<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect with RSA SecurID and Group Mapping for Security Policy in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/282423#M76086</link>
    <description>&lt;P&gt;So I did use the groups in security policies but that is more a component of UserID rather than the setup for the VPN access. My deployment utilises a single portal and gateway but has multiple agent configurations that are mapped to the returned groups. In this way I am able to provide different split tunnel settings, agent settings and so forth&lt;/P&gt;</description>
    <pubDate>Tue, 13 Aug 2019 05:56:11 GMT</pubDate>
    <dc:creator>SteveMcBride</dc:creator>
    <dc:date>2019-08-13T05:56:11Z</dc:date>
    <item>
      <title>Global Protect with RSA SecurID and Group Mapping for Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/280368#M75841</link>
      <description>&lt;P&gt;I have setup Global Protect with RSA SecurID authentication.&amp;nbsp; I would like to use the Active Directory groups of these users in my security policy to then allow or deny access to resources based upon their membership.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have configured the group mapping settings and the firewall is pulling in the AD groups.&amp;nbsp; However, the policies I have created are not being matched.&amp;nbsp; It appears since the authentication is via RSA it is not associating the user with the AD groups it is pulling via the group mapping since the user is not associated with the domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I found this article which is relating:&amp;nbsp;&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClQdCAK" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClQdCAK&lt;/A&gt; but it only seems to be working for the initial authentication, not for actual security policy access post authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IIs there a way to get this working or is there a better method for restricting resource access based upon group membership when authenticating via RADIUS to RSA SecurID?&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 18:39:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/280368#M75841</guid>
      <dc:creator>TSilverline</dc:creator>
      <dc:date>2019-07-31T18:39:36Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with RSA SecurID and Group Mapping for Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/280705#M75871</link>
      <description>&lt;P&gt;I have not needed to try this but could you not just add the domain name to the authentication profile and then change the username modifier to "%USERDOMAIN%\%USERINPUT%".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall will then see user fred smith as domain\fred smith.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the only additional requirement may be to tell radius server to ignore or accept any domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2019 08:35:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/280705#M75871</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2019-08-02T08:35:28Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with RSA SecurID and Group Mapping for Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/282242#M76054</link>
      <description>&lt;P&gt;I recently utilised RSA to authenticate GLobalProtect users. I leveraged ISE/RADIUS to do this and found it fairly straightforward with the RADIUS sending back group mappings to the Palos in the access-accept. These group mapping sent from the radius have to match with the group mapping configured for the globalprotect profile.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My struggle was more related to getting the out of sync, new pin messages to present but this came down to issues between ISE and the PAs.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 05:49:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/282242#M76054</guid>
      <dc:creator>SteveMcBride</dc:creator>
      <dc:date>2019-08-12T05:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with RSA SecurID and Group Mapping for Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/282311#M76073</link>
      <description>&lt;P&gt;Thanks for the reply.&amp;nbsp; Did you then use the groups returned in your security policies?&amp;nbsp; Or did you have multiple portals/gateways handing out different IP address ranges authenticating different user groups?&amp;nbsp; Or did you simply allow/deny access based upon group membership?&lt;/P&gt;</description>
      <pubDate>Mon, 12 Aug 2019 16:24:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/282311#M76073</guid>
      <dc:creator>TSilverline</dc:creator>
      <dc:date>2019-08-12T16:24:22Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with RSA SecurID and Group Mapping for Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/282423#M76086</link>
      <description>&lt;P&gt;So I did use the groups in security policies but that is more a component of UserID rather than the setup for the VPN access. My deployment utilises a single portal and gateway but has multiple agent configurations that are mapped to the returned groups. In this way I am able to provide different split tunnel settings, agent settings and so forth&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 05:56:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/282423#M76086</guid>
      <dc:creator>SteveMcBride</dc:creator>
      <dc:date>2019-08-13T05:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with RSA SecurID and Group Mapping for Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/282564#M76109</link>
      <description>&lt;P&gt;Thanks again for your reply.&lt;/P&gt;&lt;P&gt;Can you help me better understand what you mean by it being more a component of UserID?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I understand the concept of mapping users to different agent configurations based upon groups - but i dont know how to use the groups of an authenticated RSA user for this purpose because RSA doesn't appear return all of the users groups.&amp;nbsp; This seems pretty straightforward using straight AD, or using local groups in the FW..&amp;nbsp; But I am not sure how to do it when authenticating against RSA.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, in your configuration, in which identity source are the groups configured?&amp;nbsp; If AD, could you help me understand how you configured this?&amp;nbsp; If somewhere else, can you explain how you configured the groups and got it all working?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 19:52:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/282564#M76109</guid>
      <dc:creator>TSilverline</dc:creator>
      <dc:date>2019-08-13T19:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with RSA SecurID and Group Mapping for Security Policy</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/283342#M76211</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;I have not needed to try this but could you not just add the domain name to the authentication profile and then change the username modifier to "%USERDOMAIN%\%USERINPUT%".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The firewall will then see user fred smith as domain\fred smith.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the only additional requirement may be to tell radius server to ignore or accept any domain.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Foir some reason I didn't actually try at first this because you seemed to be speculating about the solution; but it was indeed the correct answer.&lt;/P&gt;&lt;P&gt;After adding the domain prepend, the group mapping function started working and I am now able to use AD groups for RSA authenticated users in my security policy!&lt;/P&gt;&lt;P&gt;No changes to RSA RADIUS server needed.&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Sat, 17 Aug 2019 22:19:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-rsa-securid-and-group-mapping-for-security/m-p/283342#M76211</guid>
      <dc:creator>TSilverline</dc:creator>
      <dc:date>2019-08-17T22:19:19Z</dc:date>
    </item>
  </channel>
</rss>

