This should be possible. First, enable group mapping using the documentation @domari mentioned. Make sure you add the included groups to the group mapping profile in distinguished name format (e.g. cn=groupe1,ou=myou,o=mydomain,o=local) in lower case. I have seen them fail time and time again if you use uppercase letters, or enter them in mydomain\somename format. Verify that your firewall is seeing the groups, and members using the steps here: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVcCAK In you have a client IP pool listed under your-GP-gateway > Agent > Client IP pool, then these IPs will apply to all gateway users. You will need to delete this in order to enable separate pools for different groups. Under your-GP-gateway > Client Settings, create a config for Groupe1. Under Source User, add Groupe1 once again using the distinguished name in lowercase (e.g. cn=groupe1,ou=myou,o=mydomain,o=local). Go to the IP Pools tab, and add your pool for Groupe1 users. Under Split Tunnel, add the included subnets you want to allow to be accessed over the VPN. Configure any other settings in the client config you need. Repeat the process for Groupe2 users. You will also need Security Policies which will allow access. You can use the same groups for source users in those policies as well.
... View more