<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Global Protect VPN Client not authenticating to 2012 R2 Domain Controller in GlobalProtect Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/525295#M3544</link>
    <description>&lt;P&gt;We recently installed a new Domain Controller and can't get the Global Protect VPN client LDAP authentication to work. We have tried everything we can think of and would like to know if anyone else has had this issue and could assist with a solution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DC01 - Primary DC which firewall and VPN currently authenticates to.&lt;/P&gt;
&lt;P&gt;DC02 - Secondary DC which will work as standalone authentication server in testing.&lt;/P&gt;
&lt;P&gt;DC03 - New DC which is not allowing authentication from Global Protect VPN client. After entering username and password the client just goes back to the password prompt like nothing happened.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any assistance would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Wed, 28 Dec 2022 01:13:46 GMT</pubDate>
    <dc:creator>AZCommerceAuthority</dc:creator>
    <dc:date>2022-12-28T01:13:46Z</dc:date>
    <item>
      <title>Global Protect VPN Client not authenticating to 2012 R2 Domain Controller</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/525295#M3544</link>
      <description>&lt;P&gt;We recently installed a new Domain Controller and can't get the Global Protect VPN client LDAP authentication to work. We have tried everything we can think of and would like to know if anyone else has had this issue and could assist with a solution.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;DC01 - Primary DC which firewall and VPN currently authenticates to.&lt;/P&gt;
&lt;P&gt;DC02 - Secondary DC which will work as standalone authentication server in testing.&lt;/P&gt;
&lt;P&gt;DC03 - New DC which is not allowing authentication from Global Protect VPN client. After entering username and password the client just goes back to the password prompt like nothing happened.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any assistance would be greatly appreciated.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2022 01:13:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/525295#M3544</guid>
      <dc:creator>AZCommerceAuthority</dc:creator>
      <dc:date>2022-12-28T01:13:46Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN Client not authenticating to 2012 R2 Domain Controller</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/525390#M3545</link>
      <description>&lt;P&gt;I would check the system log with filter (&lt;SPAN&gt;type&amp;nbsp;&lt;/SPAN&gt;eq auth), and also the authd log from the CLI (less mp-log authd.log) as a starting point.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2022 18:48:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/525390#M3545</guid>
      <dc:creator>dmifsud</dc:creator>
      <dc:date>2022-12-28T18:48:21Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN Client not authenticating to 2012 R2 Domain Controller</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/525392#M3546</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/264569"&gt;@AZCommerceAuthority&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CLI "test" command is great to troubleshoot authentication profiles.&amp;nbsp; &lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/authentication/test-authentication-server-connectivity" target="_blank"&gt;https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/authentication/test-authentication-server-connectivity&lt;/A&gt;&amp;nbsp; It normally gives the specific reason the authentication fails (bad password, cannot connect to server, etc.).&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;</description>
      <pubDate>Wed, 28 Dec 2022 19:53:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/525392#M3546</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2022-12-28T19:53:33Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN Client not authenticating to 2012 R2 Domain Controller</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/526845#M3580</link>
      <description>&lt;P&gt;So I had some time to finally test this again and do some log file tracing.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is a taste of what I am seeing now when trying to authenticate to the new DC.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;2023-01-12 13:05:39.470 -0700 debug: _retrieve_svr_ids(pan_auth_service.c:648): find auth server id vector for AD-vsys1&lt;BR /&gt;2023-01-12 13:05:39.470 -0700 debug: _start_sync_auth(pan_auth_service_handle.c:606): recreate 0th LDAP session to remote server 10.0.2.17:636 after retry-interval (60 sec) has elapsed&lt;BR /&gt;2023-01-12 13:05:39.470 -0700 debug: _recreate_a_ldap_session(pan_auth_service_handle.c:418): re-create ldap session (ip ; sourceAddr ; sourceAddr6 ; vsys shared)&lt;BR /&gt;2023-01-12 13:05:39.470 -0700 debug: pan_authd_ldap_init_set(pan_authd_shared_ldap.c:917): useLDAPs: 1, startTLS: 0, b_ssl: 1&lt;BR /&gt;2023-01-12 13:05:39.470 -0700 ldap uri: ldaps://10.0.2.17:636&lt;BR /&gt;2023-01-12 13:05:39.470 -0700 Succeed to init LDAPp=0xff60001330 for entry 0&lt;BR /&gt;2023-01-12 13:05:39.470 -0700 b_ssl: Yes&lt;BR /&gt;2023-01-12 13:05:39.470 -0700 debug: pan_authd_ldap_bind(pan_authd_shared_ldap.c:634): binding with binddn CN=svc_paloalto,OU=Service Accounts,DC=ourdcname,DC=com&lt;BR /&gt;2023-01-12 13:05:39.473 -0700 Error: pan_authd_ldap_bind(pan_authd_shared_ldap.c:643): Failed to bind ldap (Can't contact LDAP server)&lt;BR /&gt;2023-01-12 13:05:39.473 -0700 Error: pan_auth_create_a_ldap_session(pan_auth_svr_cctxt.c:2002): Failed to bind, get out&lt;BR /&gt;2023-01-12 13:05:39.474 -0700 Error: _recreate_a_ldap_session(pan_auth_service_handle.c:538): failed to re-create 0th LDAP session for server: 10.0.2.17:636&lt;BR /&gt;2023-01-12 13:05:39.474 -0700 LDAP auth server 10.0.2.17 is down !!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the new DC I have disabled the OS Firewall and tried to connect and it still fails so I know there is not some FW rule allowing port 636 to pass through.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Any ideas on what my issue is? I have tested LDAP on the new server using the service account user and it works perfectly.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 21:09:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/526845#M3580</guid>
      <dc:creator>AZCommerceAuthority</dc:creator>
      <dc:date>2023-01-12T21:09:39Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN Client not authenticating to 2012 R2 Domain Controller</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/526851#M3581</link>
      <description>&lt;P&gt;Where are you connecting to the DC from? I.e. is the LDAP service running from the management port (default) or have you configured it on the dataplane? (Device-&amp;gt;Setup-&amp;gt;Services-&amp;gt;Service Route Configuration). I am assuming that 10.0.2.17 is NOT an IP on the PA itself that is being NAT'd to another network, correct?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It looks like the PA can't even reach the DC server. If using LDAP from the management port (the default), does the management network have a route to 10.0.2.x? Does the DC have a firewall restricting access to certain source IPs? Can you ping all of the DCs from the management interface&amp;nbsp; (PA&amp;gt; ping source [mgmt_ip] host 10.0.2.17)?&lt;/P&gt;</description>
      <pubDate>Thu, 12 Jan 2023 22:21:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/526851#M3581</guid>
      <dc:creator>Adrian_Jensen</dc:creator>
      <dc:date>2023-01-12T22:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN Client not authenticating to 2012 R2 Domain Controller</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/526984#M3582</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Where are you connecting to the DC from? &lt;STRONG&gt;Management Port &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I.e. is the LDAP service running from the management port (default) or have you configured it on the dataplane? (Device-&amp;gt;Setup-&amp;gt;Services-&amp;gt;Service Route Configuration). &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AZCommerceAuthority_3-1673626964826.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46997i19DB45208918E723/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AZCommerceAuthority_3-1673626964826.png" alt="AZCommerceAuthority_3-1673626964826.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I am assuming that 10.0.2.17 is NOT an IP on the PA itself that is being NAT'd to another network, correct? &lt;STRONG&gt;YES&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;I&lt;/STRONG&gt;t looks like the PA can't even reach the DC server. If using LDAP from the management port (the default), does the management network have a route to 10.0.2.x? &lt;STRONG&gt;YES&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AZCommerceAuthority_5-1673627096798.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46999i960FFDBDE9FA7E49/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AZCommerceAuthority_5-1673627096798.png" alt="AZCommerceAuthority_5-1673627096798.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AZCommerceAuthority_4-1673627053709.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46998iC58AEB6A7F04206F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AZCommerceAuthority_4-1673627053709.png" alt="AZCommerceAuthority_4-1673627053709.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AZCommerceAuthority_1-1673626567618.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46995i92E93F25CDF8B760/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AZCommerceAuthority_1-1673626567618.png" alt="AZCommerceAuthority_1-1673626567618.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Does the DC have a firewall restricting access to certain source IPs? &lt;STRONG&gt;NO -&amp;nbsp;&lt;/STRONG&gt;We tested LDAP login from the FW to the DC after turning off the DC FW.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also I can ping both ways with no issue. Here is ping from server:&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AZCommerceAuthority_2-1673626918021.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/46996i3CAE032941DC6D5E/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AZCommerceAuthority_2-1673626918021.png" alt="AZCommerceAuthority_2-1673626918021.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here are some commands I ran for troubleshooting and the results of each command:&lt;/P&gt;
&lt;P&gt;admin@ACA-PHX-FW01&amp;gt; show log system direction equal backward eventid equal "auth-server-down"&lt;BR /&gt;Time Severity Subtype Object EventID ID Description&lt;BR /&gt;===============================================================================&lt;BR /&gt;2023/01/12 14:19:06 critical auth auth-se 0 LDAP auth server &lt;STRONG&gt;10.0.2.17&lt;/STRONG&gt; is down !!!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;admin@ACA-PHX-FW01&amp;gt; debug authentication connection-show protocol-type LDAP&lt;/P&gt;
&lt;P&gt;conn_id: 65576 ; server addr: &lt;STRONG&gt;10.0.2.10:636&lt;/STRONG&gt; ; method: LDAP (active directory) ; auth prof name: AD ; own addr: ; vsys: shared ; retry interval: 60 secs ; debug: off ; debug prefix: ;&lt;BR /&gt;be up: yes ;&lt;BR /&gt;be in retry interval (conn 0): no last connection attempt time: Fri Jan 13 06:07:41 2023&lt;BR /&gt;be in retry interval (conn 1): no&lt;BR /&gt;be in retry interval (conn 2): no&lt;BR /&gt;be in retry interval (conn 3): no&lt;BR /&gt;# of received requests: 532&lt;BR /&gt;# of sent out requests: 532&lt;BR /&gt;# of received responses: 532&lt;BR /&gt;# of timed out requests: 0&lt;BR /&gt;# of stale responses: 0&lt;BR /&gt;last request sent time: Fri Jan 13 09:07:42 2023&lt;BR /&gt;last response receive time: Fri Jan 13 09:07:42 2023&lt;BR /&gt;conn_id: 65577 ; server addr: &lt;STRONG&gt;10.0.2.11:636&lt;/STRONG&gt; ; method: LDAP (active directory) ; auth prof name: AD ; own addr: ; vsys: shared ; retry interval: 60 secs ; debug: off ; debug prefix: ;&lt;BR /&gt;be up: yes ;&lt;BR /&gt;be in retry interval (conn 0): no&lt;BR /&gt;be in retry interval (conn 1): no&lt;BR /&gt;be in retry interval (conn 2): no&lt;BR /&gt;be in retry interval (conn 3): no&lt;BR /&gt;# of received requests: 0&lt;BR /&gt;# of sent out requests: 0&lt;BR /&gt;# of received responses: 0&lt;BR /&gt;# of timed out requests: 0&lt;BR /&gt;# of stale responses: 0&lt;BR /&gt;conn_id: 65578 ; server addr: &lt;STRONG&gt;10.0.2.17:636&lt;/STRONG&gt; ; method: LDAP (active directory) ; auth prof name: AD ; own addr: ; vsys: shared ; retry interval: 60 secs ; debug: off ; debug prefix: ;&lt;BR /&gt;be up: yes ;&lt;BR /&gt;be in retry interval (conn 0): no&lt;BR /&gt;be in retry interval (conn 1): no&lt;BR /&gt;be in retry interval (conn 2): no&lt;BR /&gt;be in retry interval (conn 3): no&lt;BR /&gt;# of received requests: 0&lt;BR /&gt;# of sent out requests: 0&lt;BR /&gt;# of received responses: 0&lt;BR /&gt;# of timed out requests: 0&lt;BR /&gt;# of stale responses: 0&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I want to remove the 2 working DC's and only have 10.0.2.17 as LDAP server then run&amp;nbsp;&lt;STRONG&gt;debug authentication connection-show protocol-type LDAP&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;I definitely feel like this is a permissions issue on the server somewhere. Interestingly enough the server monitoring is only working on DC01. I went through the WMI setup from the documentation and it still is not working on DC02 and DCA:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="AZCommerceAuthority_6-1673628034807.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/47000i8803CC517F62ACA1/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="AZCommerceAuthority_6-1673628034807.png" alt="AZCommerceAuthority_6-1673628034807.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;I did see an article that talks about using WinRM versus WMI which I plan to test later and see if I can get the new server to connect:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wkkfCAA" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000wkkfCAA&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 16:43:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/526984#M3582</guid>
      <dc:creator>AZCommerceAuthority</dc:creator>
      <dc:date>2023-01-13T16:43:33Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN Client not authenticating to 2012 R2 Domain Controller</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/527006#M3583</link>
      <description>&lt;P&gt;We disabled ssl and used port 389 and can connect to DCA without issue so there this was a certificate issue the whole time. Go ahead and close this thread out and thank you for all your kind and informative replies. We do appreciate everyone trying to help us out.&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 20:47:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/527006#M3583</guid>
      <dc:creator>AZCommerceAuthority</dc:creator>
      <dc:date>2023-01-13T20:47:45Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect VPN Client not authenticating to 2012 R2 Domain Controller</title>
      <link>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/527020#M3584</link>
      <description>&lt;P&gt;We got our FW to work with Global Protect on DCA (new domain controller) without using SSL by just using port 389 however it will not connect on port 636 using SSL now. Any idea what may be missing?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;When we add our new DC and set it as LDAP server using port 636 then check the ssl box, not only will it not authenticate, but in server manager we get the following error: I have checked the certificate store on the working domain controller and not able to find any of the certs that we have on the FW so not sure exactly what I am missing here other than we just inherited this setup and are trying to figure out how to update our domain controllers.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;The SSL server credential's certificate does not have a private key&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;information property attached to it. This most often occurs when a&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;certificate is backed up incorrectly and then later restored.&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;This message can also indicate a certificate enrollment failure.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Jan 2023 22:48:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/globalprotect-discussions/global-protect-vpn-client-not-authenticating-to-2012-r2-domain/m-p/527020#M3584</guid>
      <dc:creator>AZCommerceAuthority</dc:creator>
      <dc:date>2023-01-13T22:48:27Z</dc:date>
    </item>
  </channel>
</rss>

