Skip to main content

Palo Alto Prisma Access - Proxy chaining (Preview)

PREVIEW — This integration is in preview. Configuration steps are accurate, but some capabilities are subject to change.

Overview

This integration enables organizations to redirect all public GenAI traffic to SurePath AI through Prisma Access Explicit Proxy's upstream proxy chaining capability. Using this method, Prisma Access acts as the downstream proxy for user traffic and forwards GenAI requests matching a configured URL category upstream to the SurePath AI proxy before the traffic reaches its final destination. This approach provides complete visibility in both Prisma Access and SurePath AI logging systems, allowing admins to use either platform for troubleshooting or analysis.

Organizations implementing this integration should understand that all users whose traffic matches the configured upstream proxy policy will have their public GenAI access redirected to SurePath AI. When the X-Authenticated-User (XAU) header is configured in the upstream proxy profile as described in this document, users will have a fully transparent experience without any authentication prompts. Without the XAU header configuration, users would be required to authenticate using SSO before gaining access to any GenAI services governed by SurePath AI.

Prisma Access supports two management interfaces for this configuration: Strata Cloud Manager and Panorama. Both paths achieve the same result; admins should follow the steps that correspond to their organization's management approach. The configuration steps for each are covered in separate sections below.

For POC or pilot deployments, admins can configure specific source users or groups in the upstream proxy policy rule to limit redirection to a subset of users before expanding to the full organization.

Prerequisites

Before configuring Prisma Access, admins should verify the environment requirements, ensure the SurePath AI Root CA is distributed to endpoints, and gather the necessary configuration information from the SurePath AI platform.

Verify Prisma Access environment requirements

This integration requires Prisma Access with Explicit Proxy deployed and operational. The upstream proxy chaining feature requires Prisma Access version 5.2.2 or later and a PAN-OS dataplane version of 11.2.6 or later. Proxy chaining is not available on earlier versions.

  • Confirm that Explicit Proxy is already configured and active in the Prisma Access environment before proceeding

  • Verify the Prisma Access version meets the minimum requirements listed above

  • Consult the Prisma Access documentation for guidance on setting up Explicit Proxy if it is not yet configured

Distribute SurePath AI Root CA to endpoints

SurePath AI recommends that organizations distribute the SurePath AI Root CA to all endpoints as a trusted certificate authority before beginning the Prisma Access configuration. When Prisma Access forwards traffic to SurePath AI, SurePath AI performs TLS inspection and presents its certificate to end users. Distributing the SurePath AI Root CA to endpoints ensures users do not encounter certificate trust errors or warnings regardless of which services Prisma Access decrypts versus which are decrypted by SurePath AI.

To download and distribute the certificate:

  • In the Admin UI, click Organization in the CONFIGURE section and select the Integration tab

  • Select the certificate format appropriate for the endpoint operating systems

  • Click the DOWNLOAD CERTIFICATE button

  • Distribute the SurePath AI Root CA using existing certificate deployment mechanisms, such as Group Policy, Mobile Device Management (MDM) platforms, or endpoint management tools

Gather configuration information

Admins must collect several items from the SurePath AI platform that will be used during the Prisma Access configuration steps. These include the proxy address that Prisma Access will forward traffic to and the curated list of GenAI sites that defines which domains should be redirected.

SurePath AI proxy address

The SurePath AI proxy address is the hostname that Prisma Access will use as the destination for forwarded GenAI traffic.

  • In the Admin UI, click Organization in the CONFIGURE section and select the Integration tab

  • Copy the proxy URL value and save it for use during the upstream proxy profile configuration step

SurePath AI public services catalog

SurePath AI maintains and curates a list of GenAI sites across the public internet, including vendor names and associated risk levels. This list is downloaded in Palo Alto URL EDL format and imported into Prisma Access as a custom URL category.

  • In the Admin UI, click Public Services in the GOVERN section

  • Click the DOWNLOAD CATALOG button

  • Select Palo Alto URL EDL from the download format dropdown

  • Click DOWNLOAD to save the file

The downloaded file will be named similar to surepath-ai-public-services-palo-alto-url-edl-YYYY-MM-DD.txt. Admins should not add additional URLs to this file. If there are sites that need to be added to the catalog, the admin should contact their SurePath AI technical representative for guidance on the appropriate approach.

Understanding X-Authenticated-User (XAU) header

The X-Authenticated-User header is a critical component of this integration that enables transparent user identification without requiring SSO authentication prompts. When properly configured, the XAU header dramatically improves the user experience by eliminating the need for users to authenticate when accessing public GenAI services.

How XAU works with SurePath AI

When Prisma Access forwards traffic to the SurePath AI proxy, it inserts the X-Authenticated-User header into each request. This header contains the authenticated username of the end user whose traffic is being proxied (encoded in base64 format). SurePath AI validates that the traffic is coming from a trusted Prisma Access connector (configured as a Network Ingress Connector in the SurePath AI admin) and then automatically associates the user's identity with their GenAI activity without requiring an additional authentication step. This creates a fully transparent experience where users can access GenAI services without any interruption or authentication prompts.

XAU requirements by deployment type

Organizations using SurePath AI Discovery mode must configure the XAU header, as it is the only method for SurePath AI to identify which users are accessing GenAI services. Without the XAU header, Discovery mode cannot attribute activity to individual users.

For non-Discovery organizations, the XAU header is optional but strongly recommended. Without XAU, users will be redirected to an SSO authentication page the first time they access any GenAI service governed by SurePath AI. While this authentication is typically cached for a period of time, enabling XAU eliminates this authentication requirement entirely and provides the best user experience.

The XAU header configuration is completed during the upstream proxy profile creation step outlined in this document. Palo Alto recommends selecting the Connect layer for XAU header insertion and enabling the SSL channel option for secure communication between Prisma Access and SurePath AI.

Prisma Access configuration steps

The Prisma Access configuration process involves three main steps: creating a custom URL category containing all GenAI domains from the SurePath AI catalog, creating an upstream proxy profile that points to the SurePath AI proxy address and configures the XAU header, and creating an upstream proxy policy rule that matches GenAI traffic against the URL category and forwards it to SurePath AI.

Separate instructions are provided below for organizations managing Prisma Access through Strata Cloud Manager and through Panorama.

Configuration via Strata Cloud Manager

Access the Strata Cloud Manager console

  • Navigate to the Palo Alto Networks Hub and open the Prisma Access app

Create the custom URL category

The custom URL category contains all the individual hostnames and domains from the SurePath AI public services catalog. This category defines what traffic should be considered GenAI traffic for the purpose of the upstream proxy policy rule.

  • Navigate to Configuration > NGFW and Prisma Access > Security Services > URL Access Management

  • Click Add Category

  • Enter a descriptive name—these instructions use SurePathAI as the example name throughout

  • Set the Type field to URL List

  • Click Import and select the SurePath AI public services catalog text file downloaded during the prerequisites step (one hostname per line)

  • Click Save

The custom URL category should now appear in the list of configured URL categories. The number of services listed in the SurePath AI catalog will not match the number of lines in the file. The line count will be higher because some GenAI services require multiple hostnames to capture all relevant traffic.

Create the upstream proxy profile

The upstream proxy profile defines SurePath AI as the forwarding destination for GenAI traffic. It specifies the proxy hostname and port and configures the XAU header that enables transparent user identification.

  • Navigate to Configuration > NGFW and Prisma Access > Network Policies > Upstream Proxy Policy

  • Set the Configuration Scope to Explicit Proxy

  • Under Upstream Proxy Policy, click Profiles and then Add Profile

  • Enter a descriptive name—these instructions use SurePathAI throughout

  • Set the Primary Proxy field to the SurePath AI proxy URL value copied from the Admin UI in the prerequisites section

  • Confirm the port is set to 8080 unless the organization has received specific instructions from SurePath AI to use a different port number

  • Leave the Secondary Proxy field empty (multiple SurePath AI proxies respond from the hostname provided for high availability)

Configure X-Authenticated-User header (Recommended)

As described in the "Understanding X-Authenticated-User (XAU) header" section above, enabling the XAU header eliminates the need for users to authenticate via SSO when accessing public GenAI services.

  • Under the optional headers section, enable the XAU header

  • Set the Layer to Connect

  • Enable Connect Upstream Proxy over SSL Channel to ensure secure communication between Prisma Access and SurePath AI

  • Click Save

When the Connect layer is selected without the SSL channel option, or when the HTTP layer is selected, Palo Alto recommends that decryption is enabled on PAN-OS to protect the header content in transit.

Create the upstream proxy policy rule

The upstream proxy policy rule instructs Prisma Access to redirect traffic matching the custom URL category to the SurePath AI proxy profile. This is the policy that actually enables the integration and begins redirecting GenAI traffic.

  • Under Upstream Proxy Policy, click Rules and then Add Upstream Proxy Policy Rules

  • Enter a descriptive name—these instructions use SurePathAI throughout

  • Under Match Criteria > Source:

    • For pilot or POC deployments, specify individual Users or Address Groups to limit the policy to test users or groups

    • For production deployments, leave the value set to Any to apply the policy to all users

  • Under Match Criteria > Destination, set URL Category to the custom URL category created earlier (named SurePathAI in these examples)

  • Under Action, set Upstream Proxy to the profile created in the previous step (named SurePathAI in these examples)

  • Set the Fallback Action to the appropriate behavior for the organization:

    • Failopen allows traffic to egress directly through Prisma Access if SurePath AI is unreachable

    • Failclose resets or drops the connection if SurePath AI is unreachable

  • Enable the rule (rules must be enabled for the configuration to be saved)

  • Click Save

In Prisma Access, rules are evaluated from top to bottom. The SurePath AI upstream proxy rule should be positioned appropriately within the organization's overall policy structure to ensure GenAI traffic is forwarded before other rules can take effect.

  • Click Push Config to deploy the configuration

Configuration via Panorama

Access the Panorama console

  • Log in to the Panorama management console using the organization-specific URL

Create the custom URL category

The custom URL category contains all the individual hostnames and domains from the SurePath AI public services catalog. In Panorama, custom URL categories are managed as objects within the device group associated with the Explicit Proxy deployment.

  • Navigate to Objects > Custom URL Categories within the Explicit_Proxy_Device_Group

  • Click Add

  • Enter a descriptive name—these instructions use SurePathAI as the example name throughout

  • Set the Type field to URL List

  • Click Import and select the SurePath AI public services catalog text file downloaded during the prerequisites step (one hostname per line)

  • Click OK

Create the upstream proxy profile

  • Navigate to Panorama > Cloud Services > Configuration > Explicit Proxy > Upstream Proxy Configuration

  • Under Profiles, click Add

  • Enter a descriptive name—these instructions use SurePathAI throughout

  • Set the Primary Proxy field to the SurePath AI proxy URL value copied from the Admin UI in the prerequisites section

  • Confirm the port is set to 8080 unless the organization has received specific instructions from SurePath AI to use a different port number

  • Leave the Secondary Proxy field empty

Configure X-Authenticated-User header (Recommended)

  • Under the optional headers section, enable the XAU header

  • Set the Layer to Connect

  • Enable Connect Upstream Proxy over SSL Channel to ensure secure communication between Prisma Access and SurePath AI

  • Click OK to save the profile

Create the upstream proxy policy rule

  • Under Upstream Proxy Configuration, click Rules and then Add

  • Enter a descriptive name—these instructions use SurePathAI throughout

  • Under Match Criteria > Source:

    • For pilot or POC deployments, specify individual Users or Address Groups to limit the policy to test users or groups

    • For production deployments, leave the value set to Any to apply the policy to all users

  • Under Match Criteria > Destination, set URL Category to the custom URL category created earlier (named SurePathAI in these examples)

  • Under Action, set Upstream Proxy to the profile created in the previous step (named SurePathAI in these examples)

  • Set the Fallback Action to the appropriate behavior for the organization:

    • Failopen allows traffic to egress directly through Prisma Access if SurePath AI is unreachable

    • Failclose resets or drops the connection if SurePath AI is unreachable

  • Enable the rule and click OK

In Prisma Access, rules are evaluated from top to bottom. The SurePath AI upstream proxy rule should be positioned appropriately to ensure GenAI traffic is forwarded before other rules can take effect.

  • Click Commit and Push and push the configuration to the Explicit_Proxy_Device_Group

Verification and troubleshooting

After the configuration is pushed and deployed to test users or groups, admins can verify the integration using the SurePath AI Ready tool. Users whose traffic is being redirected should see successful validation results for both certificate trust and network configuration. If either test fails, admins should verify that the custom URL category, upstream proxy profile, and upstream proxy policy rule are all configured correctly and that the rule is enabled and applied to the intended user population.

Did this answer your question?