User-ID

cancel
Showing results for 
Search instead for 
Did you mean: 

User-ID

L4 Transporter

When enabling user-id where does it check against to get the information to identify  the users? I have it turned on for serveral zones and it only seems to work on the VPN user-id's.

42 REPLIES 42

L2 Linker

You can use the security log of you’re domain controllers.

 

Check device, User Identification. I prefer using the User ID Agent and point the Palo Alto to this agent.

 

There are also scripts available to get the users from a radius log.

 

Good luck!

Community Team Member

Hi @jdprovine,

 

This guide should be very helpful :

Getting Started User-ID

 

Cheers !

-Kiwi.

L7 Applicator

chances are that your user-id is not working at all.

 

the user ID is only showing for GP connections as learned via authentication.

 

 

@MickBall

That is what I was thinking too Mick, we authenticate against LDAP instead of AD and I was wondering if the PA only does the userid against AD

i have never tried with LDAP but i'm sure its something to do with the PA being only able to read LDAP groups and not LDAP attributes that some LDAP admins use instead of groups.

 

below is a link explaining this issue and a possible workaround.

 

it may not help you but at least give you a better understanding of whats going on.

 

Mick.

 

https://live.paloaltonetworks.com/t5/Learning-Articles/How-to-Work-with-User-ID-and-OpenLDAP-Dynamic...

@MickBall

So the PA does do it userid queries only against AD

Hi @jdprovine

 

There are many methods to collect User id information: reading Active Directory authentication logs, server sessions (drive maps), API scripts, Captive portal, syslog collection, TerminalServer sessions, GlobalProtect authentication,...

 

Please check out this article that highlights most of the main ways to collect user identification information and how to set it all up:

 

Getting Started: User-ID

Tom Piens
PANgurus

well i have only briefly browsed the document but my assumptions are as follows.

 

if your PA identifies its users via authentication, such as your VPN then you can use LDAP groups against those users for policies etc.

 

the previous link explains how to do this. but...

 

if your users do not auth via AD then you will not be able to map IP's to users as the LDAP server will not hold a database of user related IP's.

 

The PA user-id reads the security log on AD as this records users addresses when they use domain services, email, logon etc.

 

so I would say yes to your previous post.. But.. (again)

 

the user-AD agent installed seperately has config settings for EDirectory.. as wll as AD.

 

Mick. 

 oops! someone has just posted previous to me so may be of better use.

 

 

@reaper & @jdprovine

 

the document I refer to is the one i posted earlier, not the one from @reaper.

 

sorry for the confusion....

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!