PAN-OS: Sharing User-ID Mappings Across Virtual Systems (User-ID Hub)

The Challenge in Multi-VSYS Environments

When a single Palo Alto Networks firewall is configured with multiple virtual systems (vsys), each vsys typically operates with its own independent configuration context, including its own User-ID mappings. Without a sharing mechanism, this means:

The Solution: User-ID Hub

Concept

PAN-OS provides a mechanism to centralize User-ID mapping collection and distribution within a multi-vsys firewall. This involves designating one specific virtual system as the User-ID Hub .

Mapping Types Shared

You can choose to share one or both types of mappings from the Hub:

You must select at least one mapping type to enable the Hub functionality.

Lookup Precedence

If a spoke vsys needs mapping information for a user/IP:

  1. It first checks its own local mapping table (if any mappings were learned directly on that vsys).
  2. If no local mapping is found, it then queries the designated User-ID Hub vsys.
  3. If a mapping is found on the Hub, that mapping is used.
  4. If no mapping is found locally or on the Hub, the user/group remains unknown for policy purposes on that spoke vsys.

Conclusion: Local mappings learned directly by a spoke vsys always take precedence over mappings shared from the Hub.

Benefits of Using a User-ID Hub

Configuration Steps

  1. Choose the Hub Virtual System:

    Select one existing vsys to act as the central User-ID Hub. This vsys should ideally have reliable network connectivity to your User-ID sources (DCs, LDAP servers, User-ID Agents).

  2. Enable Hub Functionality:

    • GUI Path: Device > Virtual Systems
    • Select the chosen Hub vsys and click Edit .
    • Navigate to the Resource tab.
    • Check the box `Make this vsys a User-ID data hub` .
    • Click `Yes` to confirm the informational message.
    • Under `Mapping Type` , select which mappings the hub will share:
      • IP User Mapping
      • User Group Mapping
      • (You must select at least one).
    • Click OK.
  3. Consolidate User-ID Source Configuration onto the Hub:

    • CRITICAL STEP: The Hub vsys must be configured to actually *collect* the mappings it intends to share.
    • Migrate or configure all necessary User-ID source settings exclusively on the **Hub vsys**:
      • Server Monitoring configurations ( Device > User Identification > User Mapping > Server Monitoring )
      • Group Mapping Settings & LDAP Server Profiles ( Device > User Identification > Group Mapping Settings & Device > Server Profiles > LDAP )
      • User-ID Agent connections ( Device > User Identification > User-ID Agents )
      • Syslog Parse Profiles / XML API configurations if used.
  4. Remove Duplicate Configurations from Spoke VSYS:

    • CRITICAL STEP: To gain the benefits of centralization and prevent conflicts/unnecessary load, remove the now-redundant User-ID source configurations (Server Monitoring, Group Mapping, Agent connections) from all *other* virtual systems ("spoke" vsys).
    • The spoke vsys will rely on querying the hub.
  5. Commit Changes:

    Commit the configuration on the firewall.

Ensure firewall rules and potentially Service Routes allow the necessary communication between the Hub vsys's management interface (or specified service route interface) and the directory servers/User-ID agents.

Verification

Use CLI commands to verify the hub configuration and mapping distribution:

Caveats and Gotchas

Best Practices

PCNSE Exam Focus

For the PCNSE exam, regarding sharing User-ID across vsys:

User-ID Hub (Multi-VSYS Sharing) Quiz

1. What is the primary benefit of configuring a User-ID Hub in a multi-vsys environment?

The main goal is simplification and consistency by configuring User-ID sources (like server monitoring, group mapping) only once on the hub vsys and sharing the results with other vsys.

2. Where is a virtual system designated as a User-ID Hub in the PAN-OS GUI?

The option to enable a vsys as a User-ID Hub and select the mapping types to share is located within the properties of the virtual system itself, under the Resource tab.

3. Which two types of User-ID mappings can be shared from a User-ID Hub vsys? (Select two)

The User-ID Hub configuration explicitly allows sharing of IP-to-User mappings and/or User-to-Group mappings. Terminal Server agent mappings are a known limitation and are not shared via this mechanism.

4. After enabling a vsys as a User-ID Hub, what critical configuration step MUST be performed for the hub to function correctly?

Simply designating a hub isn't enough. The hub vsys needs to be configured with the actual User-ID sources (like Server Monitoring, Group Mapping) to collect the data it will share. These configurations should ideally be removed from spoke vsys.

5. A spoke vsys (vsys2) needs user information for IP 10.1.1.100. It has a local mapping for this IP learned via Captive Portal. The User-ID Hub (vsys1) also has a mapping for 10.1.1.100 learned via Server Monitoring. Which mapping will vsys2 use for policy enforcement?

Mappings learned directly (locally) on a virtual system always take precedence over mappings shared from the User-ID Hub for the same IP address.

6. Which type of User-ID mapping source is explicitly NOT shared via the User-ID Hub mechanism?

IP-and-port-to-user mappings collected by User-ID agents installed on Terminal Servers are a known limitation and are not distributed through the User-ID Hub sharing feature. These must be collected by the vsys handling the TS traffic.

7. What is a primary benefit of consolidating Group Mapping configuration onto a User-ID Hub vsys?

By having only the hub vsys connect to and query the LDAP/AD servers for group memberships, you simplify the configuration (only set it up once) and reduce the overall query load on your directory infrastructure.

8. Which CLI command helps verify which vsys is acting as the User-ID Hub?

The `show user user-id-agent statistics` command output includes information about the configured User-ID Agents and will indicate which vsys, if any, is designated as the data hub.

9. When configuring a User-ID Hub, why is it important to remove redundant User-ID source configurations (like Server Monitoring) from the spoke virtual systems?

Keeping source configurations on spokes defeats the purpose of centralization. It causes spokes to still poll directory servers (unnecessary load) and can lead to confusion because locally learned mappings override hub mappings.

10. A firewall has vsys1 (Hub) and vsys2 (Spoke). Group Mapping is configured only on vsys1 and shared. A Security Policy on vsys2 uses the AD group 'Engineers'. How does vsys2 identify members of the 'Engineers' group?

When User Group Mapping sharing is enabled, spoke vsys query the designated hub vsys to resolve group memberships needed for policy evaluation, leveraging the centralized group mapping table maintained by the hub.

References