Manage the Cloud Identity Engine App
Table of Contents
Expand all | Collapse all
-
- Cloud Identity Engine Attributes
- Collect Custom Attributes with the Cloud Identity Engine
- View Directory Data
- Cloud Identity Engine User Context
- Create a Cloud Dynamic User Group
- Configure Third-Party Device-ID
- Configure an IP Tag Cloud Connection
- Configure Dynamic Privilege Access in the Cloud Identity Engine
- Configure Security Risk for the Cloud Identity Engine
-
-
- Configure Azure as an IdP in the Cloud Identity Engine
- Configure Okta as an IdP in the Cloud Identity Engine
- Configure PingOne as an IdP in the Cloud Identity Engine
- Configure PingFederate as an IdP in the Cloud Identity Engine
- Configure Google as an IdP in the Cloud Identity Engine
- Configure a SAML 2.0-Compliant IdP in the Cloud Identity Engine
- Configure a Client Certificate
- Configure an OIDC Authentication Type
- Set Up an Authentication Profile
- Configure Cloud Identity Engine Authentication on the Firewall or Panorama
- Configure the Cloud Identity Engine as a Mapping Source on the Firewall or Panorama
- Configure Dynamic Privilege Access in the Cloud Identity Engine
-
- Get Help
Manage the Cloud Identity Engine App
Learn how to manage your Cloud Identity Engine tenants
and how to collect customized directory attributes.
After you have configured the Cloud Identity Engine, you can add, rename, or delete tenants and
collect any custom attributes in your directory, as well as view a list of the default
attribute formats. You can also view the comprehensive information that the Cloud
Identity Engine collects.
To ensure consistent security policy enforcement, you can configure segments for granular
data sharing across your network You can also configure context-based groups that
update membership automatically based on criteria that you select.
If you use Device-ID and third-party devices to identify
IoT devices on your network, you can use the Cloud Identity Engine to share device
mappings with your Prisma Access Nodes.
If you use dynamic address groups for your tag-based security
policy, you can use the Cloud Identity Engine to collect and redistribute
mappings across your network to help ensure consistent policy enforcement.