Palo Alto Networks User-ID Acquisition Methods

User-ID Overview

For more detailed information, refer to the official documentation: User-ID Overview - Palo Alto Networks

User-ID enables the firewall to associate IP addresses with usernames, allowing for user-based policies and visibility. Below are the primary methods for acquiring User-ID mappings.

1. Server Monitoring

The firewall monitors authentication events from servers like Active Directory, Exchange, or eDirectory to map IP addresses to usernames.

graph TD A[User logs into AD] --> B[Server logs authentication event] B --> C[Firewall reads event logs] C --> D[Firewall maps IP to username]

2. Syslog Integration

The firewall listens to syslog messages from devices like wireless controllers or proxy servers that authenticate users.

graph TD A[User authenticates via device] --> B[Device sends syslog to firewall] B --> C[Firewall parses syslog] C --> D[Firewall maps IP to username]

3. Authentication Portal

When other methods fail, the firewall can prompt users to authenticate via a web portal to establish IP-to-username mappings.

graph TD A[User accesses network] --> B[Firewall prompts for authentication] B --> C[User provides credentials] C --> D[Firewall maps IP to username]

4. Terminal Services (TS) Agent

In multi-user environments like Citrix or Terminal Services, the TS Agent maps multiple users sharing a single IP address.

graph TD A[Multiple users log into terminal server] --> B[TS Agent monitors sessions] B --> C[TS Agent reports to firewall] C --> D[Firewall maps IP and port to usernames]

5. GlobalProtect

The GlobalProtect VPN client provides user and IP information to the firewall upon connection.

graph TD A[User connects via GlobalProtect] --> B[Client sends user/IP info] B --> C[Firewall maps IP to username]

6. XML API

External systems can send user mapping information to the firewall using the XML API.

graph TD A[External system detects login] --> B[System sends XML API request] B --> C[Firewall receives and maps IP to username]

7. Client Probing (WMI)

The firewall probes Windows clients using WMI to determine the logged-in user.

graph TD A[Firewall sends WMI probe] --> B[Client responds with user info] B --> C[Firewall maps IP to username]

8. HTTP Header Insertion

The firewall inserts user information into HTTP headers for downstream devices or services.

graph TD A[User initiates HTTP request] --> B[Firewall adds user info to header] B --> C[Request forwarded to destination]

User Mapping Overview

For more detailed information, refer to the official documentation: User Mapping - Palo Alto Networks

Group Mapping Overview

For more detailed information, refer to the official documentation: Group Mapping - Palo Alto Networks

References