An enterprise has a large Palo Alto Networks footprint that includes onsite firewalls and Prisma Access for mobile users, which is managed by Panorama. The enterprise already uses GlobalProtect with SAML authentication to obtain IP-to-user mapping information.
However, Information Security wants to use this information in Prisma Access for policy enforcement based on group mapping. Information Security uses on-premises Active Directory (AD) but is uncertain about what is needed for Prisma Access to learn groups from AD.
How can policies based on group mapping be learned and enforced in Prisma Access?
- Configure Prisma Access to learn group mapping via SAML assertion.
- Set up group mapping redistribution between an onsite Palo Alto Networks firewall and Prisma Access.
- Assign a master device in Panorama through which Prisma Access learns groups.
- Create a group mapping configuration that references an LDAP profile that points to on-premises domain controllers.
Answer(s): C
Reference:
https://docs.paloaltonetworks.com/prisma/prisma-access/prisma-access-panorama-admin/configure-user-based-policies-with-prisma-access/retrieve-user-id-information.html#id823f5b30-2c1d-4c87-9ae6-a06573455af7
Reveal Solution Next Question