Group
Mapping
Learn why the firewall needs to query an LDAP directory for group membership even when your IdP sends group information in authentication assertions.
| Where Can I Use This? | What Do I Need? |
| NGFW (Managed by PAN-OS or Panorama) |
|
To define policy rules based on user or group, first
you create an LDAP server profile that defines how the firewall
connects and authenticates to your directory server. The firewall
supports a variety of directory servers, including Microsoft Active
Directory (AD), Novell eDirectory, and Sun ONE Directory Server.
The server profile also defines how the firewall searches the directory
to retrieve the list of groups and the corresponding list of members.
If you are using a directory server that is not natively supported
by the firewall, you can integrate the group mapping function using
the XML API. You can then create a group mapping configuration to
Map Users to Groups and
Enable User- and Group-Based Policy.
When you use SAML, RADIUS, or TACACS+ for authentication, the identity provider (IdP)
sends an assertion that reflects user attributes at the moment of authentication. PAN-OS®
references SAML group attributes in one specific context: the User Group
Attribute in an authentication profile, where the firewall compares the value
against the Allow List to control who can authenticate. The firewall does not use SAML
assertion data to populate its user-to-group mapping table for policy enforcement or
reporting. Group-based security policy evaluation, GlobalProtect® app configurations, and
log queries and reports by user group all require a persistent, queryable source of group
information. LDAP-based group mapping or the Cloud Identity Engine (CIE) fills this role.
User-ID™ queries your directory service and builds a local user-to-group mapping table that
the firewall refreshes at a configurable interval. During policy evaluation, the firewall
checks this directory-built table, not the IdP assertion.
Defining policy rules based on group membership rather than on
individual users simplifies administration because you don't have
to update the rules whenever new users are added to a group. When
configuring group mapping, you can limit which groups will be available
in policy rules. You can specify groups that already exist in your
directory service or define custom groups based on LDAP filters.
Defining custom groups can be quicker than creating new groups or
changing existing ones on an LDAP server, and doesn't require an
LDAP administrator to intervene. User-ID maps all the LDAP directory
users who match the filter to the custom group. For example, you
might want a security policy that allows contractors in the Marketing Department
to access social networking sites. If no Active Directory group
exists for that department, you can configure an LDAP filter that
matches users for whom the LDAP attribute Department is set to Marketing.
Log queries and reports that are based on user groups will include
custom groups.