PAN-OS: Requirements to Support Dynamic User Groups (DUGs)

Introduction

Dynamic User Groups (DUGs) in PAN-OS allow for powerful, context-aware policy enforcement by grouping users based on dynamic tags rather than static directory membership. However, for DUGs to function correctly, several underlying components and configurations must be in place. Understanding these requirements is crucial for successful implementation.

Core Requirements for DUG Functionality

1. Functional User-ID Implementation

2. A Source for Tag Information

The "dynamic" aspect of DUGs comes from the tags applied to user mappings. You need a mechanism to generate and assign these tags:

3. Dynamic User Group Object Configuration

4. Policy Rule Configuration

5. Network Connectivity and Firewall Rules

Summary of Requirements

Component/Feature Requirement Summary Primary Configuration Area
Base User-ID Functional IP-to-User mapping from any standard source (Server Mon, GP, CP, API, Syslog etc.). Device > User Identification
Tag Source (Choose at least one) A mechanism to associate tags with IP/User mappings. - Objects > GlobalProtect (HIP)
- API Configuration (External System)
- Panorama > Cloud Services (VM Info)
- Cloud Identity Engine Config
Dynamic User Group Object Definition of the group based on matching specific tags. Objects > Dynamic User Groups
Policy Utilising DUG Security, QoS, Decryption, or Authentication rules referencing the DUG name. Policies > [Policy Type] (Source User field)
Network Connectivity Allow communication between tag sources, firewall/Panorama, and clients as needed. Firewall Rules, Routing, Interface Config
(Optional) Group Mapping Needed if combining DUG context with static group membership in policies. Device > User Identification > Group Mapping Settings

PCNSE Exam Focus

For the PCNSE exam, understand these requirements for DUGs:

References for Using Dynamic User Groups (DUG) with User-ID Mappings