<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP Authentication Profile for non-local users in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/564677#M2063</link>
    <description>&lt;P&gt;To reiterate, I do not have a problem setting up the configs for the PA device to use LDAP for Authentication.&amp;nbsp;&lt;BR /&gt;However, I found out that there must be local users setup beforehand, before I can use LDAP for Authentication.&lt;BR /&gt;My intention is to use LDAP for non-local users (which are users defined in LDAP only - not on PA device)&lt;/P&gt;</description>
    <pubDate>Tue, 07 Nov 2023 23:51:53 GMT</pubDate>
    <dc:creator>junghwan</dc:creator>
    <dc:date>2023-11-07T23:51:53Z</dc:date>
    <item>
      <title>LDAP Authentication Profile for non-local users</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/563186#M2006</link>
      <description>&lt;P&gt;Hi Team,&lt;BR /&gt;&lt;BR /&gt;I am trying to use LDAP as an Authentication Profile for non-local users.&lt;BR /&gt;I am aware of guide on "Device &amp;gt; Authentication Settings &amp;gt; Authentication Profile" that states "&lt;SPAN&gt;Only RADIUS, TACACS+ and SAML methods are supported".&lt;BR /&gt;&lt;BR /&gt;Nevertheless, I have set the LDAP server as an authentication profile, and confirmed that authentication and authorization works, even for non-local users. Below is the log that authentication has worked as intended.&lt;BR /&gt;&lt;/SPAN&gt;&lt;EM&gt;&lt;FONT size="2"&gt;pan_authd_ldap_authenticate(pan_authd_shared_ldap.c:1248): User "ldap_test" is ACCEPTED&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; pan_auth_response_process(pan_auth_state_engine.c:4381): auth status: auth success&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt; pan_auth_response_process(pan_auth_state_engine.c:4402): Authentication success: &amp;lt;profile: "LDAP", vsys: "shared", username&amp;nbsp;&lt;/FONT&gt;&lt;FONT size="2"&gt;"ldap_test"&amp;gt;&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;...&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;&lt;FONT size="2"&gt;Sent PAN_AUTH_SUCCESS auth response for user 'ldap_test' (exp_in_days=-1 (-1 never; 0 within a day))&lt;/FONT&gt;&lt;/EM&gt;&lt;BR /&gt;&lt;SPAN&gt;&lt;BR /&gt;However, because user path is non-existent, Connection is closed.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT size="2"&gt;Error: pan_set_admin_user_stat(pan_auth_admin_login_stat.c:274): Admin user "ldap_test" home dir "/opt/pancfg/home/ldap_test" has NOT created yet&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;&lt;FONT size="2"&gt; Error: pan_auth_send_auth_resp(pan_auth_server.c:699): pan_set_admin_user_stat("ldap_test", True)&lt;/FONT&gt;&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Would there be a way to resolve this issue? Or, a way use LDAP as an Authentication Profile for non-local users?&lt;/P&gt;</description>
      <pubDate>Fri, 27 Oct 2023 07:43:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/563186#M2006</guid>
      <dc:creator>junghwan</dc:creator>
      <dc:date>2023-10-27T07:43:57Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication Profile for non-local users</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/564136#M2044</link>
      <description>&lt;P&gt;What is the LDAP server you are using here and if you don't mind can you please share the screenshots of the configs you have done?&lt;/P&gt;</description>
      <pubDate>Thu, 02 Nov 2023 17:10:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/564136#M2044</guid>
      <dc:creator>shehriyarahmed</dc:creator>
      <dc:date>2023-11-02T17:10:52Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication Profile for non-local users</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/564677#M2063</link>
      <description>&lt;P&gt;To reiterate, I do not have a problem setting up the configs for the PA device to use LDAP for Authentication.&amp;nbsp;&lt;BR /&gt;However, I found out that there must be local users setup beforehand, before I can use LDAP for Authentication.&lt;BR /&gt;My intention is to use LDAP for non-local users (which are users defined in LDAP only - not on PA device)&lt;/P&gt;</description>
      <pubDate>Tue, 07 Nov 2023 23:51:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/564677#M2063</guid>
      <dc:creator>junghwan</dc:creator>
      <dc:date>2023-11-07T23:51:53Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication Profile for non-local users</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/564849#M2067</link>
      <description>&lt;P&gt;You need not define the users locally on the PA firewall, you define on the LDAP server. Below are the sample steps,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;The first step in this process is to define an LDAP Server Profile that contains specific information that the firewall can use when sending queries for authentication.&lt;/P&gt;
&lt;P&gt;Select Device &amp;gt; Server Profiles &amp;gt; LDAP. At the bottom of the window, click Add.&lt;/P&gt;
&lt;P&gt;For Profile Name, enter LDAP-Server-Profile.&lt;/P&gt;
&lt;P&gt;Under the Server List section, click Add.&lt;/P&gt;
&lt;P&gt;In the Name field, enter ldap.panw.lab.&lt;/P&gt;
&lt;P&gt;In the LDAP Server field, enter 192.168.50.89.&lt;/P&gt;
&lt;P&gt;Leave the Port field set to 389.&lt;/P&gt;
&lt;P&gt;Under the Server Settings section, set the Type to other.&lt;/P&gt;
&lt;P&gt;Enter dc=panw,dc=lab for Base DN.&lt;/P&gt;
&lt;P&gt;Enter cn=admin,dc=panw,dc=lab for Bind DN.&lt;/P&gt;
&lt;P&gt;Enter xxxx for Password and Confirm Password.&lt;/P&gt;
&lt;P&gt;Uncheck the option for Require SSL/TLS secured connection.&lt;/P&gt;
&lt;P&gt;Leave the remaining settings unchanged.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="shehriyarahmed_0-1699465537492.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55031i7F958E36CE915D15/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="shehriyarahmed_0-1699465537492.png" alt="shehriyarahmed_0-1699465537492.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Click OK to create the LDAP Server Profile.&lt;BR /&gt;With your LDAP Server Profile in place, you will now create an Authentication Profile and reference the LDAP Server Profile you just created.&lt;/P&gt;
&lt;P&gt;Select Device &amp;gt; Authentication Profile.&lt;/P&gt;
&lt;P&gt;Click the Add button at the bottom of the window.&lt;/P&gt;
&lt;P&gt;For Name, enter LDAP-Auth-Profile.&lt;/P&gt;
&lt;P&gt;Under the Authentication tab, use the Type drop-down list to select LDAP.&lt;/P&gt;
&lt;P&gt;Under Server Profile, use the drop-down list to select LDAP-Server-Profile.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="shehriyarahmed_1-1699465621795.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55032i568760C6F8D0F31F/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="shehriyarahmed_1-1699465621795.png" alt="shehriyarahmed_1-1699465621795.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Select the Advanced tab.&lt;/P&gt;
&lt;P&gt;Under the Allow List section, click Add.&lt;/P&gt;
&lt;P&gt;Select all.&lt;/P&gt;
&lt;P&gt;Leave the remaining settings unchanged.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="shehriyarahmed_2-1699465662688.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55033iE986A70F88387C42/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="shehriyarahmed_2-1699465662688.png" alt="shehriyarahmed_2-1699465662688.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Click OK.&lt;/P&gt;
&lt;P&gt;Create a new administrator by selecting Device &amp;gt; Administrators.&lt;/P&gt;
&lt;P&gt;Click Add.&lt;/P&gt;
&lt;P&gt;For Name, enter adminSally.&lt;/P&gt;
&lt;P&gt;For Authentication Profile, use the drop-down list to select LDAP-Auth-Profile.&lt;/P&gt;
&lt;P&gt;Leave the remaining settings unchanged.&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="shehriyarahmed_3-1699465710232.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/55034i4B5FDB6CC7348708/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="shehriyarahmed_3-1699465710232.png" alt="shehriyarahmed_3-1699465710232.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Click OK.&lt;/P&gt;
&lt;P&gt;Commit the Configuration.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Nov 2023 17:49:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/564849#M2067</guid>
      <dc:creator>shehriyarahmed</dc:creator>
      <dc:date>2023-11-08T17:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication Profile for non-local users</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/565017#M2073</link>
      <description>&lt;P&gt;Hi&amp;nbsp;Shehriyar Ahmed,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for the detailed guide. In the scenario above, I would have to manually set "adminSally" as administrator on the Paloalto GUI (even though the user is defined in the LDAP Directory).&amp;nbsp;&lt;BR /&gt;The fault is mine if I weren't being clear previously, but I was looking for a solution without the task of adding "adminSally".&lt;BR /&gt;&lt;BR /&gt;Your example : LDAP (create user "adminSally") -&amp;gt; PA (create admin with LDAP Authentication Profile"adminSally") - PA Login with "adminSally"&lt;BR /&gt;The solution I am looking for :&amp;nbsp;LDAP (create user "adminSally") -&amp;gt; PA Login with "adminSally"&lt;/P&gt;
&lt;P&gt;Key difference being, not needing to add "adminSally" as an administrator. The reason I want to do this is because the administrators and operators (users) would be dynamically changed within LDAP. If there is change in user database in LDAP - the change should also apply to PA's user database.&lt;BR /&gt;&lt;BR /&gt;For instance, a new user "adminTony" is added to a "network-admin" group in LDAP. After configuration of different network devices with LDAP "adminTony" would have access to Firewall, Switch, LB devices via LDAP. I have confirmed that if a new user is added, devices such as LB, Switch allow the user to access the devices, because user "adminTony" has been added to the "network-admin" group. This is on the premise that configuration has been made so that users in "network-admin" are allowed access.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Nov 2023 15:48:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/ldap-authentication-profile-for-non-local-users/m-p/565017#M2073</guid>
      <dc:creator>junghwan</dc:creator>
      <dc:date>2023-11-09T15:48:12Z</dc:date>
    </item>
  </channel>
</rss>

