Remove Domain Name from LDAP user mapping IMPOSIBLE =(

Showing results for 
Show  only  | Search instead for 
Did you mean: 
Please sign in to see details of an important advisory in our Customer Advisories area.

Remove Domain Name from LDAP user mapping IMPOSIBLE =(

L1 Bithead



Someone know if there is a way to remove the domain name from the group mapping

The reason why is because i get from external source on palo alto the user id test1 or "test2" or "test3"

Goal is create a policy rule base on the source user that is being part of a domain group




In my case LDAP group mapping get this information:


show user group name\test

short name:\test

source type: ldap
source: test

[1 ]\test1
[2 ]\test2
[3 ]\test3


This is good but only need from the group mapping the name

"test1" or "test2" or "test3"

and not\test1\test2\test3



i expend hours and there is no way to understand or found the reason why palo alto get from ldap group mapping "domain name + name" 




Hi @alvaroarcaz ,

If I am not wrong, group mapping will always add domain, because it needs to cover cases where you have multiple domains or even domain forest.


So in my humble opinion you should try to append the domain to the user-ip-mapping so it can match the group mapping.

Can you share bit more information how you receive user-ip-mapping? How it is configured currently?




I receive the user logs from the Pulse Secure VPN appliance to the USER ID
agent located on windows server

With the regex i was able to just get the user id from the user connected.

My surprise was that I was not unable to map the user id with the domain
group on security policy, this is really a bad situation for us.

Is it possible to just avoid the domain name on the palo alto when trying
to search on ldap group?
I can not understand why yes or yes paloalto build this:

>From LDAP group PaloAlto get:

With the UserID agent after the regex i get a mapping with IP+userid, and
on the firewall logs i can see this way:

source ip: ip from user
source user: userid

The security policy will never match!! as there is a difference between

domainname\userid => LDAP PaloAlto

userid => Information from my agent

Hours and hours spent here and no answer anywhere im totally frustrated ...

Hi @alvaroarcaz ,

I know there is a way to override the domain for Group Mapping, but not sure if there is a way to remove it completely.

As I mentioned for me it sound reasonable to have it as you may work in multi domain environment.


The solution for you to add the desired domain to the user-ip-mapping from the User-ID agent that is processing the Pulse Secure logs. In User-ID agent settings that is parsing the Pulse Secure syslog messages go to User Identification -> Discovery -> Servers -> Edit you Pulse Secure entry and add the domain the same way as you see it the group mapping




Thanks for the answer. This worked as expected for Windows users but
problems came for MAC users or Iphone Users.

In my company the IOS devices are not part of the active directory domain
and for instance there is no way where a USERID agent can find domain
events on the active directory.

For me the solution came to avoid this domain mapping on firewall level, i
have had a case with the vendor for more than a month and am still waiting
to find the way....

As @aleksandar.astardzhiev stated above, you can add in whatever domain you want.  Below, I'm using a syslog filter to capture the username via syslog, no domain added.



I update the syslog sender config to include a domain (mydomain).



I trigger another syslog message, and the domain I specified is added.



  • 5 replies
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!