<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Global Protect with Active Directory Accounts in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15513#M11377</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here a doc which can help you: &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-4332"&gt;https://live.paloaltonetworks.com/docs/DOC-4332&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Just keep in ming that maybe for external access your AD password are not enough strong &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Setup a radius&amp;nbsp; or new account for vpn can take time but for vpn auth it can be needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 12 Jun 2013 14:07:40 GMT</pubDate>
    <dc:creator>VinceM</dc:creator>
    <dc:date>2013-06-12T14:07:40Z</dc:date>
    <item>
      <title>Global Protect with Active Directory Accounts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15511#M11375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have what might be a simple question. I want to authenticate to Global Protect SSL-VPN using my current Active Directory users. Do I need to have the User ID software installed on a domain server to do this? If thats needed for LDAP can one of the other server types do what I'm looking for with out the software on a server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a PA-500 running 5.0. I have set-up the LDAP "server" and I have the authentication set-up but its still not working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, how can I test if the LDAP connection is working right or not? Is there a test option someplace or something I should look for in the logs? Is there someplace that should display users or groups?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Doug&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 13:50:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15511#M11375</guid>
      <dc:creator>jnunham</dc:creator>
      <dc:date>2013-06-12T13:50:09Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with Active Directory Accounts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15512#M11376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;You can use user-id function agentless system.&lt;/P&gt;&lt;P&gt;Also look at group mapping if you can see all groups or not.if ldap is ok you should see groups.&lt;/P&gt;&lt;P&gt;How did&amp;nbsp; you configure auht. profile ldap ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 13:56:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15512#M11376</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-06-12T13:56:58Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with Active Directory Accounts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15513#M11377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Here a doc which can help you: &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-4332"&gt;https://live.paloaltonetworks.com/docs/DOC-4332&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Just keep in ming that maybe for external access your AD password are not enough strong &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Setup a radius&amp;nbsp; or new account for vpn can take time but for vpn auth it can be needed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 14:07:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15513#M11377</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-06-12T14:07:40Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with Active Directory Accounts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15514#M11378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI Panos,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was able to go into group mapping and was able to get into AD and select a user group, so it does look like it can read AD. I went back to the auth profile remove "all" and added the now available AD query. But still no luck. I think I'm going to re-review everything since I've been working at it for awhile I could have the wrong profile or server selected some place.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Vince - is there a password strength check someplace between AD and the Global protect portal? The one I'm testing with right now should be ok, but I know I have users that have not very strong passwords. I guess I was counting on the system just passing the passwords through reguardless of how strong they might be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Doug&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 14:36:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15514#M11378</guid>
      <dc:creator>jnunham</dc:creator>
      <dc:date>2013-06-12T14:36:21Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with Active Directory Accounts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15515#M11379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;For password strengh, you can configure a minimum password complexity politic in the palo but only local account ... sorry. Else this politic have to be taken in charge by the remote authent server (AD in your case).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 14:45:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15515#M11379</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-06-12T14:45:24Z</dc:date>
    </item>
    <item>
      <title>Re: Global Protect with Active Directory Accounts</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15516#M11380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Ok this is working, I found the missing piece in the re-review.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had to include my new AD members group from User Identification in the Global Protect portal set-up and now its all working!! Now I can jump into deeper testing.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks all.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 12 Jun 2013 14:52:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/global-protect-with-active-directory-accounts/m-p/15516#M11380</guid>
      <dc:creator>jnunham</dc:creator>
      <dc:date>2013-06-12T14:52:02Z</dc:date>
    </item>
  </channel>
</rss>

