<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to verify group-mapping in PRISMA access in Prisma Access Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/319640#M82</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/31227"&gt;@Sai_Tumuluri&lt;/a&gt;: Thanks, we asked TAC to run show user group name &amp;lt;x&amp;gt; and found out, that the primary user attribute was set to "uid" - I guess that was default behavior in the early days.&lt;/P&gt;&lt;P&gt;A freshly installed Prisma today, got the default sAMAccountName&amp;nbsp;and the audit-logs from the faulty environment found no manual configuration made on this value - however, Feature reqest is sent to local PAN SE and with correct attributes, everything is matching as expected&lt;/P&gt;</description>
    <pubDate>Tue, 31 Mar 2020 18:34:22 GMT</pubDate>
    <dc:creator>Chacko42</dc:creator>
    <dc:date>2020-03-31T18:34:22Z</dc:date>
    <item>
      <title>How to verify group-mapping in PRISMA access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/318075#M74</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm wondering, how to verify, that the group-mapping in Prisma-Access is working correctly.&lt;/P&gt;&lt;P&gt;We configured the Prisma as described in the admin guides, but my group-based security policies are not working as expected.&lt;/P&gt;&lt;P&gt;Authentication via LDAP is working via LDAPS, so I guess the LDAP-connection vor retrieving groups is working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I would like to do a thing like "show user group list" or sth. else, I can do with on-prem firewall.&lt;/P&gt;&lt;P&gt;Also it would be nice to immediately trigger the group-refresh via "debug user-id refresh group-mapping all".&lt;/P&gt;&lt;P&gt;You get my idea, right?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Chacko&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 20:52:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/318075#M74</guid>
      <dc:creator>Chacko42</dc:creator>
      <dc:date>2020-03-23T20:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to verify group-mapping in PRISMA access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/318132#M75</link>
      <description>&lt;P&gt;Hi Chacko,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately, you will have to open a TAC case to troubleshoot this. As you mentioned, you need to run some CLI commands to verify and troubleshoot the configuration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;However, here is my suggestion, from my experience, most of the time the issue is due to a format mismatch on the authentication policy vs the group mapping format.&lt;/P&gt;&lt;P&gt;Here is an example:&lt;/P&gt;&lt;P&gt;If you are using&amp;nbsp;&lt;SPAN&gt;sAMAccountName on your Authentication Profile, make sure you add the same format on your Group-Mapping configuration.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-03-23 at 7.16.47 PM.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24636i75C3B955B8DF84C7/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-03-23 at 7.16.47 PM.png" alt="Screen Shot 2020-03-23 at 7.16.47 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-03-23 at 7.17.33 PM.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/24637i73CDF7635D040E3F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-03-23 at 7.17.33 PM.png" alt="Screen Shot 2020-03-23 at 7.17.33 PM.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, in a standalone Prisma Access deployment without a Master Device, you can use a group-based policy using long-form DN entries in Panorama. Prisma Access uses the DN entries to evaluate the User-ID-based policies you have configured in Panorama.&lt;BR /&gt;For example, given a User named Bob Alice who works in IT for Organization Hooli in the United States, a matching security policy may have ou=IT Staff,O=Hooli,C=US if the policy is to be applied to all IT staff, or CN=Bob Alice,ou=IT Staff,O=Hooli,C=US if the policy is only to be applied to Bob Alice.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Detailed instructions:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access/retrieve-user-id-information.html#id823f5b30-2c1d-4c87-9ae6-a06573455af7_id8663ef7a-f62f-44ab-9ae8-113239a11b89" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access/retrieve-user-id-information.html#id823f5b30-2c1d-4c87-9ae6-a06573455af7_id8663ef7a-f62f-44ab-9ae8-113239a11b89&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Instructions for the configuration specific to Prisma Access:&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access&lt;/A&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Best practice configuration:&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id/map-users-to-groups.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/user-id/map-users-to-groups.html&lt;/A&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Multiple Username formats configuration:&lt;/STRONG&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/user-id-features/support-for-multiple-username-formats.html" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-new-features/user-id-features/support-for-multiple-username-formats.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I hope this helps.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 16:00:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/318132#M75</guid>
      <dc:creator>SuperMario</dc:creator>
      <dc:date>2020-03-24T16:00:11Z</dc:date>
    </item>
    <item>
      <title>Re: How to verify group-mapping in PRISMA access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/318225#M76</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/79934"&gt;@Chacko42&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As you said if authentication and traffic policies are working properly it indicates, the group mapping is being retrieved.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;The ability to directly run those commands is feature request. Please reach out to SE of the account to help to file the feature request&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 13:20:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/318225#M76</guid>
      <dc:creator>Sai_Tumuluri</dc:creator>
      <dc:date>2020-03-24T13:20:27Z</dc:date>
    </item>
    <item>
      <title>Re: How to verify group-mapping in PRISMA access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/319640#M82</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/31227"&gt;@Sai_Tumuluri&lt;/a&gt;: Thanks, we asked TAC to run show user group name &amp;lt;x&amp;gt; and found out, that the primary user attribute was set to "uid" - I guess that was default behavior in the early days.&lt;/P&gt;&lt;P&gt;A freshly installed Prisma today, got the default sAMAccountName&amp;nbsp;and the audit-logs from the faulty environment found no manual configuration made on this value - however, Feature reqest is sent to local PAN SE and with correct attributes, everything is matching as expected&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 18:34:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/319640#M82</guid>
      <dc:creator>Chacko42</dc:creator>
      <dc:date>2020-03-31T18:34:22Z</dc:date>
    </item>
    <item>
      <title>Re: How to verify group-mapping in PRISMA access</title>
      <link>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/319648#M83</link>
      <description>&lt;P&gt;Thank you for sharing update. Yes, TAC can help with them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From my knowledge "&lt;SPAN&gt;sAMAccountName" was the default.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if the domain name is not populating, netbios communication might be failing. Verify with TAC help the domain is populating for users, it is imp&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/user-identification/device-user-identification-group-mapping-settings" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/user-identification/device-user-identification-group-mapping-settings&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 31 Mar 2020 18:49:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/prisma-access-discussions/how-to-verify-group-mapping-in-prisma-access/m-p/319648#M83</guid>
      <dc:creator>Sai_Tumuluri</dc:creator>
      <dc:date>2020-03-31T18:49:37Z</dc:date>
    </item>
  </channel>
</rss>

