<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Standalone Prisma Access and LDAP Group Mapping in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/332985#M105</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Unclear instructions from the KB article:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Implement User-ID in Security Policies For a Standalone Prisma Access Deployment In a standalone Prisma Access deployment without a Master Device, you can use group-based policy using long-form DN entries in Panorama. Prisma Access uses the DN entries to evaluate the User-ID-based policies you have configured in Panorama. For example, given a User named Bob Alice who works in IT for Organization Hooli in the United States, a matching security policy may have ou=IT Staff,O=Hooli,C=US if the policy is to be applied to all IT staff, or CN=Bob Alice,ou=IT Staff,O=Hooli,C=US if the policy is only to be applied to Bob Alice.&lt;/P&gt;</description>
    <pubDate>Thu, 11 Jun 2020 15:06:30 GMT</pubDate>
    <dc:creator>RaymondMullin</dc:creator>
    <dc:date>2020-06-11T15:06:30Z</dc:date>
    <item>
      <title>Standalone Prisma Access and LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/332984#M104</link>
      <description>&lt;P&gt;I'm trying to implement group-based policies in a standalone Prisma Access deployment. The instructions for achieving this are really lacking. Can anyone clarify how to configure group based policy mapping on standalone Prisma Access deployments with no master device?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 15:04:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/332984#M104</guid>
      <dc:creator>RaymondMullin</dc:creator>
      <dc:date>2020-06-11T15:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone Prisma Access and LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/332985#M105</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Unclear instructions from the KB article:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Implement User-ID in Security Policies For a Standalone Prisma Access Deployment In a standalone Prisma Access deployment without a Master Device, you can use group-based policy using long-form DN entries in Panorama. Prisma Access uses the DN entries to evaluate the User-ID-based policies you have configured in Panorama. For example, given a User named Bob Alice who works in IT for Organization Hooli in the United States, a matching security policy may have ou=IT Staff,O=Hooli,C=US if the policy is to be applied to all IT staff, or CN=Bob Alice,ou=IT Staff,O=Hooli,C=US if the policy is only to be applied to Bob Alice.&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 15:06:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/332985#M105</guid>
      <dc:creator>RaymondMullin</dc:creator>
      <dc:date>2020-06-11T15:06:30Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone Prisma Access and LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/333041#M106</link>
      <description>&lt;P&gt;Hi Raymond,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To configure&amp;nbsp;&lt;SPAN&gt;standalone group mapping, you need to have the following configured under the mobile users' template:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;* &lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/device/device-server-profiles-ldap" target="_self"&gt;LDAP server profile&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;*&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-web-interface-help/user-identification/device-user-identification-group-mapping-settings.html" target="_self"&gt; User-ID &amp;gt; Group-Mapping&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please note that in a standalone scenario, you won't be able to pull the group-names on Panorama GUI. Therefore, you will have to type as per the instructions from your comment the DN long format entry in your policy and configuration.&lt;/P&gt;&lt;P&gt;For testing purposes, you can create a security policy, set the policy on the top and deny traffic to a specific IP to a specific group, this is just one example of many ways you can test.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let us know if you have any further questions.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 11 Jun 2020 18:57:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/333041#M106</guid>
      <dc:creator>SuperMario</dc:creator>
      <dc:date>2020-06-11T18:57:30Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone Prisma Access and LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/333088#M108</link>
      <description>Thanks for the help. Since the groups won't appear in the dropdown menu on the user page, I can simply write the LDAP path in the User tab of a policy? Something like "CN=Mail Room,OU=Groups,OU=Houston,OU=Company,DC=corporate,DC=papergoods,DC=com" ?</description>
      <pubDate>Fri, 12 Jun 2020 01:11:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/333088#M108</guid>
      <dc:creator>RaymondMullin</dc:creator>
      <dc:date>2020-06-12T01:11:50Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone Prisma Access and LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/333209#M109</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/116979"&gt;@RaymondMullin&lt;/a&gt;, that is correct.&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 16:38:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/333209#M109</guid>
      <dc:creator>SuperMario</dc:creator>
      <dc:date>2020-06-12T16:38:05Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone Prisma Access and LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/333214#M112</link>
      <description>Thanks for the clarification. I added the object DN to the user tab on the policy page, but it doesn't seem to be working. I can add "domain\sampleUser" to the same policy and it works fine for that user. User mapping is working okay. I just seem to have a hard time getting the user group mapping to work. I've tried adding the object DN to both the Group Include List and Custom Group List in Device&amp;gt;User Identification&amp;gt;Group Mapping Settings, but I've come up empty every time. I wish there was better documentation on this implementation.</description>
      <pubDate>Fri, 12 Jun 2020 17:29:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/333214#M112</guid>
      <dc:creator>RaymondMullin</dc:creator>
      <dc:date>2020-06-12T17:29:47Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone Prisma Access and LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/333218#M113</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/116979"&gt;@RaymondMullin&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The user mapping should always work because the userid is learned from the authentication.&lt;/P&gt;&lt;P&gt;Whereas in the case of the group mapping, we need to pull the information from your LDAP server and group-mapping configuration.&lt;/P&gt;&lt;P&gt;Hence, the group-mapping attribute fields need to be aligned to the user authentication profile attributes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is an example:&lt;/P&gt;&lt;P&gt;If you are using&amp;nbsp;&lt;SPAN&gt;sAMAccountName on your Authentication Profile, make sure you add the same format on your Group-Mapping configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24636i75C3B955B8DF84C7/image-size/medium?v=1.0&amp;amp;px=400" border="0" alt="Screen Shot 2020-03-23 at 7.16.47 PM.png" title="Screen Shot 2020-03-23 at 7.16.47 PM.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24637i73CDF7635D040E3F/image-size/medium?v=1.0&amp;amp;px=400" border="0" alt="Screen Shot 2020-03-23 at 7.17.33 PM.png" title="Screen Shot 2020-03-23 at 7.17.33 PM.png" /&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Best practice configuration:&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id/map-users-to-groups.html" target="_blank" rel="noopener nofollow noopener noreferrer"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id/map-users-to-groups.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 12 Jun 2020 18:05:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/333218#M113</guid>
      <dc:creator>SuperMario</dc:creator>
      <dc:date>2020-06-12T18:05:13Z</dc:date>
    </item>
    <item>
      <title>Re: Standalone Prisma Access and LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/335036#M120</link>
      <description>&lt;P&gt;Thanks for all the help. It's working now with the long form.&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jun 2020 14:50:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/standalone-prisma-access-and-ldap-group-mapping/m-p/335036#M120</guid>
      <dc:creator>RaymondMullin</dc:creator>
      <dc:date>2020-06-24T14:50:44Z</dc:date>
    </item>
  </channel>
</rss>

