User-ID group mapping allows the Palo Alto Networks firewall to retrieve user group membership information from directory services like Active Directory (AD), Azure AD, or other LDAP-based systems. The primary benefit is simplified administration and enhanced security:
For User-ID to successfully map users and enforce group-based policies, users must belong to at least one group that the firewall is configured to map.
Before configuring, thoroughly understand your directory services:
Device > Server Profiles > LDAP
):
Define connection details to the directory server(s):
Device > User Identification > Group Mapping Settings
):
Link the LDAP profile and define scope:
Device > Virtual Systems > [vsys] > Resource tab
) to share IP-to-User and/or User-to-Group mappings with other virtual systems on the same firewall. Consolidate User-ID sources onto the hub vsys. Mappings learned locally on a vsys take precedence over mappings from the hub.
Device > User Identification > User Mapping > Setup
) Use cautiously if User-ID sources provide usernames without domains AND usernames are guaranteed unique across all mapped domains. Configure group mapping first.
After configuration and commit, verify the mappings:
show user group-mapping state all
(Confirms connectivity to LDAP server).
show user group list
(Shows groups available for policy).
show user group name "
"
(Shows members of a specific group known to the firewall. Use quotes if the name has spaces).
show user user-attributes user all
(Displays Primary Username, Email, Alternate Usernames retrieved for users).
show user group-mapping statistics
(Shows last update time, next update time, number of groups/users mapped).
debug user-id refresh group-mapping all
(Forces an immediate refresh of group mappings from the directory server after changes).
For the PCNSE exam, regarding Group Mapping:
show user group list
and
show user group-mapping state all
.