Device > User Identification > Group Mapping Settings Tab
- DeviceUser IdentificationGroup Mapping Settings
To base security policies and reports on users and user groups, the firewall retrieves the list of groups and the corresponding list of members specified and maintained on your directory servers. The firewall supports a variety of LDAP directory servers, including the Microsoft Active Directory (AD), the Novell eDirectory, and the Sun ONE Directory Server.
The number of distinct user groups that each firewall or Panorama can reference across all policies varies by model. Regardless of model, though, you must configure an LDAP server profile (Device > Server Profiles > LDAP) before you can create a group mapping configuration.
The complete procedure for mapping usernames to groups requires additional tasks besides creating group mapping configurations.
Add and configure the following fields as needed to create a group mapping configuration. To remove a group mapping configuration, select and Delete it. If you want to disable a group mapping configuration without deleting it, edit the configuration and clear the Enabled option.
Group Mapping Settings—Server Profile
DeviceUser IdentificationGroup Mapping Settings
Enter a name to identify the group mapping configuration (up to 31 characters). The name is case-sensitive and must be unique. Use only letters, numbers, spaces, hyphens, and underscores.
DeviceUser IdentificationGroup Mapping SettingsServer Profile
Select the LDAP server profile to use for group mapping on this firewall.
Specify the interval in seconds after which the firewall will initiate a connection with the LDAP directory server to obtain any updates that were made to the groups that firewall policies use (range is 60 to 86,400).
By default, User Domain is blank: the firewall automatically detects the domain names for Active Directory servers. If you enter a value, it overrides any domain names that the firewall retrieves from the LDAP source. Your entry must be the NetBIOS name.
This field affects only the usernames and group names retrieved from the LDAP source. To override the domain associated with a username for user authentication, configure the User Domain and Username Modifier for the authentication profile you assign to that user (see Device > Authentication Profile).
Select this option to enable server profile for group mapping.
Fetch list of managed devices
For GlobalProtect deployments, select this option to allow the firewall to retrieve serial numbers from a directory server (such as Active Directory). This enables GlobalProtect to identify the status of connecting endpoints and enforce HIP-based security policies based on the presence of the endpoint serial number.
|User Attributes||Device > User Identification > Group Mapping Settings > User and Group Attributes|
Specify the directory attributes to identify users:
Specify the attributes that the User-ID sources use to identify groups:
DeviceUser IdentificationGroup Mapping SettingsGroup Include List
Use these fields to limit the number of groups that the firewall displays when you create a security rule. Browse the LDAP tree to find the groups you want to use in rules. To include a group, select and add ( ) it in the Available Groups list. To remove a group from the list, select and delete ( ) it from the Included Groups list.
The combined maximum for the Included Groups and Custom Group lists is 640 entries for each group mapping configuration.
Include only the groups you need so that the firewall retrieves user group mappings for only the necessary groups and not for the whole tree from the LDAP directory.
DeviceUser IdentificationGroup Mapping SettingsCustom Group
Create custom groups based on LDAP filters so that you can base firewall policies on user attributes that don’t match existing user groups in the LDAP directory.
The User-ID service maps all the LDAP directory users who match the filter to the custom group. If you create a custom group with the same Distinguished Name (DN) as an existing Active Directory group domain name, the firewall uses the custom group in all references to that name (for example, in policies and logs). To create a custom group, Add and configure the following fields:
Use only indexed attributes in the filter to expedite LDAP searches and minimize the performance impact on the LDAP directory server; the firewall does not validate LDAP filters.
The combined maximum for the Included Groups and Custom Group lists is 640 entries.
To delete a custom group, select and Delete it. To make a copy of a custom group, select and Clone it and then edit the fields as appropriate.
After adding or cloning a custom group, you must Commit your changes before your new custom group is available in policies and objects.
Enable Group Mapping
Enable Group Mapping Because the agent or app running on your end-user systems requires the user to successfully authenticate before being granted access to GlobalProtect, ...
Map Users to Groups
Map Users to Groups Defining policy rules based on user group membership rather than individual users simplifies administration because you don’t have to update the ...
Group Mapping To define policy rules based on user or group, first you create an LDAP server profile that defines how the firewall connects and ...
Configure User-ID for Numerous Mapping Information Sources
Configure User-ID for Numerous Mapping Information Sources Configure Windows Log Forwarding on the member servers that will collect login events. Configure Windows Log Forwarding . ...
Enable Policy for Users with Multiple Accounts
Enable Policy for Users with Multiple Accounts If a user in your organization has multiple responsibilities, that user might have multiple usernames (accounts), each with ...
User Identification User Identification (User-ID™) is a Palo Alto Networks® next-generation firewall feature that seamlessly integrates with a range of enterprise directory and terminal services ...
Enable User-ID The user identity, as opposed to an IP address, is an integral component of an effective security infrastructure. Knowing who is using each ...
Include User-ID Information in WildFire Logs and Reports
Include User-ID Information in WildFire Logs and Reports Enable the firewall to match User-ID information with email header information, so that the User-ID for the ...
Configure an Authentication Profile
Authentication Profile Device > Authentication Profile Select Device Authentication Profile or Panorama Authentication Profile to manage authentication profiles. To create a new profile, Add one ...