04-08-2019 05:11 AM - edited 04-08-2019 06:41 AM
Hello, I have a problem.
I just inherited a palo alto firewall.
I noticed that given a specific certificate and given the global protect client, every user of the ldap server can connect to the vpn.
I would like that only users in specific ldap groups could enter.
Let's say the groups come from active directory.
"domain"\user_group_allowed
"domain"\user_group_allowed_limited
how can I do that?
right now everyone on "domain" can open a vpn tunnel.
Could it be that what I'm looking for is under:
Device > Authentication Profile > Advanced > Allow list
and that I should Add the ldap groups there instead of "All" ?
Kindest Regards
04-08-2019 07:24 AM - edited 04-09-2019 12:53 AM
should I select the portal
then click agent
then click the config
then under user user groups add the two ldap groups?
yes you can do that, or you can add config-1 and add group1
then add config-2 and add group2
i do a seperate config most of the time as i also use this to direct different groups to different gateways.
you can also use this to give users different portal configs.
so group-1 (std users) could have the portal nailed down
group-2 (admin users) could have the portal unrestricted and an extra couple of gateways....
if yours is just for network access restrictions then just use the same portal config.
perhaps if you explain what the difference is between groups then i could advise further but please note @BPry 's comments.
04-24-2019 04:47 AM
And.......
make sure you have the domain name in the certificate profile "user domain" field.
06-24-2021 11:38 AM
04-08-2019 05:27 AM
firstly, configure device\server profile\ldap with the required permissions
then, configure device\user identification\group mapping settings.
here you can add the groups that you want to use.
then, network\portals and in the agent\configs you can add the 2 groups, one to each config.
this will allow users in both groups to use the VPN but you can then add security policies for each group to either restrict or allow access to the network.
04-08-2019 05:33 AM
Since you're saying that you just encountered the environment I would hold off on any access changes until you get a solid understanding of why it was configured in the way it was. Often in a new environment I see a lot of engineers make "big" changes as far as end-users are concerned, and that can be a massive turnoff from your users.
Find out what the users are connecting to and why. It could be that you simply need to utilizes Agent Configs on your gateway to seperate out the users in groups. One group might just get permission to remote into their computers, or potentially simply access email remotely; another group might rightfully need access to additional resources while working remotely.
04-08-2019 07:15 AM
"then, configure device\user identification\group mapping settings.
here you can add the groups that you want to use."
Thank you very much.
How can I "then, network\portals and in the agent\configs you can add the 2 groups, one to each config."
should I select the portal
then click agent
then click the config
then under user user groups add the two ldap groups?
04-08-2019 07:24 AM - edited 04-09-2019 12:53 AM
should I select the portal
then click agent
then click the config
then under user user groups add the two ldap groups?
yes you can do that, or you can add config-1 and add group1
then add config-2 and add group2
i do a seperate config most of the time as i also use this to direct different groups to different gateways.
you can also use this to give users different portal configs.
so group-1 (std users) could have the portal nailed down
group-2 (admin users) could have the portal unrestricted and an extra couple of gateways....
if yours is just for network access restrictions then just use the same portal config.
perhaps if you explain what the difference is between groups then i could advise further but please note @BPry 's comments.
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!