<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic AD Group Mapping - Azure SAML Auth in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/414382#M200</link>
    <description>&lt;P&gt;Any documentation on how to setup AD Group Mapping when using Azure AD SAML instead of LDAP as the authentication source. I did configure the LDAP servers and am using the long-name in the group policies but the policies aren't mapping the user to the AD group as I'd expect.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 21 Jun 2021 23:02:05 GMT</pubDate>
    <dc:creator>bmeche</dc:creator>
    <dc:date>2021-06-21T23:02:05Z</dc:date>
    <item>
      <title>AD Group Mapping - Azure SAML Auth</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/414382#M200</link>
      <description>&lt;P&gt;Any documentation on how to setup AD Group Mapping when using Azure AD SAML instead of LDAP as the authentication source. I did configure the LDAP servers and am using the long-name in the group policies but the policies aren't mapping the user to the AD group as I'd expect.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 21 Jun 2021 23:02:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/414382#M200</guid>
      <dc:creator>bmeche</dc:creator>
      <dc:date>2021-06-21T23:02:05Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group Mapping - Azure SAML Auth</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/416120#M203</link>
      <description>&lt;P&gt;I be interested as well.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 21:37:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/416120#M203</guid>
      <dc:creator>DavidMaas1</dc:creator>
      <dc:date>2021-06-29T21:37:41Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group Mapping - Azure SAML Auth</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/424729#M225</link>
      <description>&lt;P&gt;You can see the article from Okta and use it for Azure AD, you just need to find the Azure AD documentation how to set the atributes:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-GlobalProtect.html" target="_blank"&gt;https://saml-doc.okta.com/SAML_Docs/How-to-Configure-SAML-2.0-for-Palo-Alto-Networks-GlobalProtect.html&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 11:29:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/424729#M225</guid>
      <dc:creator>NikolayDimitrov</dc:creator>
      <dc:date>2021-08-05T11:29:11Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group Mapping - Azure SAML Auth</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/503512#M371</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;I arrived here to seek for answer to a problem that I could not find an answer to anywhere.&lt;/P&gt;&lt;P&gt;In fact, I still didn't find it but having access to lab, and some thought got me the desired result.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what is it.&lt;/P&gt;&lt;P&gt;If you have setup a Security Web Policy based on LDAP Groups, and you authenticate using Kerberos/LDAP AD , PAN will identify you as domain\user.name&lt;/P&gt;&lt;P&gt;You have some influence over how domain\ will look, but overall PAN will identify the user and will know groups you are a memeber of.&lt;/P&gt;&lt;P&gt;Now, you want to introduce AzureAD SAML authentication.&lt;/P&gt;&lt;P&gt;You found the article and followed it to the letter: &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U48CAE" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g0000008U48CAE&lt;/A&gt;&lt;/P&gt;&lt;P&gt;You were able to authenticate, and get connected so what's the problem?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is that your user name is no longer domain\user.name but now it is &lt;A href="mailto:user.name@emailaddress.com" target="_blank" rel="noopener"&gt;user.name@emailaddress.com&lt;/A&gt; , it is the account you have used to authenticate against Azure AD.&lt;/P&gt;&lt;P&gt;The user no longer matches any groups and the desired access for this user or group of users no longer works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found that the Attributes in the article&amp;nbsp; do not contain group attribute.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PiankaMariusz_0-1655212078224.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41776i16247DA7A38EB064/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="PiankaMariusz_0-1655212078224.png" alt="PiankaMariusz_0-1655212078224.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Under AzureAD Portal for Single-Sign on I've added the attribute then for Security Groups&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PiankaMariusz_1-1655212200554.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41777i4ECC4FC38C119955/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="PiankaMariusz_1-1655212200554.png" alt="PiankaMariusz_1-1655212200554.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its under "Add a Group Claim"&lt;/P&gt;&lt;P&gt;Source Attribute: GroupID&lt;BR /&gt;Customize the name of the group claim: Group&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All these is case sensitive(apparently)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once you have the extra attribute, export the XML and Import to Palo.&lt;/P&gt;&lt;P&gt;Import it as Authentication Profile and add Group attribute you created:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="PiankaMariusz_2-1655212422246.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41779iA669E87BB414E19F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="PiankaMariusz_2-1655212422246.png" alt="PiankaMariusz_2-1655212422246.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I log in using SAML now, I have different view:&lt;/P&gt;&lt;P&gt;The User: shows the email address I used to authenticate.&lt;/P&gt;&lt;P&gt;The Primary User name is domain\user.name&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Firewall can "match" the SAML account I used to the local AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now, interesting part to some is the fact that I do not use Active Sync. My Local domain is entirely different to Azure AD. They are seperate.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I do have email attribute populated in my AD as the account I use with Azure though.&lt;/P&gt;&lt;P&gt;Hope this helps someone.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;P&gt;Mariusz&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 14 Jun 2022 13:19:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/503512#M371</guid>
      <dc:creator>PiankaMariusz</dc:creator>
      <dc:date>2022-06-14T13:19:21Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group Mapping - Azure SAML Auth</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/511860#M395</link>
      <description>&lt;P&gt;You do not need to add a group attribute, and it will not work for login control using groups. If you change the username attribute to match the settings below and have LDAP configured for userID Groups will work even for Prelogin. users will still login as before only the username submitted will be using local domain username format &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2022-08-15_10-24-42.jpg" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/43139i3D85F0BDDD737F59/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="2022-08-15_10-24-42.jpg" alt="2022-08-15_10-24-42.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 15:30:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/511860#M395</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2022-08-15T15:30:36Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group Mapping - Azure SAML Auth</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/511891#M396</link>
      <description>&lt;P&gt;It does not affect prelogin as no user credentials have b been processed yet. A typo on my part&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 Aug 2022 17:52:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/511891#M396</guid>
      <dc:creator>Carleton</dc:creator>
      <dc:date>2022-08-15T17:52:01Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group Mapping - Azure SAML Auth</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/521149#M428</link>
      <description>&lt;P&gt;Hi , Have you tried this in LAB and or in your environment, is it working and are you able user AD groups also on PA&amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 11:37:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/ad-group-mapping-azure-saml-auth/m-p/521149#M428</guid>
      <dc:creator>SanilHande</dc:creator>
      <dc:date>2022-11-14T11:37:08Z</dc:date>
    </item>
  </channel>
</rss>

