1. Palo Alto Networks Prisma Access Administrator’s Guide: "Configure SaaS Tenant Restriction for Google." This document explicitly details the procedure: "To control access to Google applications, you can configure a SaaS tenant restriction policy that adds the X-Goog-Allowed-Domains HTTP header to web requests for Google applications. This header specifies the domains that your users can access."
Source: Palo Alto Networks TechDocs, Prisma Access Administrator’s Guide.
2. Palo Alto Networks PAN-OS® Administrator's Guide: "Dynamic Address Groups." This guide explains that DAGs "allow you to create policy that automatically adapts to changes... without the need to manually update and commit policy changes. The firewall dynamically imports the IP addresses... based on the tags you define." This confirms their function is IP-based.
Source: Palo Alto Networks TechDocs, PAN-OS Administrator's Guide 10.2, section on Objects > Address Groups.
3. Palo Alto Networks PAN-OS® Administrator's Guide: "Create a Dynamic User Group." The documentation states, "A dynamic user group is a type of group membership list that is based on tags that are registered on the firewall." This shows DUGs are for grouping users, not for application-layer tenant control.
Source: Palo Alto Networks TechDocs, PAN-OS Administrator's Guide 10.2, section on Objects > Dynamic User Groups.