Palo Alto Networks Group Mapping Methods

Overview

Group mapping in Palo Alto Networks' PAN-OS allows administrators to define security policies based on user group memberships rather than individual users. This approach simplifies policy management, especially in dynamic environments where users frequently join or leave groups.

Group Mapping Methods

1. LDAP-Based Group Mapping

The firewall connects to an LDAP directory (e.g., Active Directory) to retrieve user and group information. This method involves:

sequenceDiagram participant Firewall participant LDAP Firewall->>LDAP: Bind and Authenticate Firewall->>LDAP: Query for Groups LDAP-->>Firewall: Return Group Information Firewall->>LDAP: Query for Users LDAP-->>Firewall: Return User Information

2. Custom Group Mapping

Custom groups are defined using LDAP filters without requiring changes on the LDAP server. This method is useful when:

3. Cloud Identity Engine (CIE)

The Cloud Identity Engine allows integration with cloud-based directories like Azure AD, Okta, and Google Workspace. Benefits include:

sequenceDiagram participant Firewall participant CIE participant CloudDirectory Firewall->>CIE: Request User/Group Info CIE->>CloudDirectory: Fetch Data CloudDirectory-->>CIE: Return Data CIE-->>Firewall: Provide User/Group Info

Configuration Steps

A. LDAP Server Profile

  1. Navigate to Device > Server Profiles > LDAP .
  2. Click Add and configure:
    • Name : Unique identifier for the profile.
    • Server List : Add LDAP servers (up to 4 for redundancy).
    • Type : Choose the directory type (e.g., Active Directory).
    • Base DN : Starting point in the directory for searches.
    • Bind DN and Password : Credentials for authentication.

B. Group Mapping Settings

  1. Navigate to Device > User Identification > Group Mapping Settings .
  2. Click Add and configure:
    • Name : Unique identifier for the mapping.
    • Server Profile : Select the LDAP profile created earlier.
    • Update Interval : Frequency of updates from the directory.
    • User Domain : Specify if overriding the domain name.
    • Group Include List : Select groups to include in policies.

C. User and Group Attributes

Define attributes to identify users and groups:

User-ID Best Practices for Group Mapping

Defining policy rules based on user group membership simplifies administration, as it eliminates the need to update rules whenever group membership changes. The following best practices are recommended for configuring group mapping in LDAP deployments using Palo Alto Networks firewalls:

sequenceDiagram participant Firewall participant LDAP participant Admin Admin->>Firewall: Configure Group Mapping Firewall->>LDAP: Query for Groups LDAP-->>Firewall: Return Group Data Firewall->>Admin: Display Mapped Groups

Configuring a Master Device in Panorama for User and Group Mapping

To enable Panorama to collect user and group mapping information for use in security policies, designate a managed firewall as a Master Device. This configuration allows Panorama to retrieve group mappings from the Master Device, facilitating the creation of user- and group-based policies.

Steps to Configure a Master Device:

  1. Enable Group Mapping on the Firewall:
    • On the firewall intended to be the Master Device, configure group mapping settings to connect to your directory services (e.g., Active Directory) using an LDAP server profile.
  2. Designate the Master Device in Panorama:
    • In Panorama, navigate to Panorama > Device Groups .
    • Select the appropriate device group and click Edit .
    • Under the General tab, select the firewall to act as the Master Device.
    • Enable the option "Store users and groups from the master device if reporting and filtering of groups is enabled in Panorama settings" .
  3. Enable Reporting and Filtering on Groups:
    • Navigate to Panorama > Setup > Management .
    • In the Panorama Settings section, click Edit .
    • Enable the option "Enable reporting and filtering on groups" .
  4. Commit the Configuration:
    • After completing the above steps, commit the changes to Panorama to apply the configuration.

Once configured, Panorama will retrieve user and group information from the designated Master Device, allowing administrators to select users and groups when creating security policy rules.

Note: Only one Master Device can be assigned per device group. If the Master Device becomes unavailable, Panorama will retain the last known user and group information until the Master Device is restored or replaced.

For detailed guidance, refer to the official documentation: Retrieve Group Mappings Using a Master Device .

sequenceDiagram participant LDAP as LDAP Server participant MasterFW as Master Firewall participant Panorama as Panorama Note over MasterFW,LDAP: Initial Setup MasterFW->>LDAP: Retrieve user and group mappings Note over Panorama,MasterFW: Configuration Panorama->>MasterFW: Designate as Master Device Panorama->>Panorama: Enable reporting and filtering on groups Note over Panorama,MasterFW: Data Retrieval MasterFW-->>Panorama: Provide user and group mapping data Note over Panorama: Policy Creation Panorama->>Panorama: Populate group names in policy rule drop-downs

References