<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GlobalProtect and AD group restriction in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6770#M4967</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tmasuda,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe there was a bug regarding this issue but it has since been fixed.&lt;/P&gt;&lt;P&gt;You can try to restrict access to a specific group by going to Global Protect Portal &amp;gt; Client Configuration &amp;gt; User/User Group, find the desired group to which you want to grant access for that specific configuration profile. The image below illustrates the path:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="6168" alt="vpn_user_group.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/6168_vpn_user_group.png" /&gt;&lt;/P&gt;&lt;P&gt;I have tested successfully in PanOS 5.0.1 and 5.0.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 04 Apr 2013 13:30:51 GMT</pubDate>
    <dc:creator>filipe</dc:creator>
    <dc:date>2013-04-04T13:30:51Z</dc:date>
    <item>
      <title>GlobalProtect and AD group restriction</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6766#M4963</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm setting up GlobalProtect, which works just fine.&amp;nbsp; Now I want to restrict GlobalProtect access to only 1 AD group.&amp;nbsp; I created a separate GP authentication profile with my ssl_vpn AD group in the allow list, but as soon as I commit that allow list, not a single user can log in to the GlobalProtect anymore.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is this the correct way to configure this?&amp;nbsp; I also tried configuring the AD group as source user on the GlobalProtect portal definition, but that didn't help either.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm suspecting that there is a problem with the retrieval of the groups and the group membership from the AD server.&amp;nbsp; We added the AD group to the AD after configuring the AD server definition in the PAN firewall, after which we couldn't see it in the web interface listed in the available AD groups.&amp;nbsp; However, in CLI the "show user group-mapping state &amp;lt;domain&amp;gt;" showed the group, so it seemed to be retrieved by the PAN.&amp;nbsp; We configured the GlobalProtect settings via CLI, since the group was not visible in the web interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could this be related?&amp;nbsp; Any other way to get more information about the available groups on the device?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Edit: PA-2050 cluster, running 4.1.0, group mapping is configured on the firewall.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Dec 2011 16:42:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6766#M4963</guid>
      <dc:creator>fcremer</dc:creator>
      <dc:date>2011-12-06T16:42:09Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and AD group restriction</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6767#M4964</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I am having a similar issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PA guys, any hints? Is this a bug in 4.1?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 21:03:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6767#M4964</guid>
      <dc:creator>snaft</dc:creator>
      <dc:date>2011-12-15T21:03:59Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and AD group restriction</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6768#M4965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Same issue exists here..&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 15 Dec 2011 21:56:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6768#M4965</guid>
      <dc:creator>OCDBE</dc:creator>
      <dc:date>2011-12-15T21:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and AD group restriction</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6769#M4966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;bump.. trying to figure this out as well. two years later and documentation to complete such simple task is horrible.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Apr 2013 09:43:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6769#M4966</guid>
      <dc:creator>LCMember2262</dc:creator>
      <dc:date>2013-04-04T09:43:27Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and AD group restriction</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6770#M4967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tmasuda,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I believe there was a bug regarding this issue but it has since been fixed.&lt;/P&gt;&lt;P&gt;You can try to restrict access to a specific group by going to Global Protect Portal &amp;gt; Client Configuration &amp;gt; User/User Group, find the desired group to which you want to grant access for that specific configuration profile. The image below illustrates the path:&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="6168" alt="vpn_user_group.png" class="jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/6168_vpn_user_group.png" /&gt;&lt;/P&gt;&lt;P&gt;I have tested successfully in PanOS 5.0.1 and 5.0.3.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope it helps.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 04 Apr 2013 13:30:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6770#M4967</guid>
      <dc:creator>filipe</dc:creator>
      <dc:date>2013-04-04T13:30:51Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and AD group restriction</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6771#M4968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i found another post with the answer. You need to fill the domain under ldap server profile.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 05 Apr 2013 03:23:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6771#M4968</guid>
      <dc:creator>LCMember2262</dc:creator>
      <dc:date>2013-04-05T03:23:05Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and AD group restriction</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6772#M4969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for this but I doubt this is the best practice. Personally I've configured an authentication sequence like PA recommended. First Kerberos, then Radius and then local. So I'd assume I should be able to retrieve a user/group list from Kerberos (and Radius) to specify the allow list there, not in the GP Portal config. Else, if Kerberos fails, wouldn't users authenticate with Radius and get access anyway? Or is it most restrictive, e.g.. if Kerberos fails it won't allow access? Then there's no proper auth sequence.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Jun 2013 12:15:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6772#M4969</guid>
      <dc:creator>RamonWeldam</dc:creator>
      <dc:date>2013-06-04T12:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and AD group restriction</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6773#M4970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;According to PAN, an authentication sequence is NOT recommended because of the reasons described earlier. It needs to be consistent so just one auth server should be chosen. One thing that confused me is that authentication and authorization appear to be the same in a PAN context: if you can't authenticate yuou are not authorized either. When you are authenticated, you are authorized too. In other words, all is done in the authentication section, there's no separate section for authorization in PANOS5.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 09 Jul 2013 11:38:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/6773#M4970</guid>
      <dc:creator>RamonWeldam</dc:creator>
      <dc:date>2013-07-09T11:38:17Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and AD group restriction</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/188747#M57238</link>
      <description>&lt;P&gt;is there a way to restrict users even installing GlobalProtect unless they are on a domain joined computer - ie. stopping users from installing it on their home computers ?&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2017 05:46:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/188747#M57238</guid>
      <dc:creator>djh3003</dc:creator>
      <dc:date>2017-11-27T05:46:57Z</dc:date>
    </item>
    <item>
      <title>Re: GlobalProtect and AD group restriction</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/189610#M57383</link>
      <description>&lt;P&gt;You could use AD to install domain certificates on your own assets.&amp;nbsp; Then use the presence of the valid certificate as a second factor in the Global protect authorization.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/71/globalprotect/globalprotect-admin-guide/set-up-the-globalprotect-infrastructure/set-up-globalprotect-user-authentication/set-up-two-factor-authentication/enable-two-factor-authentication-using-certificate-and-authentication-profiles" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/71/globalprotect/globalprotect-admin-guide/set-up-the-globalprotect-infrastructure/set-up-globalprotect-user-authentication/set-up-two-factor-authentication/enable-two-factor-authentication-using-certificate-and-authentication-profiles&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 03 Dec 2017 13:02:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/globalprotect-and-ad-group-restriction/m-p/189610#M57383</guid>
      <dc:creator>pulukas</dc:creator>
      <dc:date>2017-12-03T13:02:13Z</dc:date>
    </item>
  </channel>
</rss>

