<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Palo Alto Kerberos for sso in Next-Generation Firewall Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-kerberos-for-sso/m-p/1236114#M6208</link>
    <description>&lt;P&gt;anyone have the steps for kerberos with captival portal?&lt;/P&gt;&lt;P&gt;The issues i'm facing is when i enter a external website and it will prompt me with the login prompt. If i login and is working fine but end goal is to do SSO via kerberos for captival portal.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the client, i should have seen this but it doesn't appear.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bbashash81_0-1755414425506.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68906i16C352176945E961/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bbashash81_0-1755414425506.png" alt="bbashash81_0-1755414425506.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;from the firewall without login to the prompt, i always see these error.&amp;nbsp; I have regenerate the keytab for more than 10 times. and i have check the version of kerberos from the AD server and the keytab via the below command. both are the same version.&lt;BR /&gt;&lt;BR /&gt;Ktpass /in &amp;lt;filename.keytab&amp;gt;&lt;BR /&gt;− dsquery * -filter sAMAccountName=&amp;lt;accountname&amp;gt; -attr msDS-KeyVersionNumber&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2025-08-17 14:58:59.172 +0800 debug: pan_auth_cache_get_authprof_info(pan_auth_cache_authprof_n_authseqprof.c:218): prof "KRB-SSO", vsys "vsys1" (method: Kerberos pre-auth) has sso hash table id: 1 (0 means no or invalid keytab)&lt;BR /&gt;2025-08-17 14:58:59.193 +0800 debug: pan_auth_request_process(pan_auth_state_engine.c:3618): Receive request: msg type PAN_AUTH_REQ_GET_AUTHD_ID, conv id 168, body length 2448&lt;BR /&gt;2025-08-17 14:58:59.193 +0800 debug: _log_auth_respone(pan_auth_server.c:625): Sent PAN_AUTH_GET_AUTHD_ID_SUCCESS auth response for user '' (exp_in_days=-1 (-1 never; 0 within a day))(authd_id: 7539262304362168525)&lt;/P&gt;</description>
    <pubDate>Sun, 17 Aug 2025 07:11:12 GMT</pubDate>
    <dc:creator>bbashash81</dc:creator>
    <dc:date>2025-08-17T07:11:12Z</dc:date>
    <item>
      <title>Palo Alto Kerberos for sso</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-kerberos-for-sso/m-p/1236108#M6206</link>
      <description>&lt;P class=""&gt;&lt;SPAN&gt;Anyone hit the same issue before?&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&amp;nbsp;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;2025-08-16 20:35:38.768 +0800 debug: pan_auth_cache_get_authprof_info(pan_auth_cache_authprof_n_authseqprof.c:218): prof "KRB-SSO", vsys "vsys1" (method: Kerberos pre-auth) has sso hash table id: 1 (0 means no or invalid keytab)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 16 Aug 2025 12:52:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-kerberos-for-sso/m-p/1236108#M6206</guid>
      <dc:creator>bbashash81</dc:creator>
      <dc:date>2025-08-16T12:52:57Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Kerberos for sso</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-kerberos-for-sso/m-p/1236114#M6208</link>
      <description>&lt;P&gt;anyone have the steps for kerberos with captival portal?&lt;/P&gt;&lt;P&gt;The issues i'm facing is when i enter a external website and it will prompt me with the login prompt. If i login and is working fine but end goal is to do SSO via kerberos for captival portal.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;From the client, i should have seen this but it doesn't appear.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="bbashash81_0-1755414425506.png" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/68906i16C352176945E961/image-size/medium?v=v2&amp;amp;px=400" role="button" title="bbashash81_0-1755414425506.png" alt="bbashash81_0-1755414425506.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;from the firewall without login to the prompt, i always see these error.&amp;nbsp; I have regenerate the keytab for more than 10 times. and i have check the version of kerberos from the AD server and the keytab via the below command. both are the same version.&lt;BR /&gt;&lt;BR /&gt;Ktpass /in &amp;lt;filename.keytab&amp;gt;&lt;BR /&gt;− dsquery * -filter sAMAccountName=&amp;lt;accountname&amp;gt; -attr msDS-KeyVersionNumber&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2025-08-17 14:58:59.172 +0800 debug: pan_auth_cache_get_authprof_info(pan_auth_cache_authprof_n_authseqprof.c:218): prof "KRB-SSO", vsys "vsys1" (method: Kerberos pre-auth) has sso hash table id: 1 (0 means no or invalid keytab)&lt;BR /&gt;2025-08-17 14:58:59.193 +0800 debug: pan_auth_request_process(pan_auth_state_engine.c:3618): Receive request: msg type PAN_AUTH_REQ_GET_AUTHD_ID, conv id 168, body length 2448&lt;BR /&gt;2025-08-17 14:58:59.193 +0800 debug: _log_auth_respone(pan_auth_server.c:625): Sent PAN_AUTH_GET_AUTHD_ID_SUCCESS auth response for user '' (exp_in_days=-1 (-1 never; 0 within a day))(authd_id: 7539262304362168525)&lt;/P&gt;</description>
      <pubDate>Sun, 17 Aug 2025 07:11:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-kerberos-for-sso/m-p/1236114#M6208</guid>
      <dc:creator>bbashash81</dc:creator>
      <dc:date>2025-08-17T07:11:12Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Kerberos for sso</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-kerberos-for-sso/m-p/1236143#M6211</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1457187123"&gt;@bbashash81&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for post!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To me this log message does not indicate an issue / authentication failure. Could you please elaborate where and for what purpose you are setting up Kerberos authentication?&lt;/P&gt;
&lt;P&gt;If the authentication is failing there should be more detailed log after the log message you shared. Just in case, here is&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-admin/authentication/configure-kerberos-single-sign-on" target="_self"&gt;Configure Kerberos Single Sign-On&lt;/A&gt;&amp;nbsp;configuration guide.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Mon, 18 Aug 2025 06:10:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-kerberos-for-sso/m-p/1236143#M6211</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2025-08-18T06:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Palo Alto Kerberos for sso</title>
      <link>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-kerberos-for-sso/m-p/1236187#M6217</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1457187123"&gt;@bbashash81&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thank you for reply.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;From your post it looks like that your Keytab has been generated correctly, however just in case here is a manual:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boBiCAI" target="_self"&gt;How To Generate Kerberos Keytab for SSO&lt;/A&gt;. Make sure that FQDN for captive portal is resolvable and pointing to Firewall's interface where Captive Portal is enabled.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Here is the tutorial for Captive Portal setup:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CqbiCAC" target="_self"&gt;How to Configure Captive Portal&lt;/A&gt;. In Step No.6 import Kerberos Keytab. Also make sure that certificate's SAN field is FQDN of Captive Portal.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Make sure that in authentication policy you configured browser challenge to trigger SSO (Step No.3):&amp;nbsp;&lt;A href="https://docs.paloaltonetworks.com/pan-os/10-1/pan-os-admin/authentication/configure-kerberos-single-sign-on" target="_self"&gt;Configure Kerberos Single Sign-On&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Make sure that you set redirect mode and redirect host matches certificate's SAN name:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000HERWCA4" target="_self"&gt;What are the client trust settings required to change the redirect URL for captive portal with Kerberos SSO?&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Finally, you will have to enable decryption:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClevCAC" target="_self"&gt;Captive Portal Not Working with HTTPS Sessions&lt;/A&gt;. Could you test whether captive portal SSO works for test HTTP site?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;/P&gt;</description>
      <pubDate>Tue, 19 Aug 2025 00:25:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/next-generation-firewall/palo-alto-kerberos-for-sso/m-p/1236187#M6217</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2025-08-19T00:25:49Z</dc:date>
    </item>
  </channel>
</rss>

