<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Unable to authenticate against ISE when using External ID Source in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/unable-to-authenticate-against-ise-when-using-external-id-source/m-p/567029#M114560</link>
    <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/290949"&gt;@cullums&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To see the username for failed authentications, you should uncheck "Disclose invalid usernames" under Administration &amp;gt; System &amp;gt; Settings &amp;gt; Security Settings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To see why the user is failing you should click on the details page icon under Operations &amp;gt; TACACS &amp;gt; Live Logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I use TACACS for my NGFW administrative logon, and it works fine.&amp;nbsp; There are a couple ways to do it:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Configure local administrators with an authentication profile to ISE.&amp;nbsp; Boom!&amp;nbsp; Done.&lt;/LI&gt;
&lt;LI&gt;Configure an Authentication Profile under Device/Panorama &amp;gt; Setup &amp;gt;&amp;nbsp; Management &amp;gt; Authentication Settings.&amp;nbsp; Here you cannot manually specify the role.&amp;nbsp; You need to configure VSAs in ISE to send the role to the NGFW.&amp;nbsp; See the URLs below.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/authentication-types/tacacs" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/authentication-types/tacacs&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit:&amp;nbsp; TACACS+ with CHAP will not work with AD because PA uses CHAP/MD5.&amp;nbsp; TACACS+ with PAP works fine with AD.&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/td-p/230962/page/2" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/td-p/230962/page/2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 24 Nov 2023 13:26:27 GMT</pubDate>
    <dc:creator>TomYoung</dc:creator>
    <dc:date>2023-11-24T13:26:27Z</dc:date>
    <item>
      <title>Unable to authenticate against ISE when using External ID Source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unable-to-authenticate-against-ise-when-using-external-id-source/m-p/566762#M114528</link>
      <description>&lt;P&gt;So I have an interesting issue. I have a Cisco ISE server in our environment doing TACACS+ authentication for all our network devices. ISE is tied to our Active Directory environment, and users in certain OU's are authenticated and authorized based on the AD group they're in. I tried configuring one of our PA-440's to authenticate against the ISE server, however in the TACACS Live Logs I see "INVALID" as the Identity of the user.&lt;/P&gt;
&lt;P&gt;Interestingly enough, if I create a user in the local ISE database, and add them to the firewall policy set, then authentication works and I see the correct username in the Identity column.&lt;/P&gt;
&lt;P&gt;So authentication works for users in the ISE local ID store, but doesn't work when users are in an Ext ID Store. Is there something I'm missing to allow for external id source authentication?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;FYI, I cannot share screenshots or paste configs as this is in an air-gapped environment.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2023 20:14:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unable-to-authenticate-against-ise-when-using-external-id-source/m-p/566762#M114528</guid>
      <dc:creator>cullums</dc:creator>
      <dc:date>2023-11-22T20:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate against ISE when using External ID Source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unable-to-authenticate-against-ise-when-using-external-id-source/m-p/567029#M114560</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/290949"&gt;@cullums&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To see the username for failed authentications, you should uncheck "Disclose invalid usernames" under Administration &amp;gt; System &amp;gt; Settings &amp;gt; Security Settings.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;To see why the user is failing you should click on the details page icon under Operations &amp;gt; TACACS &amp;gt; Live Logs.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I use TACACS for my NGFW administrative logon, and it works fine.&amp;nbsp; There are a couple ways to do it:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Configure local administrators with an authentication profile to ISE.&amp;nbsp; Boom!&amp;nbsp; Done.&lt;/LI&gt;
&lt;LI&gt;Configure an Authentication Profile under Device/Panorama &amp;gt; Setup &amp;gt;&amp;nbsp; Management &amp;gt; Authentication Settings.&amp;nbsp; Here you cannot manually specify the role.&amp;nbsp; You need to configure VSAs in ISE to send the role to the NGFW.&amp;nbsp; See the URLs below.&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000PMYmCAO&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/authentication-types/tacacs" target="_blank" rel="noopener"&gt;https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/authentication/authentication-types/tacacs&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Tom&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Edit:&amp;nbsp; TACACS+ with CHAP will not work with AD because PA uses CHAP/MD5.&amp;nbsp; TACACS+ with PAP works fine with AD.&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/td-p/230962/page/2" target="_blank" rel="noopener"&gt;https://live.paloaltonetworks.com/t5/general-topics/tacacs-cisco-ise-config/td-p/230962/page/2&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 24 Nov 2023 13:26:27 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unable-to-authenticate-against-ise-when-using-external-id-source/m-p/567029#M114560</guid>
      <dc:creator>TomYoung</dc:creator>
      <dc:date>2023-11-24T13:26:27Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate against ISE when using External ID Source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unable-to-authenticate-against-ise-when-using-external-id-source/m-p/567226#M114590</link>
      <description>&lt;P&gt;So, it looks like (now that I can see the username, thanks for that tidbit) I'm getting an error that states "Current Identity Store does not support the authentication method; Skipping it xxxx_AD"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;So for whatever reason it's not passing the username to AD. At least now I know where to hone in on the issue. I will say that for admin accounts I have created locally on the ISE server, I am able to authenticate to the firewall. It's only when trying to pass the username to AD that it fails.&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 15:17:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unable-to-authenticate-against-ise-when-using-external-id-source/m-p/567226#M114590</guid>
      <dc:creator>cullums</dc:creator>
      <dc:date>2023-11-27T15:17:23Z</dc:date>
    </item>
    <item>
      <title>Re: Unable to authenticate against ISE when using External ID Source</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/unable-to-authenticate-against-ise-when-using-external-id-source/m-p/567231#M114591</link>
      <description>&lt;P&gt;I just noticed your edit regarding CHAP vs PAP. I just came to the same conclusion and was going to post, but you beat me to it LOL! Thanks for the help. I guess if I want to use ISE as my authentication method I either need to have the admin accounts local on the ISE server in order for CHAP authentication to work, or switch the firewall to PAP and manage the admins through an AD group.&lt;/P&gt;
&lt;P&gt;Anyhow, thanks again for the help, I appreciate it!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Steve&lt;/P&gt;</description>
      <pubDate>Mon, 27 Nov 2023 15:42:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/unable-to-authenticate-against-ise-when-using-external-id-source/m-p/567231#M114591</guid>
      <dc:creator>cullums</dc:creator>
      <dc:date>2023-11-27T15:42:03Z</dc:date>
    </item>
  </channel>
</rss>

