NGFW and Prisma Access Managed by Panorama
Focus
Focus
AI Access Security

NGFW and Prisma Access Managed by Panorama

Table of Contents


NGFW and Prisma Access Managed by Panorama

Enable role-based access to AI Access Security for NGFW (Managed by Panorama) and Prisma Access (Managed by Panorama).
  1. (Prisma Access) Enable role-based access for Prisma Access (Managed by Panorama).
    This defines which admins can push configuration changes from Panorama to your Prisma Access tenants.
  2. (Optional) Enable role-based access for Enterprise Data Loss Prevention (E-DLP) for your NGFW and Prisma Access on Panorama.
    This defines the access privileges to configure Enterprise DLP data patterns and profiles which define what is considered sensitive data that must be blocked. Skip this step if you have already configured role-based access to Enterprise DLP or do not want to configure access to Enterprise DLP for the user.
  3. Assign role-based access for AI Access Security.
    You don’t need to configuring a tenant role for a user if access to only Enterprise DLP is required.
    1. Select User and for the Identity Address, enter the email address for which you granted access in the previous step.
    2. For Apps & Services, select AI Access Security.
    3. Select a predefined Common Services Role.
  4. Add Another to enable additional role-based access to subscriptions for the admin on Strata Cloud Manager.
    You must click Add Another for each you subscription you want to enable role-based access. Skip this step if you only want to enable role-based access to AI Access Security.
    1. Enable role-based access for Prisma Access.
      This controls which parts of Strata Cloud Manager the admin has access to. For example, if the assigned role privileges does not allow the admin access to Web Security policy rules then the admin cannot implement policy rules to control access to GenAI apps.
    2. Enable role-based access for Enterprise Data Loss Prevention (E-DLP) on Strata Cloud Manager.
      This defines the access privileges to configure Enterprise DLP data patterns and profiles which define is what considered sensitive data that must be blocked.
    3. Add Another and enable role-based access for SaaS Security Inline on Strata Cloud Manager.
      Review the role privileges if you are assigning a predefined role to the admin. Role based access to SaaS Security Inline can giver your admin the privileges to tag and configure the risk score for GenAI apps.
  5. Submit.