<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Standalone Prisma Access Group Based Policies in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-group-based-policies/m-p/332976#M103</link>
    <description>&lt;DIV class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;&lt;DIV class="lia-message-body-content"&gt;&lt;P&gt;I'm trying to implement group-based policies in a standalone Prisma Access deployment. The instructions for achieving this are really lacking. Can anyone clarify how to configure group based policy mapping?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the KB article:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Implement User-ID in Security Policies For a Standalone Prisma Access Deployment In a standalone Prisma Access deployment without a Master Device&lt;/STRONG&gt;, you can use group-based policy using long-form DN entries in Panorama. Prisma Access uses the DN entries to evaluate the User-ID-based policies you have configured in Panorama. For example, given a User named Bob Alice who works in IT for Organization Hooli in the United States, a matching security policy may have ou=IT Staff,O=Hooli,C=US if the policy is to be applied to all IT staff, or CN=Bob Alice,ou=IT Staff,O=Hooli,C=US if the policy is only to be applied to Bob Alice.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
    <pubDate>Thu, 11 Jun 2020 15:00:44 GMT</pubDate>
    <dc:creator>RaymondMullin</dc:creator>
    <dc:date>2020-06-11T15:00:44Z</dc:date>
    <item>
      <title>Standalone Prisma Access Group Based Policies</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-group-based-policies/m-p/332976#M103</link>
      <description>&lt;DIV class="lia-message-body lia-component-message-view-widget-body lia-component-body-signature-highlight-escalation lia-component-message-view-widget-body-signature-highlight-escalation"&gt;&lt;DIV class="lia-message-body-content"&gt;&lt;P&gt;I'm trying to implement group-based policies in a standalone Prisma Access deployment. The instructions for achieving this are really lacking. Can anyone clarify how to configure group based policy mapping?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the KB article:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Implement User-ID in Security Policies For a Standalone Prisma Access Deployment In a standalone Prisma Access deployment without a Master Device&lt;/STRONG&gt;, you can use group-based policy using long-form DN entries in Panorama. Prisma Access uses the DN entries to evaluate the User-ID-based policies you have configured in Panorama. For example, given a User named Bob Alice who works in IT for Organization Hooli in the United States, a matching security policy may have ou=IT Staff,O=Hooli,C=US if the policy is to be applied to all IT staff, or CN=Bob Alice,ou=IT Staff,O=Hooli,C=US if the policy is only to be applied to Bob Alice.&lt;/P&gt;&lt;/DIV&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 11 Jun 2020 15:00:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-group-based-policies/m-p/332976#M103</guid>
      <dc:creator>RaymondMullin</dc:creator>
      <dc:date>2020-06-11T15:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone Prisma Access Group Based Policies</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-group-based-policies/m-p/340141#M127</link>
      <description>&lt;P&gt;Hey Raymond,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I understand correctly then your Prisma Access setup is standalone thus there is no on-prem device available on Panorama.&lt;/P&gt;&lt;P&gt;in that situation, at the moment the Panorama is not capable of fetching group mapping today thus we do not see the group name list on Device group rules.&lt;/P&gt;&lt;P&gt;The workaround for this is to use the get Distinguished Name format from the AD server and paste it on the Panorama rules, user column.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To get DN format of group name run the below command on the AD server:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;C:\Users\Administrator&amp;gt;&lt;STRONG&gt;dsquery group -name employee&lt;/STRONG&gt;&lt;BR /&gt;"CN=Employee,CN=Users,DC=alvisofin,DC=com"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the above example &lt;STRONG&gt;employee&lt;/STRONG&gt; is a group name on the AD server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Shakti&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jul 2020 19:18:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-group-based-policies/m-p/340141#M127</guid>
      <dc:creator>shkumar</dc:creator>
      <dc:date>2020-07-22T19:18:19Z</dc:date>
    </item>
  </channel>
</rss>

