<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User-ID mapping without ldap across an enterprise in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-mapping-without-ldap-across-an-enterprise/m-p/568687#M114751</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following DOC describes the different methods of user mapping:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/user-id/user-id-concepts/user-mapping" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/user-id/user-id-concepts/user-mapping&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
    <pubDate>Wed, 06 Dec 2023 14:08:29 GMT</pubDate>
    <dc:creator>kiwi</dc:creator>
    <dc:date>2023-12-06T14:08:29Z</dc:date>
    <item>
      <title>User-ID mapping without ldap across an enterprise</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-mapping-without-ldap-across-an-enterprise/m-p/567772#M114650</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;not having the best day with thinking &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Palo Alto Scenario:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;PA FW CLuster in HQ&lt;BR /&gt;Panorama Log Collector only in HQ&lt;BR /&gt;Standalone PA FW in SiteA&lt;BR /&gt;Standalone PA FW in SiteB&lt;BR /&gt;Standalone PA FW in SiteC&lt;BR /&gt;Standalone PA FW in SiteD&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;No Panorama mgmt in place. All Sites have L3 connectivity back to HQ&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;FWs are configured to send logs to log collector in HQ&lt;/P&gt;
&lt;P&gt;Note: OS are a mix of Windows / Linux / MacOS / Android and IOS&lt;BR /&gt;Not all users are AD users as we have byod / guests also. (else would have done ldap integration or similar)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Goal - to be able to use security rules based on user-id / security groups rather than IPs accross all FWs&lt;/P&gt;
&lt;P&gt;In your opinion, What is the best solution for something like this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Global protect on FW cluster in HQ? &lt;BR /&gt;if so we should be able to define user based access groups in the rules on FWs in the Sites? how would the FWS at the sites identify the users?&lt;BR /&gt;&lt;BR /&gt;Captive Portal on FW cluster in HQ?&lt;BR /&gt;again - if so we should be able to define user based access groups in the rules on FWs in the Sites? how would the FWS at the sites identify the users?&lt;BR /&gt;&lt;BR /&gt;Any other options perhaps?&lt;BR /&gt;thanks in adv&lt;/P&gt;</description>
      <pubDate>Thu, 30 Nov 2023 13:35:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-mapping-without-ldap-across-an-enterprise/m-p/567772#M114650</guid>
      <dc:creator>PA_nts</dc:creator>
      <dc:date>2023-11-30T13:35:07Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID mapping without ldap across an enterprise</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-mapping-without-ldap-across-an-enterprise/m-p/568687#M114751</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/306035"&gt;@PA_nts&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The following DOC describes the different methods of user mapping:&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/user-id/user-id-concepts/user-mapping" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/user-id/user-id-concepts/user-mapping&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Dec 2023 14:08:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-mapping-without-ldap-across-an-enterprise/m-p/568687#M114751</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2023-12-06T14:08:29Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID mapping without ldap across an enterprise</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-mapping-without-ldap-across-an-enterprise/m-p/568939#M114786</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;What I have are user-id agents on windows servers to grab active-directory logs, you can always use agentless. You can have all your PAN's connect directly to the user agents, or you can distribute the info from one PAN to others. I dont recommend client probing as this leaves the clients vulnerable to other things.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;</description>
      <pubDate>Thu, 07 Dec 2023 20:12:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-mapping-without-ldap-across-an-enterprise/m-p/568939#M114786</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2023-12-07T20:12:27Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID mapping without ldap across an enterprise</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-mapping-without-ldap-across-an-enterprise/m-p/1250570#M126165</link>
      <description>&lt;P&gt;He also asked about group mapping without LDAP. If I'm not mistaken, group mapping is only available with an LDAP server profile: "&lt;SPAN&gt;Use the following procedure to enable the firewall to connect to your LDAP directory and retrieve&amp;nbsp;&lt;/SPAN&gt;&lt;A class="xref" title="" href="https://docs.paloaltonetworks.com/content/techdocs/en_US/pan-os/11-0/pan-os-admin/user-id/user-id-concepts/group-mapping.html#id93306080-fd9b-4f1b-96a6-4bfe1c8e69df" data-type="" data-format="dita" data-scope="local" target="_blank"&gt;Group Mapping&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;information."&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/user-id/map-users-to-groups" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/user-id/map-users-to-groups&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;If not, I'm happy to hear another way. I'm currently looking for a workaround.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;BR&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Mar 2026 15:43:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-mapping-without-ldap-across-an-enterprise/m-p/1250570#M126165</guid>
      <dc:creator>J.Dhling</dc:creator>
      <dc:date>2026-03-19T15:43:27Z</dc:date>
    </item>
  </channel>
</rss>

