Set Up an Authentication Profile
Table of Contents
Expand all | Collapse all
-
- Cloud Identity Engine Attributes
- Collect Custom Attributes with the Cloud Identity Engine
- View Directory Data
- Cloud Identity Engine User Context
- Create a Cloud Dynamic User Group
- Configure Third-Party Device-ID
- Configure an IP Tag Cloud Connection
- Configure Dynamic Privilege Access in the Cloud Identity Engine
- Configure Security Risk for the Cloud Identity Engine
-
-
- Configure Azure as an IdP in the Cloud Identity Engine
- Configure Okta as an IdP in the Cloud Identity Engine
- Configure PingOne as an IdP in the Cloud Identity Engine
- Configure PingFederate as an IdP in the Cloud Identity Engine
- Configure Google as an IdP in the Cloud Identity Engine
- Configure a SAML 2.0-Compliant IdP in the Cloud Identity Engine
- Configure a Client Certificate
- Configure an OIDC Authentication Type
- Set Up an Authentication Profile
- Configure Cloud Identity Engine Authentication on the Firewall or Panorama
- Configure the Cloud Identity Engine as a Mapping Source on the Firewall or Panorama
- Configure Dynamic Privilege Access in the Cloud Identity Engine
-
- Get Help
Set Up an Authentication Profile
Configure an authentication profile to use
to authenticate users with the Cloud Identity Engine. You can specify
one or more authentication types by group or by directory or for
all directories.
To use more than one authentication type in your authentication profile, you must configure a directory in
the Cloud Identity Engine. For a single client certificate authentication type,
configuring a directory in the Cloud Identity Engine is optional. There is no
directory requirement for a single SAML 2.0-compliant authentication type.
- Select AuthenticationAuthentication Profiles then Add Authentication Profile.If you have not already done so, Configure a SAML 2.0 Authentication Type or Configure a Client Certificate to use as an authentication type.Enter a unique Profile Name.Select the Authentication Mode.
- If you select Single as the authentication mode, click Select authentication type and select the authentication type you want to use.
- If either of the following apply to your configuration, select the Directory Sync
Username Attribute and Directory Sync Group
Attribute.
- You selected Multiple as the Authentication Mode and you have configured a client certificate.
- You selected Single and the Authentication Type is Client Certificate.
To successfully authenticate users using a client certificate, the value of the Directory Sync Username Attribute must match the value of the Username Attribute you select when you configure the Client Certificate Authentication Type.
(Multiple Authentication Mode only) Define the Authentication mapping order by selecting the configured authentication types that you want to use to authenticate users.(Multiple Authentication Mode only) During authentication, the Cloud Identity Engine uses the given user identity information to obtain the directory group information for the user to determine if the user’s group has an assigned authentication type. If the user belongs to multiple groups, the Cloud Identity Engine uses the first authentication type you assign to the group for user authentication.Select the Default authentication type that you want the Cloud Identity Engine to use to authenticate users if the user is not in an assigned group.As a best practice, assign an authentication type for each group you want to authenticate using the Cloud Identity Engine.Choose directories and groups by selecting a directory or selecting All Directories.You can also search by Directory Sync Group Attribute (such as Common-Name).Select the group or groups from each directory that you want to authenticate using the authentication type you select in the next step.Select an authentication type and Assign it to assign this authentication type to the group or groups you selected.Review your selections by authentication type or select All Authentication Types to see all assigned groups.Submit your changes to configure the authentication profile.