<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article Authentication via LDAP server in Expedition Articles</title>
    <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/ta-p/219609</link>
    <description>&lt;P&gt;Expedition offers local user authentication and external user authentication via LDAP and Radius servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this example, we will illustrate how to configure external authentication via a Windows Active Directory server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT size="4"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/H3&gt;
&lt;H3&gt;Settings in LDAP Server&lt;/H3&gt;
&lt;P&gt;We have created a server under the domain &lt;STRONG&gt;&lt;FONT color="#0000FF"&gt;sctc.domain.local&lt;/FONT&gt;,&lt;/STRONG&gt;&amp;nbsp;defined a group called "&lt;FONT color="#0000FF"&gt;developers&lt;/FONT&gt;" and added a user "didac gil"&lt;STRONG&gt;&amp;nbsp;with logon name "didacgil9".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the figure, we can notice that users authenticate with the suffix "&lt;FONT color="#0000FF"&gt;@sctc.domain.local&lt;/FONT&gt;". We will have to take account of this value for providing the correct settings&amp;nbsp;in Expedition to complete the user authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="View of Active Directors Users and Computers, highlighting @sctc.domain.local in a user account." style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21573i5D5773F5A01E3AB3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Active Directory Users and Computers.png" alt="View of Active Directors Users and Computers, highlighting @sctc.domain.local in a user account." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;View of Active Directors Users and Computers, highlighting @sctc.domain.local in a user account.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Defining LDAP Server in Expedition&lt;/H3&gt;
&lt;P&gt;In Expedition, we will first&amp;nbsp;define the LDAP authentication server. Only Superusers have rights for server registration or modification.&lt;/P&gt;
&lt;P&gt;We have two different approaches for user authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Approach 1. User needs to enter full&amp;nbsp;logon name&lt;/H3&gt;
&lt;P&gt;Define a server providing the desired server's name, the server's address and port, server type (Windows or Linux), Search DN parameters and SSL and/or TLS usage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In our case, we our server responds at sctc.domain.local port:389 and we have named LDAP_approach1.&lt;/P&gt;
&lt;P&gt;The users that will use this server for authentication belong to the developers group, therefore we have provided the following Search DN: "CN=developers,DC=sctc,DC=domain,DC=local". &lt;EM&gt;Contact your Active Directory administrator to verify your correct Search DN parameters.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="View of  Approach 1 to Add New LDAP Server using the address sctc.domain.local." style="width: 998px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21574i1EF7763A562A76A7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Add New LDAP Server.png" alt="View of  Approach 1 to Add New LDAP Server using the address sctc.domain.local." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;View of  Approach 1 to Add New LDAP Server using the address sctc.domain.local.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After saving, we will test the server settings clicking on the diagnostics icon. We will be required to enter an existing user's credentials.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="View of LDAP Test Connection" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21575i54BF56811E946F2A/image-size/large?v=v2&amp;amp;px=999" role="button" title="LDAP Test Connection .png" alt="View of LDAP Test Connection" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;View of LDAP Test Connection&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A feedback will be provided with the results of the connection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Through&amp;nbsp;this approach, users will have to provide their full account name for authentication. In our case, didacgil9@sctc.domain.local will be the user name account required to have a valid authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Approach 2. Server specifies the user suffix&lt;/H3&gt;
&lt;P&gt;In this case, we will facilitate the user's logon, providing the suffix already in the server settings. This way, a user will only have to write their account name "didacgil9".&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="View of  Approach 2 to Add New LDAP Server using the address sctc.domain.local." style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21576iDA8DBC13BFDAEF4C/image-size/large?v=v2&amp;amp;px=999" role="button" title="LDAP New Server Approach 2.png" alt="View of  Approach 2 to Add New LDAP Server using the address sctc.domain.local." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;View of  Approach 2 to Add New LDAP Server using the address sctc.domain.local.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Notice that using this approach, all users must share the same suffix in order to be able to validate their credentials.&lt;/P&gt;</description>
    <pubDate>Fri, 27 Sep 2019 18:13:05 GMT</pubDate>
    <dc:creator>dgildelaig</dc:creator>
    <dc:date>2019-09-27T18:13:05Z</dc:date>
    <item>
      <title>Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/ta-p/219609</link>
      <description>&lt;P&gt;Expedition offers local user authentication and external user authentication via LDAP and Radius servers.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In this example, we will illustrate how to configure external authentication via a Windows Active Directory server.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT size="4"&gt;&amp;nbsp;&lt;/FONT&gt;&lt;/H3&gt;
&lt;H3&gt;Settings in LDAP Server&lt;/H3&gt;
&lt;P&gt;We have created a server under the domain &lt;STRONG&gt;&lt;FONT color="#0000FF"&gt;sctc.domain.local&lt;/FONT&gt;,&lt;/STRONG&gt;&amp;nbsp;defined a group called "&lt;FONT color="#0000FF"&gt;developers&lt;/FONT&gt;" and added a user "didac gil"&lt;STRONG&gt;&amp;nbsp;with logon name "didacgil9".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In the figure, we can notice that users authenticate with the suffix "&lt;FONT color="#0000FF"&gt;@sctc.domain.local&lt;/FONT&gt;". We will have to take account of this value for providing the correct settings&amp;nbsp;in Expedition to complete the user authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="View of Active Directors Users and Computers, highlighting @sctc.domain.local in a user account." style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21573i5D5773F5A01E3AB3/image-size/large?v=v2&amp;amp;px=999" role="button" title="Active Directory Users and Computers.png" alt="View of Active Directors Users and Computers, highlighting @sctc.domain.local in a user account." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;View of Active Directors Users and Computers, highlighting @sctc.domain.local in a user account.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Defining LDAP Server in Expedition&lt;/H3&gt;
&lt;P&gt;In Expedition, we will first&amp;nbsp;define the LDAP authentication server. Only Superusers have rights for server registration or modification.&lt;/P&gt;
&lt;P&gt;We have two different approaches for user authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Approach 1. User needs to enter full&amp;nbsp;logon name&lt;/H3&gt;
&lt;P&gt;Define a server providing the desired server's name, the server's address and port, server type (Windows or Linux), Search DN parameters and SSL and/or TLS usage.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In our case, we our server responds at sctc.domain.local port:389 and we have named LDAP_approach1.&lt;/P&gt;
&lt;P&gt;The users that will use this server for authentication belong to the developers group, therefore we have provided the following Search DN: "CN=developers,DC=sctc,DC=domain,DC=local". &lt;EM&gt;Contact your Active Directory administrator to verify your correct Search DN parameters.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="View of  Approach 1 to Add New LDAP Server using the address sctc.domain.local." style="width: 998px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21574i1EF7763A562A76A7/image-size/large?v=v2&amp;amp;px=999" role="button" title="Add New LDAP Server.png" alt="View of  Approach 1 to Add New LDAP Server using the address sctc.domain.local." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;View of  Approach 1 to Add New LDAP Server using the address sctc.domain.local.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;After saving, we will test the server settings clicking on the diagnostics icon. We will be required to enter an existing user's credentials.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="View of LDAP Test Connection" style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21575i54BF56811E946F2A/image-size/large?v=v2&amp;amp;px=999" role="button" title="LDAP Test Connection .png" alt="View of LDAP Test Connection" /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;View of LDAP Test Connection&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;A feedback will be provided with the results of the connection.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Through&amp;nbsp;this approach, users will have to provide their full account name for authentication. In our case, didacgil9@sctc.domain.local will be the user name account required to have a valid authentication.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;Approach 2. Server specifies the user suffix&lt;/H3&gt;
&lt;P&gt;In this case, we will facilitate the user's logon, providing the suffix already in the server settings. This way, a user will only have to write their account name "didacgil9".&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="View of  Approach 2 to Add New LDAP Server using the address sctc.domain.local." style="width: 999px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/21576iDA8DBC13BFDAEF4C/image-size/large?v=v2&amp;amp;px=999" role="button" title="LDAP New Server Approach 2.png" alt="View of  Approach 2 to Add New LDAP Server using the address sctc.domain.local." /&gt;&lt;span class="lia-inline-image-caption" onclick="event.preventDefault();"&gt;View of  Approach 2 to Add New LDAP Server using the address sctc.domain.local.&lt;/span&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Notice that using this approach, all users must share the same suffix in order to be able to validate their credentials.&lt;/P&gt;</description>
      <pubDate>Fri, 27 Sep 2019 18:13:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/ta-p/219609</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2019-09-27T18:13:05Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/231244#M58</link>
      <description>&lt;P&gt;Am i supposed to look somewhere for the test connection feedback? Nothing ever comes up? Also, is there anywhere for a bind account and password?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Sep 2018 16:37:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/231244#M58</guid>
      <dc:creator>mssexton</dc:creator>
      <dc:date>2018-09-18T16:37:13Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/231514#M65</link>
      <description>&lt;P&gt;&lt;FONT color="#800000"&gt;&lt;STRONG&gt;WARNING!!&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Using the test button logs your username and password in the apache logs(it is put in the URL called to do the test)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I will be opening a case as well.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Sep 2018 19:33:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/231514#M65</guid>
      <dc:creator>psuJohn</dc:creator>
      <dc:date>2018-09-19T19:33:50Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/231625#M66</link>
      <description>&lt;P&gt;The LDAP connection is via simple bind connections. We use the user's credentials itself to verify that those credentials are valid.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The credentials are transferred via the request without ofuscation, but the connection is done via HTTPS. However, as pointed out by psuJohn, the request should be moved to a POST request so it is not even stored in the httpd logs.&lt;/P&gt;
&lt;P&gt;We will make this change.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When testing the connection, we will provide the user's account and password, and we should be able to get the feedback on the transaction, stating that either all went fine or that there was an error such as not being able to reach the LDAP server or that the provided settings (DN or user credentials) are not valid to authenticate the user.&lt;/P&gt;</description>
      <pubDate>Thu, 20 Sep 2018 14:35:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/231625#M66</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2018-09-20T14:35:04Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/243545#M113</link>
      <description>&lt;P&gt;In the latest version of the tool there is no LDAP type so you can't save the LDAP server.&amp;nbsp; I tried 2 different browsers to make sure it wasn't a browser issue.&lt;/P&gt;</description>
      <pubDate>Mon, 17 Dec 2018 19:15:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/243545#M113</guid>
      <dc:creator>gzygadlo</dc:creator>
      <dc:date>2018-12-17T19:15:01Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/243615#M114</link>
      <description>&lt;P&gt;we have the same problem as gzygadlo&lt;/P&gt;
&lt;P&gt;you cannot select the server type and when you try to add the server you get the message:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;"The following errors have ocurred:,&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Enter the server&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;type"&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Dec 2018 09:36:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/243615#M114</guid>
      <dc:creator>AlexSieber</dc:creator>
      <dc:date>2018-12-18T09:36:32Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/307760#M199</link>
      <description>&lt;P&gt;Anyone have success with using TLS/SSL?&amp;nbsp; With Microsofts recent announcement that they will only accept encrypted connections I need to get this switched over.&lt;/P&gt;</description>
      <pubDate>Thu, 23 Jan 2020 22:07:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/307760#M199</guid>
      <dc:creator>olanandkate</dc:creator>
      <dc:date>2020-01-23T22:07:19Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/309117#M201</link>
      <description>&lt;P&gt;I have not personally tested this for a long time, but I remember a team that got the TLS/SSL LDAP working. They tested first with a LDAP client to make sure the settings they were using were correct, as they also had issues to make sure all the settings were the correct ones.&lt;/P&gt;
&lt;P&gt;Later, they applied the as well in Expedition and they could authenticate.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 03 Feb 2020 08:45:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/309117#M201</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2020-02-03T08:45:39Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/318080#M211</link>
      <description>&lt;P&gt;I just installed&amp;nbsp;1.1.63.1, and when I try either Radius or LDAP I get an instant error and no network traffic is generated to either server from Expedition:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;My Apache2 error.log for a test request:&lt;BR /&gt;&lt;BR /&gt;[Mon Mar 23 20:49:45.977222 2020] [:error] [pid 36392] [client 10.0.10.2:2282] PHP Notice: Undefined variable: app in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;BR /&gt;[Mon Mar 23 20:49:45.977364 2020] [:error] [pid 36392] [client 10.0.10.2:2282] PHP Notice: Trying to get property of non-object in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;BR /&gt;[Mon Mar 23 20:49:45.977416 2020] [:error] [pid 36392] [client 10.0.10.2:2282] PHP Notice: Trying to get property of non-object in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;BR /&gt;[Mon Mar 23 20:49:45.977484 2020] [:error] [pid 36392] [client 10.0.10.2:2282] PHP Fatal error: Uncaught Error: Call to a member function getUser() on null in /var/www/html/bin/Authentication.php:76\nStack trace:\n#0 /var/www/html/bin/authentication/servers/testServers.php(54): require_once()\n#1 /var/www/html/bin/authentication/servers/testServers.php(35): test(Array)\n#2 {main}\n thrown in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 20:54:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/318080#M211</guid>
      <dc:creator>nellson</dc:creator>
      <dc:date>2020-03-23T20:54:52Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/318165#M212</link>
      <description>&lt;P&gt;In order to improve the forum experience, let's try to keep the questions focused in a single topic.&lt;/P&gt;
&lt;P&gt;(&lt;A href="https://live.paloaltonetworks.com/t5/Expedition-Discussions/Expedition-Radius-Authentication/m-p/318070#M2455" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Expedition-Discussions/Expedition-Radius-Authentication/m-p/318070#M2455&lt;/A&gt;)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please, try to refresh your session in Expedition and let us know if that resolved the issue.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 09:17:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/318165#M212</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2020-03-24T09:17:17Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/318248#M213</link>
      <description>&lt;P&gt;I rebooted my workstation last night for other reasons, so this was after my first connect to my Expedition server, I had a tail running on the logs: The first was a Radius test, the second an LDAP test. (I saw no traffic generated to either LDAP/RADIUS server)&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;P&gt;I am logged in as Admin, if that matters, there are no local users yet.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;[Tue Mar 24 15:08:40.241160 2020] [:error] [pid 36885] [client 10.0.10.2:1336] PHP Notice: Undefined variable: app in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;BR /&gt;[Tue Mar 24 15:08:40.241301 2020] [:error] [pid 36885] [client 10.0.10.2:1336] PHP Notice: Trying to get property of non-object in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;BR /&gt;[Tue Mar 24 15:08:40.241352 2020] [:error] [pid 36885] [client 10.0.10.2:1336] PHP Notice: Trying to get property of non-object in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;BR /&gt;[Tue Mar 24 15:08:40.241416 2020] [:error] [pid 36885] [client 10.0.10.2:1336] PHP Fatal error: Uncaught Error: Call to a member function getUser() on null in /var/www/html/bin/Authentication.php:76\nStack trace:\n#0 /var/www/html/bin/authentication/servers/testServers.php(54): require_once()\n#1 /var/www/html/bin/authentication/servers/testServers.php(35): test(Array)\n#2 {main}\n thrown in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;[Tue Mar 24 15:08:58.418969 2020] [:error] [pid 36388] [client 10.0.10.2:1338] PHP Notice: Undefined variable: app in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;BR /&gt;[Tue Mar 24 15:08:58.419119 2020] [:error] [pid 36388] [client 10.0.10.2:1338] PHP Notice: Trying to get property of non-object in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;BR /&gt;[Tue Mar 24 15:08:58.419176 2020] [:error] [pid 36388] [client 10.0.10.2:1338] PHP Notice: Trying to get property of non-object in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;BR /&gt;[Tue Mar 24 15:08:58.419246 2020] [:error] [pid 36388] [client 10.0.10.2:1338] PHP Fatal error: Uncaught Error: Call to a member function getUser() on null in /var/www/html/bin/Authentication.php:76\nStack trace:\n#0 /var/www/html/bin/authentication/servers/testServers.php(54): require_once()\n#1 /var/www/html/bin/authentication/servers/testServers.php(35): test(Array)\n#2 {main}\n thrown in /var/www/html/bin/Authentication.php on line 76, referer: &lt;A href="https://expedition.columbia.csc/" target="_blank"&gt;https://expedition.columbia.csc/&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 15:11:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/318248#M213</guid>
      <dc:creator>nellson</dc:creator>
      <dc:date>2020-03-24T15:11:34Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/318249#M214</link>
      <description>&lt;P&gt;Could we do a Zoom session?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please contact me to &lt;A href="mailto:fwmigrate@paloaltonetworks.com" target="_blank"&gt;fwmigrate@paloaltonetworks.com&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would like to debug in your settings to find out the cause.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 15:15:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/318249#M214</guid>
      <dc:creator>dgildelaig</dc:creator>
      <dc:date>2020-03-24T15:15:58Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/318599#M220</link>
      <description>&lt;P&gt;Sent you an e-mail, I am free most all morning tomorrow &lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 25 Mar 2020 21:55:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/318599#M220</guid>
      <dc:creator>nellson</dc:creator>
      <dc:date>2020-03-25T21:55:21Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication via LDAP server</title>
      <link>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/438032#M291</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for sharing your How To, but I need to secure my connection of my Expedition Tool and our LDAP servers.&amp;nbsp;&lt;BR /&gt;The security ask to use LDAP with SSL, but I have an error.&amp;nbsp;&lt;BR /&gt;Someone Have the same issue or just me ?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;</description>
      <pubDate>Fri, 01 Oct 2021 08:57:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/expedition-articles/authentication-via-ldap-server/tac-p/438032#M291</guid>
      <dc:creator>Frederic_G</dc:creator>
      <dc:date>2021-10-01T08:57:04Z</dc:date>
    </item>
  </channel>
</rss>

