot of a computer

AI-generated content may be incorrect.

1.                   In the Azure Portal,  Download  the  Federation Metadata XML  and  Save  it to a secure location.

2.                   In the Cloud Identity Engine app, click  Browse files  to select the metadata file, then  Open  the metadata file.

A screenshot of a computer

AI-generated content may be incorrect.

Palo Alto Networks recommends using this method to configure Azure as an IdP.

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Specify the  Maximum Clock Skew (seconds) , which is the allowed difference in seconds between the system times of the IdP and the firewall at the moment when the firewall validates IdP messages (default is 60; range is 1–900). If the difference exceeds this value, authentication fails.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Select  Multi-factor Authentication is Enabled on the Identity Provider  if your Azure configuration uses multi-factor authentication (MFA).

A screenshot of a computer

AI-generated content may be incorrect.

  1. To require users to log in using their credentials to reconnect to GlobalProtect, enable  Force Authentication .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Click  Test SAML setup  to verify the profile configuration.

This step is necessary to confirm that your firewall and IdP can communicate.

If you do not provide the vendor information, the SAML test passes so that you can still submit the configuration.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Select the SAML attributes you want the firewall to use for authentication and  Submit  the IdP profile.
    1. In the Azure Portal,  Edit  the  User Attributes & Claims .
    2. (Optional) In the Cloud Identity Engine app, enter the  Username Attribute Usergroup Attribute Access Domain User Domain , and  Admin Role .
    3. Submit the profile.

A screenshot of a computer

AI-generated content may be incorrect.

  1. If you want to  Enable Dynamic Privilege Access , ensure completion of the prerequisites before enabling this option, then  Submit  your changes to confirm the configuration.

For more information, refer to  Configure Dynamic Privilege Access in the Cloud Identity Engine .

A screenshot of a computer

AI-generated content may be incorrect.

Configure Okta as an IdP in the Cloud Identity Engine

If you want to use Okta to authenticate users with the Cloud Identity Engine, there are two ways to configure Okta authentication with the Cloud Identity Engine:

  Recommended

  1. Select the method you want to use to integrate the Okta authentication in the Cloud Identity Engine and complete the steps in the Okta management console.

  Recommended

  1. Set up the Okta authentication in the Cloud Identity Engine.

1.                   If you have not already done so,  activate  the Cloud Identity Engine app.

2.                   In the Cloud Identity Engine app, select  AuthenticationSP MetadataDownload SP Metadata  and  Save  the metadata in a secure location.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Add Okta as an authentication type in the Cloud Identity Engine app.

1.                   Select  Authentication Types  and click  Add New Authentication Type .

A screenshot of a computer

AI-generated content may be incorrect.

2.                   Set Up  a  SAML 2.0  authentication type.

A screenshot of a computer

AI-generated content may be incorrect.

3.                   Enter a  Profile Name .

A screenshot of a computer

AI-generated content may be incorrect.

4.                   Select  Okta  as your  Identity Provider Vendor .

  1. Select the method you want to use to  Add Metadata  and  Submit  the IdP profile.

A screenshot of a computer

AI-generated content may be incorrect.

Copy or Download from Okta Admin Console

Enter in Cloud Identity Engine

Copy the  Identity Provider Issuer .

Enter it as the  Identity Provider ID .

Download  the  X.509 Certificate .

Click to Upload  the certificate from the Okta Admin Console.

Copy the  Identity Provider Single Sign-On URL .

Enter the URL as the  Identity Provider SSO URL .

A screenshot of a computer

AI-generated content may be incorrect.

4.2

. Paste it in the profile and click  Get URL  to obtain the metadata.

#id4126bb2e-0974-45b8-81da-c13f5db29908_li_l5n_bz5_3xb

A screenshot of a computer

AI-generated content may be incorrect.

  1. Specify the  Maximum Clock Skew (seconds) , which is the allowed difference in seconds between the system times of the IdP and the firewall at the moment when the firewall validates IdP messages (default is 60; range is 1–900). If the difference exceeds this value, authentication fails.
  2. To require users to log in using their credentials to reconnect to GlobalProtect, enable  Force Authentication .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Test SAML setup  to verify the profile configuration.

A screenshot of a computer

AI-generated content may be incorrect.

This step is necessary to confirm that your firewall and IdP can communicate.

  1. Select the SAML attributes you want the firewall to use for authentication and  Submit  the IdP profile.

You must select the username attribute in the Okta Admin Console for the attribute to display in the Cloud Identity Engine.

1.                   In the Okta Admin Console,  Edit  the  User Attributes & Claims .

2.                   In the Cloud Identity Engine app, select the  Username Attribute  and optionally, the  Usergroup Attribute Access Domain User Domain , and  Admin Role .

If you're using the Cloud Identity Engine for SAML authentication with GlobalProtect Clientless VPN, you must configure the  User Domain  attribute to the same value as the  userdomain  field in the Okta Admin Console ( ApplicationsApplicationsSAML 2.0General ).

A screenshot of a computer

AI-generated content may be incorrect.

Integrate Okta as a Gallery Application

Palo Alto Networks strongly recommends that you integrate Okta in the Cloud Identity Engine as a gallery application. Complete the following steps to add and configure the Okta gallery application in the Cloud Identity Engine. Be sure to complete all the steps here and in the  Okta documentation .

  1. Log in to the Okta Admin Console and select  ApplicationsApplications .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Click  Browse App Catalog .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Search for and select  Palo Alto Networks Cloud Identity Engine .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Click  Add Integration .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Optionally edit the application name then click  Next .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Verify that  SAML 2.0  is the sign-on option type.

A screenshot of a computer

AI-generated content may be incorrect.

  1. If you enabled  Force Authentication in step 

6

, select  Applications , select the app you created, select  Sign-On Edit  the  Settings , and uncheck  Disable Force Authentication .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Edit and paste the  SAML Region .

The SAML Region is based on the Entity ID in the SP Metadata. To obtain the SAML Region, enter only the text between the backslash in the Entity ID and the  paloaltonetworks.com  domain. For example, if the Entity ID is  https://cloud-auth.us.apps.paloaltonetworks.com/sp , the SAML Region is  cloud-auth.us.apps .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Select the  Application username format  that you want to use to authenticate the user. For example,  Email  represents the UserPrincipalName (UPN) format.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Click  Done .

A screenshot of a computer

AI-generated content may be incorrect.

  1. (Optional) If you want to configure other attributes in addition to the username, refer to the  Okta documentation .

Integrate Okta as a Custom Application

Palo Alto Networks strongly recommends that you 

Integrate Okta as a Gallery Application

. However, if you want to configure the Okta integration as a custom application, complete the following steps.

  1. Log in to the Okta Admin Console and select  ApplicationsApplications .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Click  Create App Integration .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Verify that  SAML 2.0  is the sign-on method then click  Next .

A screenshot of a application

AI-generated content may be incorrect.

  1. Enter an  App name  then click  Next .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Copy the  SP Metadata  information from the Cloud Identity Engine and enter it in the Okta Admin Console as described in the following table:

Copy from Cloud Identity Engine

Enter in Okta Admin Console

Copy the  Entity ID  from the SP Metadata page.

Enter it as the  Audience URI (SP Entity ID) .

Copy the  Assertion Consumer Service URL .

Enter the URL as the  Single sign on URL .

  1. A screenshot of a computer

AI-generated content may be incorrect.
  2. ( Required for custom app ) Select a  Value  for the user attributes ( Attribute Statements (optional) ) and optionally enter a  Filter  for the group attributes ( Group Attribute Statements (optional) ) to specify the attribute formats.

You must configure at least one SAML attribute that contains identification information for the user (usually the username attribute) for the attributes to display in the Cloud Identity Engine. To configure administrator access, you must also enter values for the  accessdomain  attribute and for the  adminrole  attribute that match the values on the firewall.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Click  Next , specify whether you're a customer or partner, then click  Finish .
  2. Click  Add Rule  to define a  Sign On Policy  that specifies which users and groups must authenticate with the Okta IdP using the Cloud Identity Engine.
  3. Select  Assignments  and  Assign  the users and groups that you require to authenticate using the Cloud Identity Engine.  Save and Go Back  to assign more users or groups.

Be sure to assign the account you're using so you can test the configuration when it's complete. You may need to refresh the page after adding accounts to successfully complete the test.

  1. Select  Sign On  and  View Setup Instructions .
  2. Select the SAML attributes you want the firewall to use for authentication.

Configure PingOne as an IdP in the Cloud Identity Engine

Configure a profile to configure PingOne as an identity provider (IdP) in the Cloud Identity Engine. After you configure the IdP profile,  Configure Cloud Identity Engine Authentication on the Firewall or Panorama .

  1. Enable the Cloud Identity Engine app in PingOne.
    1. If you have not already done so,  activate  the Cloud Identity Engine app.
    2. In the Cloud Identity Engine app, select  AuthenticationSP MetadataDownload SP Metadata  and  Save  the metadata in a secure location.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Log in to PingOne and select  ApplicationsMy ApplicationsAdd ApplicationNew SAML Application .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Enter an  Application Name , an  Application Description , and select the  Category  then  Continue to Next Step .
    2. Select  I have the SAML configuration  and ensure the  Protocol Version  is  SAML v 2.0 .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Click  Select File  to  Upload Metadata

A screenshot of a computer

AI-generated content may be incorrect.

    1. Copy the metadata information from the Cloud Identity Engine and enter it in PingOne as described in the following table:

Copy from Cloud Identity Engine

Enter in PingOne

Copy the  Entity ID  from the SP Metadata page.

Enter it as the  Entity ID .

Copy the  Assertion Consumer Service URL .

Enter the URL as the  Assertion Consumer Service (ACS) .

    1. A screenshot of a computer

AI-generated content may be incorrect.
    2. Select either  RSA_SHA384  or  RSA_SHA256  as the  Signing Algorithm .

A screenshot of a computer

AI-generated content may be incorrect.

    1. If you want to require users to log in with their credentials to reconnect to GlobalProtect, select  Force Re-authentication .

A screenshot of a computer

AI-generated content may be incorrect.

    1. (Required for MFA) If you want to require multi-factor authentication for your users, select  Force MFA .
    2. Click  Continue to Next Step  to specify the attributes for the users you want to authenticate using PingOne.
    3. Specify the  Application Attribute  and the associated  Identity Bridge Attribute or Literal Value  for your user then select  Required .

Be sure to assign the account you're using so you can test the configuration when it's complete. You may need to refresh the page after adding accounts to successfully complete the test.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Click  Add new attribute  as needed to include additional attributes then  Continue to next step  to specify the group attributes.
    2. Add  the groups you want to authenticate using PingOne or  Search  for the groups you want to add then  Continue to next step  to review your configuration.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Add PingOne as an authentication type in the Cloud Identity Engine app.
    1. Select  Authentication Types  and click  Add New Authentication Type .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Set Up  a  SAML 2.0  authentication type.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Enter a  Profile Name .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select  PingOne  as your  Identity Provider Vendor .
  1. Select the method you want to use to  Add Metadata  and  Submit  the IdP profile.

Copy or Download from Okta Admin Console

Enter in Cloud Identity Engine IdP Profile

Copy the  Issuer  ID.

Enter it as the  Identity Provider ID .

Download  the  Signing Certificate .

Click to Upload  the certificate from the Okta Admin Console.

Copy the  Initiate Single Sign-On (SSO) URL .

Enter the URL as the  Identity Provider SSO URL .

A screenshot of a computer

AI-generated content may be incorrect.

1.c

.

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Select the  HTTP Binding for SSO Request to IdP  method you want to use for the SAML binding that allows the firewall and IdP to exchange request and response messages:
  1. Specify the  Maximum Clock Skew (seconds) , which is the allowed difference in seconds between the system times of the IdP and the firewall at the moment when the firewall validates IdP messages (default is 60; range is 1–900). If the difference exceeds this value, authentication fails.
  2. If your IdP requires users to log in using multi-factor authentication (MFA), select  Multi-factor Authentication is Enabled on the Identity Provider .

A screenshot of a computer

AI-generated content may be incorrect.

  1. If you enabled the  Force Re-authentication  option in step 

1.9

, enable the  Force Authentication  option to require users to log in with their credentials to reconnect to GlobalProtect.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Test SAML setup  to verify the profile configuration.

A screenshot of a computer

AI-generated content may be incorrect.

This step is necessary to confirm that your firewall and IdP can communicate.

  1. Select the SAML attributes you want the firewall to use for authentication and  Submit  the IdP profile.
    1. In the Okta Admin Console,  Edit  the  User Attributes & Claims .
    2. In the Cloud Identity Engine, select the  Username Attribute  and optionally, the  Usergroup Attribute Access Domain User Domain , and  Admin Role , then  Submit  your changes.

You must select the username attribute in the Okta Admin Console for the attribute to display in the Cloud Identity Engine.

  1. A screenshot of a computer

AI-generated content may be incorrect.

Configure PingFederate as an IdP in the Cloud Identity Engine

  1. Prepare the metadata for the Cloud Identity Engine app in PingFederate.
    1. If you have not already done so,  activate  the Cloud Identity Engine app.
    2. In the Cloud Identity Engine app, select  AuthenticationSP MetadataDownload SP Metadata  and  Save  the metadata in a secure location.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Log in to PingFederate and select  SystemSP AffiliationsProtocol MetadataMetadata Export .
    2. Select  I am the Identity Provider (IdP)  then click  Next .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select information to include in metadata manually  then click  Next .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select the  Signing key  you want to use then click  Next .
    2. Ensure that  SAML 2.0  is the protocol then click  Next .
    3. Click  Next  as you don't need to define an attribute contract.
    4. Select the  Signing Certificate  and that you want to  Include this certificate’s public key certificate in the <key info> element .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select the  Signing Algorithm  you want to use then click  Next .
    2. Select the same certificate as the  Encryption certificate  then click  Next .
    3. Review the metadata to verify the settings are correct then  Export  the metadata.

A screenshot of a computer

AI-generated content may be incorrect.

  1. Add PingFederate as an authentication type in the Cloud Identity Engine app.
    1. Select  Authentication Types  and click  Add New Authentication Type .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Set Up  a  SAML 2.0  authentication type.

A screenshot of a computer

AI-generated content may be incorrect.

    1. Enter a  Profile Name .

A screenshot of a computer

AI-generated content may be incorrect.

    1. Select  PingFederate  as your  Identity Provider Vendor .
  1. Select the method you want to use to  Add Metadata  and  Submit  the IdP profile.

Copy or Download from PingFederate

Enter in Cloud Identity Engine IdP Profile

Copy the  SAML 2.0 Entity  ID.

Enter it as the  Identity Provider ID .

Copy the  Base URL .

Enter the URL as the  Identity Provider SSO URL .

A screenshot of a computer

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

  1. The Cloud Identity Engine does not currently support the  Get URL  method for PingFederate.
  2. Specify the  Maximum Clock Skew (seconds) , which is the allowed difference in seconds between the system times of the IdP and the firewall at the moment when the firewall validates IdP messages (default is 60; range is 1–900). If the difference exceeds this value, authentication fails.
  3. To require users to log in using their credentials to reconnect to GlobalProtect, enable  Force Authentication .

A screenshot of a computer

AI-generated content may be incorrect.

  1. Test SAML setup  to verify the profile configuration.

A screenshot of a computer

AI-generated content may be incorrect.

This step is necessary to confirm that your firewall and IdP can communicate.

  1. Select the SAML attributes you want the firewall to use for authentication and  Submit  the IdP profile.
    1. In the Cloud Identity Engine, select the  Username Attribute .
    2. (Optional) Select the  Usergroup Attribute Access Domain User Domain , and  Admin Role .

A screenshot of a computer

AI-generated content may be incorrect.