Consuming user group in GlobalProtect SAML Authentication

Showing results for 
Show  only  | Search instead for 
Did you mean: 

Consuming user group in GlobalProtect SAML Authentication

L0 Member

A bit of background: We are an all-Google G Suite company. We do not have internal LDAP servers. Everyone auths to Google. We are using PA 3060s as our firewalls and VPN systems.


We are getting ready to turn on SAML authentication for GlobalProtect. We are using Google as our IdP.


I've gotten it working, but I want to make policy decisions based on the user group that we are returning in the SAML assertion.


In Google, I have a user attribute with a "role" specified for each user, and then we are passing this back to the firewalls via a attribute mapping in our SAML App definition in Google.


Within the SAML authentication profile in the firewalls, I have set the User Group attribute to "role", and when I connect to the portal through Burp Suite, I see a SAML "role" attribute being returned from Google and asserted to the firewalls.


However, I have not found a way to use this "role" attribute in client IP pool assignments or in making policy decisions. I have tried making a local group that matches the "role" value, but that does not work.


Has anyone done this, or have any insight on this?






Cyber Elite
Cyber Elite

Hi @mtsujihara


I don't know it this user-group-mapping fof SAML users is possible. Probably not because the default group-mapping in the WebUI requires an LDAP profile.

But may be you should give this a try for the creation of groups and containing users:

L0 Member

Hi @mtsujihara


Could you please show me how to configure PA using Google SAML as IdP?


Thank you in advance,





L1 Bithead

I've gotten GSuite SAML2.0 working and have GSuite configured to send the user's "Department" as the "group" attribute. In the PA, I have the "User Group Attribute" set the "group". As the OP says, I don't see that I can use the "group" value anywhere (policies, etc).


Has anyone gotten this to work?



The firewall won't let you use that attribute the same as you would with an LDAP group. The link that @vsys_remo provided describes how you could probably script this to assign users to different groups using the xml-api and how you would format the input file that you would need to put together for this. 

I would recommend reaching out to your SE and setting up a feature request. 


It depends on how much you really need this group mapping for SAML authenticated users ... it will be a bit of work


  1. Set up a webserver
  2. Create a log forwarding profile for system logs that applies for global protect login and logout logs and send these logs to your webserver
  3. Create a web application on your webserver that processes these http request with the logs from your firewall
  4. For every log that the webserver receives your web application needs to push that information to the firewall API to create dynamic User-IP-Group mappings and also delete them when a user logs out

4 "simple" steps and you have implemented what you need 😛


But I recommend the feature request anyway ...

Thank you @vsys_remo and @BPry for the help! This is one of the last services still stuck on our ActiveDirectory - I'll put in the feature request and live with it for a bit longer.


Just an aside for anyone else with this issue - Perhaps JumpCloud can help in this case.




I dont know if this is still an issue for you, but i had a similar problem with Azure AD, so in the end created a secure LDAP connection to it and in the LDAP Group configuration changed the username to be email and that has worked both on Global Protect and Security rules.

Have anyone successfully implemented Group-Mapping with G-Suite?

Nope, still struggling with this same issues.  SAML authentication works great, but group information sent int he SAML assertion is not accessible in policy rules.  In my case, we have access to LDAP, but wanted to use SAML to be able to add Duo two factor authentication with a usable UI.  Opened a case with support, maybe all of us are wrong.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!