<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD Group for Authentication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24372#M17766</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may check this doc:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1701"&gt;Configuring Administrator Authentication with Windows 2008 RADIUS Server (NPS/IAS)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 04 Nov 2014 18:13:37 GMT</pubDate>
    <dc:creator>HULK</dc:creator>
    <dc:date>2014-11-04T18:13:37Z</dc:date>
    <item>
      <title>AD Group for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24366#M17760</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Let's say I have 150 users in an AD group and I need to give them all login access to my Palo Alto device farm.&amp;nbsp; How do I do that?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 17:33:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24366#M17760</guid>
      <dc:creator>dusk2dusk</dc:creator>
      <dc:date>2014-11-04T17:33:00Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24367#M17761</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/u1/29965"&gt;dusk2dusk&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This document has the information that you are looking for :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-2745"&gt;Using LDAP to Authenticate to the WebUI&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This document is also applicable for CLI access as well. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 17:40:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24367#M17761</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-04T17:40:22Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24368#M17762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you mean user's will login to paloalto ?&lt;/P&gt;&lt;P&gt;Just create an LDAP profile and use that with Authentication profile.&lt;/P&gt;&lt;P&gt;Then you'll choose that Auth. profile when creating users.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 17:40:23 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24368#M17762</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2014-11-04T17:40:23Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24369#M17763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;One way is to use the User-ID Agent to map AD usernames to IP addresses(the PA reads the AD auth logs).&amp;nbsp; Then, use the Group Mapping function to pull in users/groups from AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: Just re-read your question.&amp;nbsp; The above will allow you to apply usernames to security policies, not the PA WebUI.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 17:41:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24369#M17763</guid>
      <dc:creator>jambulo</dc:creator>
      <dc:date>2014-11-04T17:41:49Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24370#M17764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I guess I need to be more clear.&amp;nbsp; I have 150 network engineers\system admins I need to give access to my Palo Alto's for management/viewing purposes.&amp;nbsp; They are all in one AD group.&amp;nbsp; Given the size of this group and it constantly changing for user roles and terminations there is no way I can manually manage this number of individual entries in each device.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 17:47:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24370#M17764</guid>
      <dc:creator>dusk2dusk</dc:creator>
      <dc:date>2014-11-04T17:47:06Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24371#M17765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In that case Radius authentication would be more appropriate as you do not have to configure Administrators information on the device. You can add/delete/modify users on back end. Each time engineers/system admin tries to access, firewall will contact Radius server and assign appropriate privileges to the users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;With LDAP, you will need to configure each 150 admins and modify each time there is a change with there privileges level. Hope this helps. Thank you. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 18:06:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24371#M17765</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-04T18:06:06Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24372#M17766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You may check this doc:&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1701"&gt;Configuring Administrator Authentication with Windows 2008 RADIUS Server (NPS/IAS)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 18:13:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24372#M17766</guid>
      <dc:creator>HULK</dc:creator>
      <dc:date>2014-11-04T18:13:37Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24373#M17767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank You ssharma.&amp;nbsp; I guess I am wondering, with all the LDAP group info you can get in the Palo Alto along with direct Kerberos authentication, why on earth do we need to go through the laborious process of using customized RADIUS?&amp;nbsp; I mean, we're already pulling that group info into the LDAP profile.&amp;nbsp; Wouldn't it be a very easy thing to add group authentication straight off LDAP in PanOS code?&amp;nbsp; It just seems odd not to have group auth as an option for LDAP.&amp;nbsp; Unless there's a reason not to do it that way, I would like to submit a big Feature Request for this.&amp;nbsp; It's rubbing many shades of the shine off of "AD Integration" after coming from traditional like ScreenOS etc.&amp;nbsp; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 18:16:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24373#M17767</guid>
      <dc:creator>dusk2dusk</dc:creator>
      <dc:date>2014-11-04T18:16:28Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24374#M17768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand your concern. But unlike Radius, LDAP doesnot support VSA (vendor specific attribute), where PA can go out and query for users group association and their privilege levels. That is why we need to configure all users for LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can certainly contact your local sales /system engineer for a feature request. Hope this helps. Thank you.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 18:32:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24374#M17768</guid>
      <dc:creator>ssharma</dc:creator>
      <dc:date>2014-11-04T18:32:06Z</dc:date>
    </item>
    <item>
      <title>Re: AD Group for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24375#M17769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks for the Suggestion HULK.&amp;nbsp; I located the RADIUS VSA document as well.&amp;nbsp; Trying to figure out if I want to go to 802.1x as well so maybe NPS is the way to go. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 04 Nov 2014 18:37:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-authentication/m-p/24375#M17769</guid>
      <dc:creator>dusk2dusk</dc:creator>
      <dc:date>2014-11-04T18:37:07Z</dc:date>
    </item>
  </channel>
</rss>

