<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD/LDAP admin authentication in 4.1 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27445#M20007</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the same issue with 4.1 (4.1.3 in my case). The documentation in the admin guide and user id agent setup fail to tell you this, but if you want to use Kerberos and not LDAP then you have to use the old user id agent 3.1 for AD. Then it will work (provided the account being used to browse has appropriate permissions). The reason being (as explained to me by tech support) is that the PAN does all the user to group mapping in 4.1.x and it only supports that via LDAP at this time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to make it work with Kerberos (using Kerberos authentication profiles, sequences, and server profiles) then you have to use the 3.1 user id agent for AD. Even using 4.1.3-2 user id agent in a proxy mode will break it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 19 Mar 2012 17:54:54 GMT</pubDate>
    <dc:creator>jasbeck</dc:creator>
    <dc:date>2012-03-19T17:54:54Z</dc:date>
    <item>
      <title>AD/LDAP admin authentication in 4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27438#M20000</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;does anybody have an exmple of howto authenticate a user based on it's group membership against active directory?&lt;/P&gt;&lt;P&gt;We have 3 kind of groups in AD which should represent the access level.&lt;/P&gt;&lt;P&gt;Could someone please post a small summary how to achieve this.&lt;/P&gt;&lt;P&gt;I tried alreday to setup LDAP Server Profile and the Authentication Profile but in the authentication profile I couldn't browse the allow list.&lt;/P&gt;&lt;P&gt;Maybe I missed something. When I continued with an any statement and setting up an account in the Adminsitrators tab, I wasn't able to authenticate this user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2012 17:31:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27438#M20000</guid>
      <dc:creator>muellerm</dc:creator>
      <dc:date>2012-03-14T17:31:21Z</dc:date>
    </item>
    <item>
      <title>Re: AD/LDAP admin authentication in 4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27439#M20001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi...You should upgrade to PAN-OS 4.1.4 and give it another try.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Mar 2012 18:43:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27439#M20001</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-03-14T18:43:17Z</dc:date>
    </item>
    <item>
      <title>Re: AD/LDAP admin authentication in 4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27440#M20002</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thanks for the reply.&lt;/P&gt;&lt;P&gt;But the upgrade didn't solve the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there a step-by-step guid avaiable which I can follow, to check if I don't miss a setp?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 09:11:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27440#M20002</guid>
      <dc:creator>muellerm</dc:creator>
      <dc:date>2012-03-16T09:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: AD/LDAP admin authentication in 4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27441#M20003</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Michael...I thought the problem was that you couldn't browse the allow list in the Authen Profile.&amp;nbsp; Are you able to browse the allow list under version 4.1.4?&amp;nbsp; Does the LDAP admin authentication work if you set the allow list to 'All' by selecting the All checkbox?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Here's a guide on configuring Kerberos authentication in PANOS 4.0:&amp;nbsp; &lt;/SPAN&gt;&lt;A href="https://live.paloaltonetworks.com/docs/DOC-1762"&gt;https://live.paloaltonetworks.com/docs/DOC-1762&lt;/A&gt;&lt;SPAN&gt;.&amp;nbsp; The procedure for the Authen Profile is basically the same as for LDAP. Maybe you can try to use Kerberos instead of LDAP.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 14:10:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27441#M20003</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-03-16T14:10:07Z</dc:date>
    </item>
    <item>
      <title>Re: AD/LDAP admin authentication in 4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27442#M20004</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm guessing he's asking for something that I was interested in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have Kerberos based authentication working, so if I setup a user called BOB, and I have an AD account with the same name I can authenticate using the BOB AD password - all good.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, what I want is to be able to link an AD group without having to create the local account - so if I add TOM to the AD group it automatically allows TOM to login to the Palo without having to create the local account to map to...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;My view anyway!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 16 Mar 2012 23:32:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27442#M20004</guid>
      <dc:creator>apackard</dc:creator>
      <dc:date>2012-03-16T23:32:55Z</dc:date>
    </item>
    <item>
      <title>Re: AD/LDAP admin authentication in 4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27443#M20005</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Within the Authentication Profile, you can permit the group(s) under the Allow List that will have admin access.&amp;nbsp; Under Device tab ==&amp;gt; Setup ==&amp;gt; Authentication Settings, you then select the Authen Profile to use.&amp;nbsp; Please give that a try.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 17 Mar 2012 17:10:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27443#M20005</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-03-17T17:10:25Z</dc:date>
    </item>
    <item>
      <title>Re: AD/LDAP admin authentication in 4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27444#M20006</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the authentication is working with Kerberos thanks for the advice.&lt;/P&gt;&lt;P&gt;But what I'd like to have is a authentication based on the AD groups. That I don't need to create each account on the box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Michael&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Mar 2012 08:50:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27444#M20006</guid>
      <dc:creator>muellerm</dc:creator>
      <dc:date>2012-03-19T08:50:26Z</dc:date>
    </item>
    <item>
      <title>Re: AD/LDAP admin authentication in 4.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27445#M20007</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the same issue with 4.1 (4.1.3 in my case). The documentation in the admin guide and user id agent setup fail to tell you this, but if you want to use Kerberos and not LDAP then you have to use the old user id agent 3.1 for AD. Then it will work (provided the account being used to browse has appropriate permissions). The reason being (as explained to me by tech support) is that the PAN does all the user to group mapping in 4.1.x and it only supports that via LDAP at this time.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In order to make it work with Kerberos (using Kerberos authentication profiles, sequences, and server profiles) then you have to use the 3.1 user id agent for AD. Even using 4.1.3-2 user id agent in a proxy mode will break it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Mar 2012 17:54:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-ldap-admin-authentication-in-4-1/m-p/27445#M20007</guid>
      <dc:creator>jasbeck</dc:creator>
      <dc:date>2012-03-19T17:54:54Z</dc:date>
    </item>
  </channel>
</rss>

