<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic LDAP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ldap/m-p/616303#M121942</link>
    <description>&lt;P&gt;We plan to enable channel binding for LDAP on our domain controllers.&amp;nbsp; Since the firewalls use LDAP for querying AD information from the domain controllers, do we need to make any configurations to the firewalls to be compatible?&lt;/P&gt;</description>
    <pubDate>Thu, 07 Nov 2024 04:53:45 GMT</pubDate>
    <dc:creator>AGWilliams</dc:creator>
    <dc:date>2024-11-07T04:53:45Z</dc:date>
    <item>
      <title>LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap/m-p/616303#M121942</link>
      <description>&lt;P&gt;We plan to enable channel binding for LDAP on our domain controllers.&amp;nbsp; Since the firewalls use LDAP for querying AD information from the domain controllers, do we need to make any configurations to the firewalls to be compatible?&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 04:53:45 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap/m-p/616303#M121942</guid>
      <dc:creator>AGWilliams</dc:creator>
      <dc:date>2024-11-07T04:53:45Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap/m-p/616384#M121953</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/231949"&gt;@AGWilliams&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;Can't say that I've ran into an environment that has had this functionality enabled, either because the firewall supports it without issue and nothing was needed or they just don't have it enabled. Server 2019 and Server 2022 does have the ability to setup audit events to identify clients that don't support channel binding tokens, so I would just ensure that you enable it for &lt;STRONG&gt;When Supported &lt;/STRONG&gt;and audit those events to verify before mandating it on the controllers. &lt;/P&gt;</description>
      <pubDate>Fri, 08 Nov 2024 01:21:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap/m-p/616384#M121953</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2024-11-08T01:21:39Z</dc:date>
    </item>
  </channel>
</rss>

