<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global Protect Authentication with Okta Radius + LDAP Group Mapping in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication-with-okta-radius-ldap-group/m-p/547007#M111759</link>
    <description>&lt;P&gt;&lt;SPAN&gt;Recently stood up a GP Portal and Gateway for the company that I work for. At the moment, I just have a radius-auth-profile setup to point to our internal OKTA MFA Agent which works fine, however, I also need to read and identify Security Groups using AD so I can place users in specific GP permissions (split tunnel, no-split tunnel, ACLs, Department ACLs....).&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="_12FoOEddL7j_RgMQN0SNeU"&gt;My question is, Is it possible to continue to use my OKTA radius profile but also combine LDAP User Group Mappings to provide these security group-specific settings? Or has anyone tried doing this before in production? Thanks.&lt;/STRONG&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 23 Jun 2023 14:02:06 GMT</pubDate>
    <dc:creator>Carson1998</dc:creator>
    <dc:date>2023-06-23T14:02:06Z</dc:date>
    <item>
      <title>Global Protect Authentication with Okta Radius + LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication-with-okta-radius-ldap-group/m-p/547007#M111759</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Recently stood up a GP Portal and Gateway for the company that I work for. At the moment, I just have a radius-auth-profile setup to point to our internal OKTA MFA Agent which works fine, however, I also need to read and identify Security Groups using AD so I can place users in specific GP permissions (split tunnel, no-split tunnel, ACLs, Department ACLs....).&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="_12FoOEddL7j_RgMQN0SNeU"&gt;My question is, Is it possible to continue to use my OKTA radius profile but also combine LDAP User Group Mappings to provide these security group-specific settings? Or has anyone tried doing this before in production? Thanks.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 14:02:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication-with-okta-radius-ldap-group/m-p/547007#M111759</guid>
      <dc:creator>Carson1998</dc:creator>
      <dc:date>2023-06-23T14:02:06Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Authentication with Okta Radius + LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication-with-okta-radius-ldap-group/m-p/547149#M111776</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/230860"&gt;@Carson1998&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is it possible to continue to use my OKTA radius profile but also combine LDAP User Group Mappings to provide these security group-specific settings?&amp;nbsp; Yes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Or has anyone tried doing this before in production?&amp;nbsp; I may have done this for a customer years ago.&amp;nbsp; The implementation is the same for User-ID, which I use in production.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is does not matter if the authentication profile uses RADIUS and the group mapping uses LDAP.&amp;nbsp; &lt;STRONG&gt;What matters is that the username matches.&lt;/STRONG&gt;&amp;nbsp; The GP username will most likely be in the format "username" while the LDAP username will most likely be in the format "domain/username".&amp;nbsp; These will not match.&amp;nbsp;&amp;nbsp; &lt;STRONG&gt;The simplest way to make them match is to configure your authentication profile for User Domain = domain and Username Modifier = None.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;This doc has a very cool table on the bottom that shows the behavior for the different configurations -&amp;gt; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boHMCAY" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boHMCAY&lt;/A&gt;.&amp;nbsp; In your case, the username format to match the LDAP groups for the agent config will correspond to the Allow List column.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To see the username format retrieved by the LDAP groups, use the CLI commands in this doc -&amp;gt; &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVcCAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVcCAK&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To see the username format for the GP user you can look at the GP logs, User-ID logs, or use the CLI command "show user ip-user-mapping all".&amp;nbsp; &lt;STRONG&gt;The format for the GP user and group list should match exactly.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PS Definitely use the Group Include List under your group mapping so that the NGFW only queries for users in those groups.&amp;nbsp; That saves lots of CPU cycles.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2023 10:21:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication-with-okta-radius-ldap-group/m-p/547149#M111776</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-06-25T10:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect Authentication with Okta Radius + LDAP Group Mapping</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication-with-okta-radius-ldap-group/m-p/547152#M111778</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;....&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;PS Definitely use the Group Include List under your group mapping so that the NGFW only queries for users in those groups.&amp;nbsp; That saves lots of CPU cycles.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;Or use Cloud Identity Engine, which automatically sends only the groups that are used by FW (in policy, GP or allow list) without the need to manually define include list &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 25 Jun 2023 07:25:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-authentication-with-okta-radius-ldap-group/m-p/547152#M111778</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2023-06-25T07:25:35Z</dc:date>
    </item>
  </channel>
</rss>

