<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Assistance with LDAP Authentication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/assistance-with-ldap-authentication/m-p/1248403#M126008</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/151805"&gt;@DJ_1924&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for posting!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you confirm whether the account:&amp;nbsp;paloservice is in the scope of Base DN configured in LDAP profile? Reference in KB:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clr3CAC" target="_self"&gt;Usernames Not Retrieved by the Firewall with OU for LDAP Server Profile Base&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Could you also check more details in the log from CLI:&amp;nbsp;&lt;STRONG&gt;authd.log&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 17 Feb 2026 21:56:29 GMT</pubDate>
    <dc:creator>PavelK</dc:creator>
    <dc:date>2026-02-17T21:56:29Z</dc:date>
    <item>
      <title>Assistance with LDAP Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/assistance-with-ldap-authentication/m-p/1248401#M126007</link>
      <description>&lt;P&gt;Currently working on a PA-540 running 12.1.3 code.&amp;nbsp; I have setup a LDAP server profile, and setup an authentication profile.&amp;nbsp; If I test from the cli, the bind is successful, but the authentication fails, even if I use the same credentials I used to do the bind.&amp;nbsp; I've also tried this with a domain admin account in case it was a permissions issue with respect to the service account not being able to query AD.&amp;nbsp; This is what I'm getting when testing:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;fwuser@firewall-01(active)&amp;gt; test authentication authentication-profile ldap-auth-profile username paloservice password
Enter password : 

Target vsys is not specified, user "paloservice" is assumed to be configured with a shared auth profile.

Do allow list check before sending out authentication request...
name "paloservice" is in group "all"

Authentication to LDAP server at 192.168.200.25 for user "paloservice"
Egress: 172.27.175.23
Type of authentication: plaintext
Starting LDAP connection...
Succeeded to create a session with LDAP server
Can not search userdn for user paloservice
Authentication failed against LDAP server at 192.168.200.25:389 for user "paloservice"&lt;/LI-CODE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'm able to find the user group I intend to use for GP so it seems that the credentials are good and the bind seems to be working.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 21:32:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/assistance-with-ldap-authentication/m-p/1248401#M126007</guid>
      <dc:creator>DJ_1924</dc:creator>
      <dc:date>2026-02-17T21:32:23Z</dc:date>
    </item>
    <item>
      <title>Re: Assistance with LDAP Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/assistance-with-ldap-authentication/m-p/1248403#M126008</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/151805"&gt;@DJ_1924&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;thanks for posting!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Could you confirm whether the account:&amp;nbsp;paloservice is in the scope of Base DN configured in LDAP profile? Reference in KB:&amp;nbsp;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000Clr3CAC" target="_self"&gt;Usernames Not Retrieved by the Firewall with OU for LDAP Server Profile Base&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;Could you also check more details in the log from CLI:&amp;nbsp;&lt;STRONG&gt;authd.log&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Kind Regards&lt;/P&gt;
&lt;P&gt;Pavel&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 21:56:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/assistance-with-ldap-authentication/m-p/1248403#M126008</guid>
      <dc:creator>PavelK</dc:creator>
      <dc:date>2026-02-17T21:56:29Z</dc:date>
    </item>
    <item>
      <title>Re: Assistance with LDAP Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/assistance-with-ldap-authentication/m-p/1248406#M126009</link>
      <description>&lt;P&gt;Thanks for getting back to me.&amp;nbsp; The base dn in the LDAP server was set to&amp;nbsp;DC=userdomain,DC=com.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I'll try to gather the logs again.&amp;nbsp; When I tried a "&lt;SPAN&gt;&amp;nbsp;tail follow yes mp-log authd.log" I wasn't seeing anything w/ respect to the testing.&amp;nbsp; When I pulled a packet capture I do see RSTs from the server.&amp;nbsp; I tested w/ the same username as I have for the actual binding, but I can retest w/ a different user tomorrow to confirm I'm actually seeing that being sent to the server.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Feb 2026 23:16:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/assistance-with-ldap-authentication/m-p/1248406#M126009</guid>
      <dc:creator>DJ_1924</dc:creator>
      <dc:date>2026-02-17T23:16:02Z</dc:date>
    </item>
  </channel>
</rss>

