<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect Group Mapping for Azure SAML in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-group-mapping-for-azure-saml/m-p/996231#M6189</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;GP Authentication with Azure SAML is fine,&amp;nbsp; but for authorization i want to extract the groupname asserted by Azure SAML in palo alto so that these groupnames can be utilized in GP gateway configuration to assign unique vpn pool and to configure security rule to control the resource access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we dont have the feasibility to use Cloud Identity Engine (CIE) for this task.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 03 Dec 2024 13:52:15 GMT</pubDate>
    <dc:creator>l2-security</dc:creator>
    <dc:date>2024-12-03T13:52:15Z</dc:date>
    <item>
      <title>GlobalProtect Group Mapping for Azure SAML</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-group-mapping-for-azure-saml/m-p/996113#M6187</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have configured Azure with Global protect enterprise application for SAML and configured the Group claim attribute as "group -&amp;gt; user.group" which as 3 usergroups Sales, IT , and Developers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;And in the Palo alto firewall (10.2.8), SAML and Authentication profile is configured.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Can any one brief me how to configure the Group mapping setting for this SAML profile under User Identification, since the group mapping server profile as only option to configure LDAP , Screenshot attached.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2024 07:34:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-group-mapping-for-azure-saml/m-p/996113#M6187</guid>
      <dc:creator>l2-security</dc:creator>
      <dc:date>2024-12-03T07:34:23Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Group Mapping for Azure SAML</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-group-mapping-for-azure-saml/m-p/996206#M6188</link>
      <description>&lt;P&gt;you do not need group claims in the globalprotect enterprise application. To restrict which users can authenticate, you would add that group to the 'Users and Groups' instead&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To configure group mapping (assuming you are cloud-only) you would need to set up the Cloud Identity Engine (CIE) via apps.paloaltonetworks.com and connect that to your EntraID/azure&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;once the CIE is configured and connected to your EntraID, and your firewall has been set up with the device certificate, it will automatically become available when configuring CIE&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="reaper_0-1733229086004.png" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/64446i9346F7DE7050E9AE/image-size/large?v=v2&amp;amp;px=999" role="button" title="reaper_0-1733229086004.png" alt="reaper_0-1733229086004.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;once the CIE is connected to your firewall, you can start using AD groups in your security rules&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2024 12:32:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-group-mapping-for-azure-saml/m-p/996206#M6188</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2024-12-03T12:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect Group Mapping for Azure SAML</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-group-mapping-for-azure-saml/m-p/996231#M6189</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;GP Authentication with Azure SAML is fine,&amp;nbsp; but for authorization i want to extract the groupname asserted by Azure SAML in palo alto so that these groupnames can be utilized in GP gateway configuration to assign unique vpn pool and to configure security rule to control the resource access.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;we dont have the feasibility to use Cloud Identity Engine (CIE) for this task.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Dec 2024 13:52:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/globalprotect-group-mapping-for-azure-saml/m-p/996231#M6189</guid>
      <dc:creator>l2-security</dc:creator>
      <dc:date>2024-12-03T13:52:15Z</dc:date>
    </item>
  </channel>
</rss>

