<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic LDAP Authentication works when testing it via SSH command but fails on web interface in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-works-when-testing-it-via-ssh-command-but/m-p/1235385#M124897</link>
    <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;When I'm running&amp;nbsp;&amp;nbsp;"test authentication authentication-profile "'LDAP Auth Profile" username myldapUser password" on the ssh cli, it authenticates successfully.&lt;/P&gt;
&lt;P&gt;however when i try to log in on the web interface of global protect, i get this on the webui log:&lt;/P&gt;
&lt;P&gt;failed authentication for user 'myDomain\myldapUser'. Reason: Invalid username/password. auth profile 'LDAP Auth Profile', vsys 'vsys1', server profile 'myDomain Active Directory', server address 'myLDAP-IP', From: myHomeIP.&lt;/P&gt;
&lt;P&gt;(i'm not entirely sure what is vsys1 but i understand it is the default virtual system and it cannot be deleted.)&lt;/P&gt;
&lt;P&gt;I'm not sure what I am doing wrong.&lt;/P&gt;
&lt;P&gt;In GlobalProtect Portal Configuration / Authentication I set the "LDAP Auth Profile" as first.&lt;/P&gt;
&lt;P&gt;"&lt;LABEL id="ext-gen42081" class="x-form-item-label" for="ext-comp-23228"&gt;Allow Authentication with User Credentials OR Client Certificate" is set to "OR"&lt;/LABEL&gt;&lt;/P&gt;
&lt;P&gt;In the authentication profile i set "&lt;A href="mailto:%USERINPUT%@%USERDOMAIN%&amp;quot;" target="_blank" rel="noopener"&gt;%USERINPUT%@%USERDOMAIN%"&lt;/A&gt;&amp;nbsp;and add myDomain.local above it and in the Advanced tab i added "All".&lt;/P&gt;
&lt;P&gt;Please let me know what additional info i need to provide, and/or if what to do to make this work&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 05 Aug 2025 00:21:05 GMT</pubDate>
    <dc:creator>gabe</dc:creator>
    <dc:date>2025-08-05T00:21:05Z</dc:date>
    <item>
      <title>LDAP Authentication works when testing it via SSH command but fails on web interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-works-when-testing-it-via-ssh-command-but/m-p/1235385#M124897</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;
&lt;P&gt;When I'm running&amp;nbsp;&amp;nbsp;"test authentication authentication-profile "'LDAP Auth Profile" username myldapUser password" on the ssh cli, it authenticates successfully.&lt;/P&gt;
&lt;P&gt;however when i try to log in on the web interface of global protect, i get this on the webui log:&lt;/P&gt;
&lt;P&gt;failed authentication for user 'myDomain\myldapUser'. Reason: Invalid username/password. auth profile 'LDAP Auth Profile', vsys 'vsys1', server profile 'myDomain Active Directory', server address 'myLDAP-IP', From: myHomeIP.&lt;/P&gt;
&lt;P&gt;(i'm not entirely sure what is vsys1 but i understand it is the default virtual system and it cannot be deleted.)&lt;/P&gt;
&lt;P&gt;I'm not sure what I am doing wrong.&lt;/P&gt;
&lt;P&gt;In GlobalProtect Portal Configuration / Authentication I set the "LDAP Auth Profile" as first.&lt;/P&gt;
&lt;P&gt;"&lt;LABEL id="ext-gen42081" class="x-form-item-label" for="ext-comp-23228"&gt;Allow Authentication with User Credentials OR Client Certificate" is set to "OR"&lt;/LABEL&gt;&lt;/P&gt;
&lt;P&gt;In the authentication profile i set "&lt;A href="mailto:%USERINPUT%@%USERDOMAIN%&amp;quot;" target="_blank" rel="noopener"&gt;%USERINPUT%@%USERDOMAIN%"&lt;/A&gt;&amp;nbsp;and add myDomain.local above it and in the Advanced tab i added "All".&lt;/P&gt;
&lt;P&gt;Please let me know what additional info i need to provide, and/or if what to do to make this work&lt;/P&gt;
&lt;P&gt;thanks&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 00:21:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-works-when-testing-it-via-ssh-command-but/m-p/1235385#M124897</guid>
      <dc:creator>gabe</dc:creator>
      <dc:date>2025-08-05T00:21:05Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication works when testing it via SSH command but fails on web interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-works-when-testing-it-via-ssh-command-but/m-p/1235431#M124902</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/116206921"&gt;@gabe&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Username format mismatch is a likely cause of this.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The CLI test uses the exact username you type, but the GlobalProtect portal's web form and its configuration may be reformatting the username before sending it to the LDAP server.&lt;/P&gt;
&lt;P&gt;Your portal log shows "myDomain\myldapUser," which is the sAMAccountName format. Your CLI test likely worked with "myldapUser". The LDAP server profile may be configured to expect a different format, such as an email address or a different domain.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;In your Authentication Profile, you have "%USERINPUT%@%USERDOMAIN%". This setting is correct for formats like "user@domain.com". However, if your users are accustomed to logging in with "myDomain\myldapUser", you need to explicitly tell the firewall to handle that.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Ensure the Login Attribute is set correctly to match the type of username you are sending.&lt;/P&gt;
&lt;P&gt;For example if you're using %USERINPUT%@%USERDOMAIN%, the Login Attribute should be userPrincipalName. If you're using just %USERINPUT% (and your users don't include the domain), it should be sAMAccountName.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Hope this helps,&lt;/P&gt;
&lt;P&gt;-Kim.&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 08:24:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-works-when-testing-it-via-ssh-command-but/m-p/1235431#M124902</guid>
      <dc:creator>kiwi</dc:creator>
      <dc:date>2025-08-05T08:24:32Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication works when testing it via SSH command but fails on web interface</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-works-when-testing-it-via-ssh-command-but/m-p/1235472#M124908</link>
      <description>&lt;P&gt;Thanks.&lt;/P&gt;
&lt;P&gt;The solution was to add&amp;nbsp;&lt;SPAN&gt;sAMAccountName for "Login Attribute" and not to use myDomain.local but DC=myDomain,DC=local where it is asking for "User Domain:" which is far from obvious. But I thought it worth a try.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Maybe this will help others.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Aug 2025 17:45:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-works-when-testing-it-via-ssh-command-but/m-p/1235472#M124908</guid>
      <dc:creator>gabe</dc:creator>
      <dc:date>2025-08-05T17:45:53Z</dc:date>
    </item>
  </channel>
</rss>

