<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic User-ID Agent - Domain Override? in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-domain-override/m-p/65092#M38918</link>
    <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I deseprately need an option to override the domain name for user-IP-mappings collected from an User-ID Agent.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I've found that the Terminal Server User-ID agent has that option (&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Domain-Override-Functionality-on-Terminal-Server-Agent/ta-p/63107)" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Domain-Override-Functionality-on-Terminal-Server-Agent/ta-p/63107)&lt;/A&gt; which is very handy for multi-domain environments, but unfortunately i couldnt find that option for the AD User-ID Agent.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I hope that there is some hidden switch or configuration that could make me to the job.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To give an example - i have a working User-ID Agent collecting and parsing the Event Logs from few DCs that are serving users in multiple domains in a single forest.&lt;/P&gt;&lt;P&gt;Domains:&lt;/P&gt;&lt;P&gt;dom1.world.contoso.com&lt;/P&gt;&lt;P&gt;dom2.world.contoso.com&lt;/P&gt;&lt;P&gt;dom3.world.contoso.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Users are mapped perfectly fine such as:&lt;/P&gt;&lt;P&gt;dom1\jdoe&lt;/P&gt;&lt;P&gt;dom2\owilde&lt;/P&gt;&lt;P&gt;dom3\tom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the same time Group Mapping via LDAP also works fine generally and users are mapped to the correct groups&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is that i want to enable Captive portal with Client Certificate Authentication which gives me no option to get the correct user domain. I am mapping the CN attribute of the user certificate for username, therefore all users are authenticated like this:&lt;/P&gt;&lt;P&gt;jdoe&lt;/P&gt;&lt;P&gt;owilde&lt;/P&gt;&lt;P&gt;tom&lt;/P&gt;&lt;P&gt;As a result group mapping does not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've found a nice workaround for that to set domain override in the group mapping to, for example contoso.com.&lt;/P&gt;&lt;P&gt;Then set in the certificate profile domain contoso.com as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then all users get authenticated as:&lt;/P&gt;&lt;P&gt;contoso.com\jdoe&lt;/P&gt;&lt;P&gt;contoso.com\owilde&lt;/P&gt;&lt;P&gt;contoso.com\tom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and they are being populated in the group mapping also in the same manner, therefore everything works fine.&lt;/P&gt;&lt;P&gt;Unfortunately there is no similar option for the User-ID agent and when i implement this workaround to make certificate authentcation on CP working, i lose group mapping for the User-ID because on User-ID users are automatically mapped to their corresponding domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is why i am looking for option to statically override the user domain in User-ID Agent. I can see that there is such option in the TS agent (&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Domain-Override-Functionality-on-Terminal-Server-Agent/ta-p/63107)," target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Domain-Override-Functionality-on-Terminal-Server-Agent/ta-p/63107),&lt;/A&gt; but i can not find it in the original User-ID agent.&lt;/P&gt;&lt;P&gt;Does anybody have an idea?&lt;/P&gt;</description>
    <pubDate>Fri, 25 Sep 2015 09:36:27 GMT</pubDate>
    <dc:creator>BLazarov</dc:creator>
    <dc:date>2015-09-25T09:36:27Z</dc:date>
    <item>
      <title>User-ID Agent - Domain Override?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-domain-override/m-p/65092#M38918</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I deseprately need an option to override the domain name for user-IP-mappings collected from an User-ID Agent.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I've found that the Terminal Server User-ID agent has that option (&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Domain-Override-Functionality-on-Terminal-Server-Agent/ta-p/63107)" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Domain-Override-Functionality-on-Terminal-Server-Agent/ta-p/63107)&lt;/A&gt; which is very handy for multi-domain environments, but unfortunately i couldnt find that option for the AD User-ID Agent.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I hope that there is some hidden switch or configuration that could make me to the job.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To give an example - i have a working User-ID Agent collecting and parsing the Event Logs from few DCs that are serving users in multiple domains in a single forest.&lt;/P&gt;&lt;P&gt;Domains:&lt;/P&gt;&lt;P&gt;dom1.world.contoso.com&lt;/P&gt;&lt;P&gt;dom2.world.contoso.com&lt;/P&gt;&lt;P&gt;dom3.world.contoso.com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Users are mapped perfectly fine such as:&lt;/P&gt;&lt;P&gt;dom1\jdoe&lt;/P&gt;&lt;P&gt;dom2\owilde&lt;/P&gt;&lt;P&gt;dom3\tom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the same time Group Mapping via LDAP also works fine generally and users are mapped to the correct groups&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem is that i want to enable Captive portal with Client Certificate Authentication which gives me no option to get the correct user domain. I am mapping the CN attribute of the user certificate for username, therefore all users are authenticated like this:&lt;/P&gt;&lt;P&gt;jdoe&lt;/P&gt;&lt;P&gt;owilde&lt;/P&gt;&lt;P&gt;tom&lt;/P&gt;&lt;P&gt;As a result group mapping does not work.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've found a nice workaround for that to set domain override in the group mapping to, for example contoso.com.&lt;/P&gt;&lt;P&gt;Then set in the certificate profile domain contoso.com as well.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Then all users get authenticated as:&lt;/P&gt;&lt;P&gt;contoso.com\jdoe&lt;/P&gt;&lt;P&gt;contoso.com\owilde&lt;/P&gt;&lt;P&gt;contoso.com\tom&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and they are being populated in the group mapping also in the same manner, therefore everything works fine.&lt;/P&gt;&lt;P&gt;Unfortunately there is no similar option for the User-ID agent and when i implement this workaround to make certificate authentcation on CP working, i lose group mapping for the User-ID because on User-ID users are automatically mapped to their corresponding domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is why i am looking for option to statically override the user domain in User-ID Agent. I can see that there is such option in the TS agent (&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/Domain-Override-Functionality-on-Terminal-Server-Agent/ta-p/63107)," target="_blank"&gt;https://live.paloaltonetworks.com/t5/Management-Articles/Domain-Override-Functionality-on-Terminal-Server-Agent/ta-p/63107),&lt;/A&gt; but i can not find it in the original User-ID agent.&lt;/P&gt;&lt;P&gt;Does anybody have an idea?&lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2015 09:36:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-domain-override/m-p/65092#M38918</guid>
      <dc:creator>BLazarov</dc:creator>
      <dc:date>2015-09-25T09:36:27Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Agent - Domain Override?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-domain-override/m-p/65111#M38926</link>
      <description>&lt;P&gt;Not sure if its an 'override' however if you enter the domain in the server profile (radius or LDAP) it should populate like you are wanting to. I have Global PRotect setup this way and use radius, so I just enter the 'domain' in the radius profile and the users diplay properly in the losg as domain\username.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2015 14:29:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-domain-override/m-p/65111#M38926</guid>
      <dc:creator>OtakarKlier</dc:creator>
      <dc:date>2015-09-25T14:29:23Z</dc:date>
    </item>
    <item>
      <title>Re: User-ID Agent - Domain Override?</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-domain-override/m-p/65119#M38930</link>
      <description>&lt;P&gt;Tested w. UID Agent 7.0.2, PANOS 7.0.2 VM-100:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the configuration file UserIDAgentConfig.xml, for each auth source (server), there is a default-domain variable, which does not have a value by default. I tested by filling in the desired domain name to be prepended and sending via XML API usernames with and without domains and checking on firewall:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;UserIDAgentConfig.xml:&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;server-settings&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;server-entry name="xxx" type="active-directory" address="xxx" port="" syslog-profile="" default-domain="xxx"/&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;lt;/server-settings&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In the following snippets, 10.1.1.1 is the firewall, 10.1.1.201 is the domain controller with UID Agent installed&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;XML file sent via curl:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;lt;uid-message&amp;gt;&lt;BR /&gt;&amp;lt;version&amp;gt;1.0&amp;lt;/version&amp;gt;&lt;BR /&gt;&amp;lt;type&amp;gt;update&amp;lt;/type&amp;gt;&lt;BR /&gt;&amp;lt;payload&amp;gt;&lt;BR /&gt;&amp;lt;login&amp;gt;&lt;BR /&gt;&amp;lt;entry name="uid" ip="10.1.1.121" timeout="20"/&amp;gt;&lt;BR /&gt;&amp;lt;/login&amp;gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;login&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;entry name="uid2" ip="10.1.1.122" timeout="20"/&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;/login&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;login&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;entry name="beta\uid3" ip="10.1.1.123" timeout="20"/&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;/login&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;lt;login&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;entry name="gamma\uid4" ip="10.1.1.124" timeout="20"/&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;lt;/login&amp;gt;&lt;/SPAN&gt;&lt;BR /&gt;&amp;lt;/payload&amp;gt;&lt;BR /&gt;&amp;lt;/uid-message&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;File was sent via:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;curl -vk --form file=@uid.xml &lt;A href="https://10.1.1.201:5006" target="_blank"&gt;https://10.1.1.201:5006&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;UID Agent displays username exactly how it was sent, without interpreting the separator (@ and \ tried):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/465i82FD1F2FB9AD20DE/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="uid3.png" title="uid3.png" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/466i0DEE840A32BB4E2E/image-size/original?v=mpbl-1&amp;amp;px=-1" border="0" alt="uid2.png" title="uid2.png" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and the firewall is updated:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;admin@pavm-7&amp;gt; show user ip-user-mapping all&lt;/P&gt;&lt;P&gt;IP Vsys From User IdleTimeout(s) MaxTimeout(s)&lt;BR /&gt;--------------- ------ ------- -------------------------------- -------------- -------------&lt;BR /&gt;10.1.1.124 vsys1 UIA gamma\uid4 222 222&lt;BR /&gt;10.1.1.201 vsys1 UIA alpha\panwagent 901 901&lt;BR /&gt;10.1.1.121 vsys1 UIA uid 397 397&lt;BR /&gt;10.1.1.125 vsys1 UIA uid5@delta 1127 1127&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So the default-domain variable in UID Agent configuration file doesn't seem to append or overwrite a domain name to users without domain, to get something usable for user-group mapping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Certificate used in CP is just a method to validate an identity - since it's not correlated natively to an auth server/sequence, I doubt you can extract fields from cert (e. g. UPN) to check user-group mapping.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are not trying to control internet access, but access to internal resources, Kerberos challenge introduced in PANOS 7.0 (works with browser-challenge method) might help.&lt;/P&gt;</description>
      <pubDate>Fri, 25 Sep 2015 16:55:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-id-agent-domain-override/m-p/65119#M38930</guid>
      <dc:creator>andreip</dc:creator>
      <dc:date>2015-09-25T16:55:03Z</dc:date>
    </item>
  </channel>
</rss>

