How to troubleshoot App based enhanced SaaS tenant control

How to troubleshoot App based enhanced SaaS tenant control

249
Created On 09/23/25 07:44 AM - Last Modified 02/06/26 03:32 AM


Objective


The customer is using App based Enhanced SaaS Tenants Control and reporting a problem that the tenant controls are not working as expected.



Environment


  • Prisma Access
  • SaaS inline


Procedure


  • The App based enhanced SaaS tenant control is not the same as Http header insertion method.
  • This is a functionality based on SaaS Inline license. 
  • The SaaS inline discovers the tenants for supported applications
  • The administrator needs to create tenant control rules from SaaS inline policy recommendation and then sync them across panorama or SCM and push.
  • The workflow using Internet Access rule is also supported provided the SCM version is greater then 2025.r4.4


Additional Information


  • The rules on the end firewalls will show custom created apps (Unique to that tenant) which will have specific application level signatures.
  • For example, a rule for sharepoint app will have custom apps created for that tenant 
    Sanctioned-rule_Mobile_Users_Container xxxxxxxxxxxxx {
                source any;
                negate-source no;
                destination any;
                to untrust;
                from any;
                service application-default;
                category any;
                action allow;
                destination-hip any;
                source-hip any;
                source-user any
                log-end yes;
                log-setting "Cortex Data Lake";
                application [sharepoint-create-1755485523717 sharepoint-delete-1755485523717 sharepoint-download-1755485523 sharepoint-online sharepoint-post-1755485523717 sharepoint-share-1755485523717 sharepoint-upload-1755485523717];
                profile-setting {
                  group best-practice;
                }
  • These custom apps will have tenant level signature which are unique to that customer. 
    sharepoint-create-1755485523717 {
            subcategory analytics;
            category saas;
            technology browser-based;
            risk 1;
            parent-app sharepoint-online-uploading;
            default {
              port [ tcp/80 tcp/443];
            }
            signature {
              create1-g0 {
                and-condition {
                  "And Condition 1" {
                    or-condition {
                      "Or Condition 0" {
                        operator {
                          pattern-match {
                            qualifier {
                              http-method {
                                value POST;
                              }
                            }
                            pattern "^( |)customer\.sharepoint\.com";
                            context http-req-host-header;
    
  • Once this part is validated that the correct app signatures are there, Continue with regular PanOS based troubleshooting for application match for troubleshooting the issue further.
  • If the app based signatures are not available on the firewall rules, Troubleshoot SaaS inline first.

 



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA1Ki000000kAI2KAM&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail