<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Active Directory groups w/ members from multiple domains in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-groups-w-members-from-multiple-domains/m-p/595010#M118422</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;. Thanks for the links as I had not seen them yet! It turns out they don't help me in my situation.&amp;nbsp; I'm already at the root of each of the two domains, each their own forest, with the only connection being a trust relationship.&lt;BR /&gt;&lt;BR /&gt;Tried to see if group mapping could be done via SAML connection to Entra ID but appears to be LDAP only, at least in PAN-OS 10.2. Investigation continues!&lt;/P&gt;</description>
    <pubDate>Thu, 15 Aug 2024 12:49:47 GMT</pubDate>
    <dc:creator>JamesH1318</dc:creator>
    <dc:date>2024-08-15T12:49:47Z</dc:date>
    <item>
      <title>Active Directory groups w/ members from multiple domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-groups-w-members-from-multiple-domains/m-p/594950#M118412</link>
      <description>&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;I'm using AD groups for some security policies and am expanding to use other domains in our company. While I can add users from another domain into an AD group, the PA only shows me the users in the same domain as the group.&amp;nbsp; For example:&lt;BR /&gt;&lt;BR /&gt;Domain 1: DC=first,DC=com&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;User 1: CN=idone,OU=users,DC=first,DC=com&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;Group: CN=cars,OU=groups,DC=first,DC=com&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;&lt;BR /&gt;Domain 2: DC=second,DC=com&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;User 2:&amp;nbsp;CN=idtwo,OU=funnyguys,DC=second,DC=com&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The domains, first.com and second.com, have a trust relationship and therefore I can add users from second.com into groups in first.com. However, when I do a show user group name "&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;CN=cars,OU=groups,DC=first,DC=com" I only see first.com\idone.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;&lt;BR /&gt;If I look at the&amp;nbsp;CN=cars,OU=groups,DC=first,DC=com directly in AD, user idtwo is in the member list but as a SID.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt; I&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;SPAN&gt;&lt;SPAN class="ui-provider a b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak"&gt;s there any way to translate FSP (Foreign Security Principals) into usable \ recognizable usernames?&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2024 19:09:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-groups-w-members-from-multiple-domains/m-p/594950#M118412</guid>
      <dc:creator>JamesH1318</dc:creator>
      <dc:date>2024-08-14T19:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory groups w/ members from multiple domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-groups-w-members-from-multiple-domains/m-p/594976#M118414</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/235054"&gt;@JamesH1318&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Does these articles help?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClExCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClExCAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGICA0" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGICA0&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClI8CAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClI8CAK&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 03:43:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-groups-w-members-from-multiple-domains/m-p/594976#M118414</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2024-08-15T03:43:31Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory groups w/ members from multiple domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-groups-w-members-from-multiple-domains/m-p/595010#M118422</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/77347"&gt;@TomYoung&lt;/a&gt;. Thanks for the links as I had not seen them yet! It turns out they don't help me in my situation.&amp;nbsp; I'm already at the root of each of the two domains, each their own forest, with the only connection being a trust relationship.&lt;BR /&gt;&lt;BR /&gt;Tried to see if group mapping could be done via SAML connection to Entra ID but appears to be LDAP only, at least in PAN-OS 10.2. Investigation continues!&lt;/P&gt;</description>
      <pubDate>Thu, 15 Aug 2024 12:49:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-groups-w-members-from-multiple-domains/m-p/595010#M118422</guid>
      <dc:creator>JamesH1318</dc:creator>
      <dc:date>2024-08-15T12:49:47Z</dc:date>
    </item>
    <item>
      <title>Re: Active Directory groups w/ members from multiple domains</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/active-directory-groups-w-members-from-multiple-domains/m-p/1239473#M125285</link>
      <description>&lt;P&gt;Any luck on finding a solution? I would be interested in learning if you found something that worked!&lt;/P&gt;
&lt;P&gt;Would pulling both domains into the Palo LDAP suffice? It would be a bit more work as you would need to replicate domain groups within both, but as far as I can tell your original configuration isn't possible.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Oct 2025 18:22:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/active-directory-groups-w-members-from-multiple-domains/m-p/1239473#M125285</guid>
      <dc:creator>RH747</dc:creator>
      <dc:date>2025-10-06T18:22:21Z</dc:date>
    </item>
  </channel>
</rss>

