Error:
An unexpected error occurred. Please click Reload to try again.
Error:
An unexpected error occurred. Please click Reload to try again.
How to Configure Group Mapping Settings - Knowledge Base - Palo Alto Networks

How to Configure Group Mapping Settings

239971
Created On 09/25/18 17:27 PM - Last Modified 04/03/24 08:31 AM


Environment


  • Palo Alto Firewall.
  • PAN-OS 8.1 or higher.
  • Group Mapping.


Resolution


Overview

The Palo Alto Networks firewall can retrieve user-to-group mapping information from an LDAP server, such as, Active Directory or eDirectory. The data can be retrieved through LDAP queries from the firewall (via agent-less User-ID) or by a User-ID Agent that is configured to proxy the firewall LDAP queries. This document describes how to configure Group Mapping on a Palo Alto Networks firewall.

 

Steps

  1. Configure the LDAP server profile: How to Configure LDAP Server Profile
  2. Configure how groups and users are retrieved from the LDAP directory by creating a new group mapping entry by navigating to the Device > User Identification > Group Mapping Settings tab and click 'Add'. Refer to screenshot below.
    group mapping.png
  3. Enter a Name. For Palo Alto Networks that support multiple virtual system, a drop-down list (Location) will be available to select from.
  4. Specify the LDAP server profile (configured in step 1) in the drop-down list under the Server Profile tab.
    Note: All Attributes and ObjectClasses will be populated based on the directory server type you selected in the “LDAP Server Profile”.
  5. The default update interval for user groups changes is 3600 seconds (1 hour). Enter a value to specify a custom interval.
  6. Go to the Group Include List tab. Leave the include list blank if you want to include ALL groups, or select the groups to be included from the left column that should be mapped.
Note: As a best practice, retrieve only the groups you will use in your group-based security policy and configuration by using the group include list or applying a custom search filter.

 

CLI commands to check the groups retrieved and connection to the LDAP server:

> show user group-mapping state all

> show user group list

> show user group name <group name>

 

Note: When multiple group-mappings are configured with same base dn or ldap server, each group-mapping must include non-overlapping groups i.e include group list must not have any common group.



Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClFQCA0&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Choose Language