<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AzureAD Group Mapping for GP in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/334921#M233</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're currently implementing GlobalProtect with SAML Authentification to AzureAD only (no hybrid) based on groups for easier management.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example :&lt;/P&gt;&lt;P&gt;Groupe1 is given an IP_Pool1 IP with access to subnet1&lt;/P&gt;&lt;P&gt;Groupe2 is given an IP_Pool2 IP with access to subnet 1 and 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As of today, we didn't find any way to do it properly and from what we've seen online it may not be supported at all without any third party or on-prem AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did any of you ran into that issue before and did you find the solution?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 24 Jun 2020 03:43:00 GMT</pubDate>
    <dc:creator>SBI_INFRASTRUCTURE</dc:creator>
    <dc:date>2020-06-24T03:43:00Z</dc:date>
    <item>
      <title>AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/334921#M233</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're currently implementing GlobalProtect with SAML Authentification to AzureAD only (no hybrid) based on groups for easier management.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Example :&lt;/P&gt;&lt;P&gt;Groupe1 is given an IP_Pool1 IP with access to subnet1&lt;/P&gt;&lt;P&gt;Groupe2 is given an IP_Pool2 IP with access to subnet 1 and 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As of today, we didn't find any way to do it properly and from what we've seen online it may not be supported at all without any third party or on-prem AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Did any of you ran into that issue before and did you find the solution?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 03:43:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/334921#M233</guid>
      <dc:creator>SBI_INFRASTRUCTURE</dc:creator>
      <dc:date>2020-06-24T03:43:00Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/335351#M236</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From my understanding, you would like to configure AzureAD group-mappings on the firewall as in you would like for the firewall to pull user groups from AzureAD?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If that's the case, please bare in mind that the firewall supports LDAP profiles only with group mapping configuration.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Reference:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/globalprotect/9-0/globalprotect-admin/authentication/enable-group-mapping" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/globalprotect/9-0/globalprotect-admin/authentication/enable-group-mapping&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;If I misunderstood the question, please feel free to clarify.&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2020 15:59:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/335351#M236</guid>
      <dc:creator>domari</dc:creator>
      <dc:date>2020-06-25T15:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/335383#M238</link>
      <description>&lt;P&gt;This should be possible.&lt;BR /&gt;&lt;BR /&gt;First, enable group mapping using the documentation&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84912"&gt;@domari&lt;/a&gt;&amp;nbsp;mentioned.&amp;nbsp; Make sure you add the included groups to the group mapping profile in distinguished name format (e.g. cn=groupe1,ou=myou,o=mydomain,o=local) in lower case.&amp;nbsp; I have seen them fail time and time again if you use uppercase letters, or enter them in mydomain\somename format.&amp;nbsp; Verify that your firewall is seeing the groups, and members using the steps here:&amp;nbsp;&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVcCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVcCAK&lt;/A&gt;&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In you have a client IP pool listed under your-GP-gateway &amp;gt; Agent &amp;gt; Client IP pool, then these IPs will apply to all gateway users.&amp;nbsp; You will need to delete this in order to enable separate pools for different groups.&lt;BR /&gt;&lt;BR /&gt;Under your-GP-gateway &amp;gt; Client Settings, create a config for Groupe1.&amp;nbsp; Under Source User, add Groupe1 once again using the distinguished name in lowercase (e.g. cn=groupe1,ou=myou,o=mydomain,o=local).&amp;nbsp; Go to the IP Pools tab, and add your pool for Groupe1 users.&amp;nbsp; Under Split Tunnel, add the included subnets you want to allow to be accessed over the VPN.&amp;nbsp; Configure any other settings in the client config you need.&amp;nbsp; Repeat the process for Groupe2 users.&lt;BR /&gt;&lt;BR /&gt;You will also need Security Policies which will allow access.&amp;nbsp; You can use the same groups for source users in those policies as well.&lt;/P&gt;</description>
      <pubDate>Thu, 25 Jun 2020 18:01:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/335383#M238</guid>
      <dc:creator>OwenFuller</dc:creator>
      <dc:date>2020-06-25T18:01:18Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/335470#M241</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/84912"&gt;@domari&lt;/a&gt;&amp;nbsp;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes you understood correctly.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The thing is to be able to use LDAP or LDAP-S to connect to AzureAD you will need to use an intermediate called Azure AD Domain Services which requires a pay-to-use subscription. We want to reduce our cloud ans SaaS subscriptions footprint to a minimum and it would make us go the wrong way tho.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It seems like, as of today, being able to pull out groups mapping directly from AzureAD is not possible.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jun 2020 03:18:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/335470#M241</guid>
      <dc:creator>SBI_INFRASTRUCTURE</dc:creator>
      <dc:date>2020-06-26T03:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/335473#M242</link>
      <description>&lt;P&gt;Please feel free to reach out to your SE for a feature request. Maybe in the future desgin this could be possible.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jun 2020 03:55:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/335473#M242</guid>
      <dc:creator>domari</dc:creator>
      <dc:date>2020-06-26T03:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/335475#M243</link>
      <description>&lt;P&gt;Will do - thanks for you input.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Jun 2020 04:41:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/335475#M243</guid>
      <dc:creator>SBI_INFRASTRUCTURE</dc:creator>
      <dc:date>2020-06-26T04:41:59Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/386453#M933</link>
      <description>&lt;P&gt;Yeah that is what i found as well.&amp;nbsp; What i ended up doing, on an ASA, is authenticating my users to Azure, but then using secondary authorization to the internal AD user to map the users to specific groups.&lt;/P&gt;</description>
      <pubDate>Wed, 17 Feb 2021 18:45:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/386453#M933</guid>
      <dc:creator>Tony_Ellis</dc:creator>
      <dc:date>2021-02-17T18:45:07Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/436216#M1816</link>
      <description>&lt;P&gt;How?&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 18:23:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/436216#M1816</guid>
      <dc:creator>Housing1</dc:creator>
      <dc:date>2021-09-23T18:23:45Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/436226#M1817</link>
      <description>&lt;P&gt;Here you go:&lt;/P&gt;&lt;P&gt;tunnel-group NA_Azure_SAML type remote-access&lt;BR /&gt;tunnel-group NA_Azure_SAML general-attributes&lt;BR /&gt;address-pool VPN_Pool_1&lt;BR /&gt;authorization-server-group AAA-VPN-Users&lt;BR /&gt;default-group-policy NoAccess&lt;BR /&gt;tunnel-group NA_Azure_SAML webvpn-attributes&lt;BR /&gt;authentication saml&lt;BR /&gt;group-alias VPN-Secured enable&lt;BR /&gt;without-csd&lt;BR /&gt;saml identity-provider &lt;A href="https://sts.windows.net/numbers......./" target="_blank"&gt;https://sts.windows.net/numbers......./&lt;/A&gt;&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;So the process is it authenticates to Azure SAML, but authorization is AAA-VPN-Users (which is AD).&amp;nbsp; it looks for a security group tied to the end user and then maps that security group to a policy group on the ASA.&amp;nbsp; This took awhile for me to figure out and get working.&amp;nbsp; But saved me a lot of work in the long run because we have so many policy group mappings to security groups.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 18:40:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/436226#M1817</guid>
      <dc:creator>Tony_Ellis</dc:creator>
      <dc:date>2021-09-23T18:40:27Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/436267#M1818</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/145962"&gt;@SBI_INFRASTRUCTURE&lt;/a&gt; ,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe the Cloud Identity Engine can now get groups from AzureAD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-new-features/identity-features/cloud-identity-engine.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 23 Sep 2021 20:47:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/436267#M1818</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2021-09-23T20:47:15Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Group Mapping for GP</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/436348#M1821</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We're not yet using PANOS 10.X but we will take a look - thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We ended doing what&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/149462"&gt;@Tony_Ellis&lt;/a&gt;&amp;nbsp;mentioned - AzureAD/SAML for Authentification &amp;amp; MFA and AD on-premise for groups mapping. AzureAD information been sync from our AD on-premise to ease the user onboarding process.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best,&lt;/P&gt;</description>
      <pubDate>Fri, 24 Sep 2021 01:48:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/azuread-group-mapping-for-gp/m-p/436348#M1821</guid>
      <dc:creator>SBI_INFRASTRUCTURE</dc:creator>
      <dc:date>2021-09-24T01:48:22Z</dc:date>
    </item>
  </channel>
</rss>

