<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Consuming user group in GlobalProtect SAML Authentication in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/361292#M2004</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is indeed an excellent workaround, tested here also in 8.1. Thanks for this information, it's really useful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Usually, we rely on our Active Directory, which is old enough to be primarily based on the SAM Account Name, which is what the NGFW is looking for by default, in the following format : Domain\SAMAccountName (ie. acme\doej)&lt;/P&gt;&lt;P&gt;We began using Okta to authenticate our GlobalProtect users for non-Windows or non-Domain devices, but it was impossible to use the "groups" attribute from the SAML assertion in the GlobalProtect configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We opened a case with TAC, and the answer was the following : this attribute can only be used in the "Allow List" of the Authentication Profile, but nowhere else :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GREMAUDO_0-1604665329252.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28531iCE46027EB6FF2E09/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="GREMAUDO_0-1604665329252.png" alt="GREMAUDO_0-1604665329252.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to make this work, the username sent by Okta in the assertion &lt;STRONG&gt;&lt;U&gt;must&lt;/U&gt;&lt;/STRONG&gt; be the same as the username that the NGFW understand by default, that is, the "Domain\SAMAccountName". This is not an easily available option in Okta.&lt;/P&gt;&lt;P&gt;In the GlobalProtect app in Okta :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2020-11-06_13h36_26.png" style="width: 680px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28533i0503103AD23F7700/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2020-11-06_13h36_26.png" alt="2020-11-06_13h36_26.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Edit the "Sign On" settings&lt;/LI&gt;&lt;LI&gt;Find "Credentials Details" section&lt;/LI&gt;&lt;LI&gt;Select "Custom" in the "Application username format"&lt;/LI&gt;&lt;LI&gt;Fill the field with this syntax :&amp;nbsp;"yourdomain\" + toLowerCase(active_directory_xxxx.samAccountName)&lt;BR /&gt;Please note that the "active_directory_xxxx" must match your directory ID, that you can find in the&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2020-11-06_13h39_51.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28534iFA6227081874DE35/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2020-11-06_13h39_51.png" alt="2020-11-06_13h39_51.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This only works, however, if you have an LDAP server somewhere... With Okta, I know there is a way to use it as an LDAP server, which might do the trick, like described in this link : &lt;A href="https://help.okta.com/en/prod/Content/Topics/Directory/LDAP-interface-main.htm" target="_blank"&gt;https://help.okta.com/en/prod/Content/Topics/Directory/LDAP-interface-main.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With all this combined with a bit of Group-Mapping, you could tinker this to work as expected ! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's unfortunate that PAN does not seem to want to integrate a wider use of the group attribute of the SAML Assertion. It complexifies the use of SAML, with little to no documentation... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 06 Nov 2020 12:46:37 GMT</pubDate>
    <dc:creator>GREMAUDO</dc:creator>
    <dc:date>2020-11-06T12:46:37Z</dc:date>
    <item>
      <title>Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/161703#M1990</link>
      <description>&lt;P&gt;A bit of background: We are an all-Google G Suite company. We do not have internal LDAP servers. Everyone auths to Google. We are using PA 3060s as our firewalls and VPN systems.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are getting ready to turn on SAML authentication for GlobalProtect. We are using Google as our IdP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've gotten it working, but I want to make policy decisions based on the user group that we are returning in the SAML assertion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In Google, I have a user attribute with a "role" specified for each user, and then we are passing this back to the firewalls via a attribute mapping in our SAML App definition in Google.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Within the SAML authentication profile in the firewalls, I have set the User Group attribute to "role", and when I connect to the portal through Burp Suite, I see a SAML "role" attribute being returned from Google and asserted to the firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, I have not found a way to use this "role" attribute in client IP pool assignments or in making policy decisions. I have tried making a local group that matches the "role" value, but that does not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone done this, or have any insight on this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mark&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 21:15:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/161703#M1990</guid>
      <dc:creator>mtsujihara</dc:creator>
      <dc:date>2017-06-16T21:15:49Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/161728#M1991</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/51240"&gt;@mtsujihara&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I don't know it this user-group-mapping fof SAML users is possible. Probably not because the default group-mapping in the WebUI requires an LDAP profile.&lt;/P&gt;&lt;P&gt;But may be you should give this a try for the creation of groups and containing users:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/xml-api/pan-os-xml-api-request-types/apply-user-id-mapping-and-populate-dynamic-address-groups-api" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/xml-api/pan-os-xml-api-request-types/apply-user-id-mapping-and-populate-dynamic-address-groups-api&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2017 23:17:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/161728#M1991</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2017-06-16T23:17:59Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/194258#M1992</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/51240"&gt;@mtsujihara&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Could you please show me how to configure PA using Google SAML as IdP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you in advance,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Army&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 08:55:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/194258#M1992</guid>
      <dc:creator>altplus</dc:creator>
      <dc:date>2018-01-08T08:55:55Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/222496#M1993</link>
      <description>&lt;P&gt;I've gotten GSuite SAML2.0 working and have GSuite configured to send the user's "Department" as the "group" attribute. In the PA, I have the&amp;nbsp;"User Group Attribute" set the "group". As the OP says, I don't see that I can use the "group" value anywhere (policies, etc).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone gotten this to work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jul 2018 07:34:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/222496#M1993</guid>
      <dc:creator>MikeTewner</dc:creator>
      <dc:date>2018-07-17T07:34:12Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/222561#M1994</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/93527"&gt;@MikeTewner&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;The firewall won't let you use that attribute the same as you would with an LDAP group. The link that&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;provided describes how you could probably script this to assign users to different groups using the xml-api and how you would format the input file that you would need to put together for this.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would recommend reaching out to your SE and setting up a feature request.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jul 2018 17:11:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/222561#M1994</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-07-17T17:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/222578#M1995</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/93527"&gt;@MikeTewner&lt;/a&gt;&lt;/P&gt;&lt;P&gt;It depends on how much you really need this group mapping for SAML authenticated users ... it will be a bit of work&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Set up a webserver&lt;/LI&gt;&lt;LI&gt;Create a log forwarding profile for system logs that applies for global protect login and logout logs and send these logs to your webserver&lt;/LI&gt;&lt;LI&gt;Create a web application on your webserver that processes these http request with the logs from your firewall&lt;/LI&gt;&lt;LI&gt;For every log that the webserver receives your web application needs to push that information to the firewall API to create dynamic User-IP-Group mappings and also delete them when a user logs out&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;4 "simple" steps and you have implemented what you need &lt;span class="lia-unicode-emoji" title=":face_with_tongue:"&gt;😛&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I recommend the feature request anyway ...&lt;/P&gt;</description>
      <pubDate>Tue, 17 Jul 2018 18:55:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/222578#M1995</guid>
      <dc:creator>Remo</dc:creator>
      <dc:date>2018-07-17T18:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/222676#M1996</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/16592"&gt;@Remo&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;for the help! This is one of the last services still stuck on our ActiveDirectory - I'll put in the feature request and live with it for a bit longer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Just an aside for anyone else with this issue - Perhaps JumpCloud&amp;nbsp;can&amp;nbsp;help in this case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-Mike&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Jul 2018 06:55:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/222676#M1996</guid>
      <dc:creator>MikeTewner</dc:creator>
      <dc:date>2018-07-18T06:55:43Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/326079#M1997</link>
      <description>&lt;P&gt;I dont know if this is still an issue for you, but i had a similar problem with Azure AD, so in the end created a secure LDAP connection to it and in the LDAP Group configuration changed the username to be email and that has worked both on Global Protect and Security rules.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 07:37:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/326079#M1997</guid>
      <dc:creator>AJeffery</dc:creator>
      <dc:date>2020-05-05T07:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/331367#M1998</link>
      <description>&lt;P&gt;Have anyone successfully implemented Group-Mapping with G-Suite?&lt;/P&gt;</description>
      <pubDate>Wed, 03 Jun 2020 12:49:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/331367#M1998</guid>
      <dc:creator>Ozamir</dc:creator>
      <dc:date>2020-06-03T12:49:27Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/331994#M1999</link>
      <description>&lt;P&gt;Nope, still struggling with this same issues.&amp;nbsp; SAML authentication works great, but group information sent int he SAML assertion is not accessible in policy rules.&amp;nbsp; In my case, we have access to LDAP, but wanted to use SAML to be able to add Duo two factor authentication with a usable UI.&amp;nbsp; Opened a case with support, maybe all of us are wrong.&lt;/P&gt;</description>
      <pubDate>Fri, 05 Jun 2020 20:39:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/331994#M1999</guid>
      <dc:creator>JohnWade</dc:creator>
      <dc:date>2020-06-05T20:39:56Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/332052#M2000</link>
      <description>&lt;P&gt;For what its worth, support confirmed that there is no group support with SAML authentication.&amp;nbsp; They referenced a prisma document: &lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-integration/authenticate-mobile-users/saml-authentication-using-okta-as-idp-for-users" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-integration/authenticate-mobile-users/saml-authentication-using-okta-as-idp-for-users&lt;/A&gt;&amp;nbsp; which does state:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"You can’t use group information that’s retrieved from the SAML assertion in either security policies or the agent client configuration in the portal and gateways. If you have a requirement to configure user group-based policies and configuration selections, you must &lt;A title="" href="https://docs.paloaltonetworks.com/globalprotect/8-1/globalprotect-admin/authentication/enable-group-mapping" target="_blank" rel="noopener"&gt;Enable Group Mapping&lt;/A&gt; and retrieve the user group information from the LDAP server using &lt;A title="" href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/user-identification/device-user-identification-group-mapping-settings" target="_blank" rel="noopener"&gt;Group Mapping Settings&lt;/A&gt;."&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However I did find an unsupported workaround at least in 8.1.&amp;nbsp;&amp;nbsp; If you can do LDAP group mapping but want to use SAML authentication (which is what we want to support multifactor), then if you send over the SAML username in the form &amp;lt;domain&amp;gt;\&amp;lt;username&amp;gt; , it will match up to the AD/LDAP user and use the group mappings from LDAP, this may be what Ozamir references above.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is no help for people who want to use Google exclusively.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;It is definitely an incomplete implementation since the SAML configuration supports both an "Access Domain Attribute" and a "User Group Attribute" but it does not use either one for global protect. (These are only used for Mgmt SAML authentication).&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hope this information helps someone else.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 06 Jun 2020 02:09:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/332052#M2000</guid>
      <dc:creator>JohnWade</dc:creator>
      <dc:date>2020-06-06T02:09:18Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/333650#M2001</link>
      <description>&lt;P&gt;Hi There&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I had the same issue with SAML and LDAP group memberships, I'm using DUO with global protect and my intend was to customize the application based on group memberships.&lt;/P&gt;&lt;P&gt;I used &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/4154"&gt;@JohnWade&lt;/a&gt; solution and under authentication profile I changed username attributes from user.username (as DUO instruction) to &amp;lt;domain&amp;gt;\&amp;lt;username&amp;gt; and it is working great.&lt;/P&gt;&lt;P&gt;thank you for the help.&lt;/P&gt;</description>
      <pubDate>Tue, 16 Jun 2020 15:25:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/333650#M2001</guid>
      <dc:creator>SShnap</dc:creator>
      <dc:date>2020-06-16T15:25:08Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/339500#M2002</link>
      <description>&lt;P&gt;All you need is the Metadata after configuring the app for your portal/gateway in the Google IDP. &amp;nbsp;You need two different apps for Portal and gateway if the addresses are different, unlike in Okta google doesn't support multiple URLs in a single app.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;goto SAML identity&amp;gt; create a server profile by importing the metadata.&lt;/P&gt;&lt;P&gt;create an Authentication profile and call the SAML server profile you created.&lt;/P&gt;&lt;P&gt;goto your portal and gateway &amp;gt; authentication&amp;gt; Set it to the authentication profile you created. Commit the changes.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Jul 2020 19:50:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/339500#M2002</guid>
      <dc:creator>ddixit</dc:creator>
      <dc:date>2020-07-19T19:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/349858#M2003</link>
      <description>&lt;P&gt;We did this with Azure AD as well.&lt;/P&gt;&lt;P&gt;Out basic setup is as follows:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Configure the LDAP Server profile for the on-premise AD infrastructure (Base DN is in the following format "DC=domain,DC=local" )&lt;/LI&gt;&lt;LI&gt;Configure SAML IdP to work with Azure AD&lt;/LI&gt;&lt;LI&gt;Configure Group-Mapping using the LDAP profile. On the "User and Group Attributes" tab, we swapped "Primary Username" to be "userPrincipleName" and "Alternate Username 1" to be "sAMAccountName"&lt;BR /&gt;This way the SAML username attribute matches the LDAP username attribute&lt;/LI&gt;&lt;LI&gt;On the GlobalProtect side, we specified the group in the configs in the following format: "CN=User Group Name,OU=org unit,DC=domain,DC=local"&lt;BR /&gt;When we tried it in the "domain\group name" format, we had no success, but we found a post on reddit that suggested trying either format to see what works in your environment. Apparently the format is dependent on how your AD infrastructure is setup.&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Wed, 16 Sep 2020 15:47:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/349858#M2003</guid>
      <dc:creator>Victor1</dc:creator>
      <dc:date>2020-09-16T15:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/361292#M2004</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is indeed an excellent workaround, tested here also in 8.1. Thanks for this information, it's really useful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Usually, we rely on our Active Directory, which is old enough to be primarily based on the SAM Account Name, which is what the NGFW is looking for by default, in the following format : Domain\SAMAccountName (ie. acme\doej)&lt;/P&gt;&lt;P&gt;We began using Okta to authenticate our GlobalProtect users for non-Windows or non-Domain devices, but it was impossible to use the "groups" attribute from the SAML assertion in the GlobalProtect configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We opened a case with TAC, and the answer was the following : this attribute can only be used in the "Allow List" of the Authentication Profile, but nowhere else :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="GREMAUDO_0-1604665329252.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28531iCE46027EB6FF2E09/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="GREMAUDO_0-1604665329252.png" alt="GREMAUDO_0-1604665329252.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In order to make this work, the username sent by Okta in the assertion &lt;STRONG&gt;&lt;U&gt;must&lt;/U&gt;&lt;/STRONG&gt; be the same as the username that the NGFW understand by default, that is, the "Domain\SAMAccountName". This is not an easily available option in Okta.&lt;/P&gt;&lt;P&gt;In the GlobalProtect app in Okta :&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2020-11-06_13h36_26.png" style="width: 680px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28533i0503103AD23F7700/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2020-11-06_13h36_26.png" alt="2020-11-06_13h36_26.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Edit the "Sign On" settings&lt;/LI&gt;&lt;LI&gt;Find "Credentials Details" section&lt;/LI&gt;&lt;LI&gt;Select "Custom" in the "Application username format"&lt;/LI&gt;&lt;LI&gt;Fill the field with this syntax :&amp;nbsp;"yourdomain\" + toLowerCase(active_directory_xxxx.samAccountName)&lt;BR /&gt;Please note that the "active_directory_xxxx" must match your directory ID, that you can find in the&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2020-11-06_13h39_51.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/28534iFA6227081874DE35/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="2020-11-06_13h39_51.png" alt="2020-11-06_13h39_51.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This only works, however, if you have an LDAP server somewhere... With Okta, I know there is a way to use it as an LDAP server, which might do the trick, like described in this link : &lt;A href="https://help.okta.com/en/prod/Content/Topics/Directory/LDAP-interface-main.htm" target="_blank"&gt;https://help.okta.com/en/prod/Content/Topics/Directory/LDAP-interface-main.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;With all this combined with a bit of Group-Mapping, you could tinker this to work as expected ! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's unfortunate that PAN does not seem to want to integrate a wider use of the group attribute of the SAML Assertion. It complexifies the use of SAML, with little to no documentation... &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Nov 2020 12:46:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/361292#M2004</guid>
      <dc:creator>GREMAUDO</dc:creator>
      <dc:date>2020-11-06T12:46:37Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/366067#M2005</link>
      <description>&lt;P&gt;I have been attempting this with Azure SAML. Currently I don't see the group attribute being sent by Azure so I can't test what I was wanting to test.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found a document that showed an example of Admin Role being used from SAML attribute where the role name matched a GlobalProtect admin role. I wondered if this same concept would work for an empty local user group on GlobalProtect. Even though I can't use the group attribute from SAML assertion, I can use an empty local user group and was hopeful that the group sent from SAML with the same name as a local user group would work the same way admin role assertion does.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you created an empty local group in GlobalProtect and put it in a VPN matching policy and see if the SAML group assertion with the same group name would trigger a policy match?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Nov 2020 22:24:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/366067#M2005</guid>
      <dc:creator>CCIE11129</dc:creator>
      <dc:date>2020-11-27T22:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/428926#M2006</link>
      <description>&lt;P&gt;Hello Vicotr,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How did you setup Globalprotect to use ldap for some users and saml authentication for the others based on user group?&lt;/P&gt;&lt;P&gt;In out case when we use saml and ldap authentication profile, it always authenticates against ldap and doesnt get to the saml profile at all.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Aug 2021 20:34:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/428926#M2006</guid>
      <dc:creator>28ACOK</dc:creator>
      <dc:date>2021-08-24T20:34:57Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/429178#M2007</link>
      <description>&lt;P&gt;For what it's worth, Palo innovated a SAML 2.0 group mapping ingestion service in PAN-OS 10.1. See more on the cloud identity engine &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine.html" target="_self"&gt;here&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Aug 2021 16:53:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/429178#M2007</guid>
      <dc:creator>LAYER_8</dc:creator>
      <dc:date>2021-08-25T16:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/442813#M2008</link>
      <description>&lt;P data-unlink="true"&gt;Hi&amp;nbsp;&lt;SPAN class=""&gt;GREMAUDO&lt;/SPAN&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am trying to implement Okta with Palo Alto as well. But I can't get it to work by following your instructions. Could you please provide more details on how you configure the Palo Alto side, like the Auth profile settings.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Leo&lt;/P&gt;</description>
      <pubDate>Fri, 22 Oct 2021 05:36:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/442813#M2008</guid>
      <dc:creator>Leo_Huang</dc:creator>
      <dc:date>2021-10-22T05:36:59Z</dc:date>
    </item>
    <item>
      <title>Re: Consuming user group in GlobalProtect SAML Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/444981#M2093</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did you follow this document ?&amp;nbsp;&lt;A href="https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-GlobalProtect.html" target="_blank"&gt;https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-GlobalProtect.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It's the one I used to properly setup Okta + PAN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Nov 2021 13:21:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/consuming-user-group-in-globalprotect-saml-authentication/m-p/444981#M2093</guid>
      <dc:creator>GREMAUDO</dc:creator>
      <dc:date>2021-11-02T13:21:18Z</dc:date>
    </item>
  </channel>
</rss>

