<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authenticating Panorama users with AD in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37747#M27663</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nevermind I got it.. DN of the id to query AD had a syntax error.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 25 Apr 2011 19:21:48 GMT</pubDate>
    <dc:creator>jhickey</dc:creator>
    <dc:date>2011-04-25T19:21:48Z</dc:date>
    <item>
      <title>Authenticating Panorama users with AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37741#M27657</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Is it possible to authenticate users using their AD credentials when they log into Panorama? Short of giving administrators their own login into Panorama, I'm unable to track who has changed what.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've read through the LDAP guide, but it focuses on the actual security devices and not Panorama.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Has anyone done this or know if it is possible?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jul 2010 15:55:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37741#M27657</guid>
      <dc:creator>robert.b</dc:creator>
      <dc:date>2010-07-13T15:55:41Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating Panorama users with AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37742#M27658</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, but you'll need a RADIUS server. You'll add the Panorama to the RADIUS clients using the RADIUS standard client-vendor attributes. Then create a strong password for the shared secret. Write that down, and we'll come back to that next.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you'll need to add the RADIUS policies. For a Windows RADIUS server, we use the "Client Friendly Name Matches" and use the name of the RADIUS client you just added, and "Windows-Groups matches" for the group of users you want to authenticate.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then click on the "Edit Profile" button. Under the authentication tab, check everything but "Encrypted authentication (CHAP)" and "Allows clients to connect without negotiation an authenticate method."&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then stop and start the RADIUS server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then create a RADIUS profile in Panorama. Added the IP address of the RADIUS server and enter to shared secret you assigned for that server. Then you should be able to add the administrative user's short name, and select the checkbox for RADIUS authentication. Commit the change and try it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that's everything we had to do to make it work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Jul 2010 18:28:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37742#M27658</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2010-07-13T18:28:20Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating Panorama users with AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37743#M27659</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks, I'll see if we can get the Windows IAS installed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Pity it can't just use LDAP!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Jul 2010 07:23:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37743#M27659</guid>
      <dc:creator>robert.b</dc:creator>
      <dc:date>2010-07-14T07:23:16Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating Panorama users with AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37744#M27660</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If it can, I haven't bothered. We set it up before PAN OS 3.1.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 14 Jul 2010 13:00:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37744#M27660</guid>
      <dc:creator>mharding</dc:creator>
      <dc:date>2010-07-14T13:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating Panorama users with AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37745#M27661</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You should be able to use LDAP directly for checking the account credentials but you would still need to setup the admin accounts within Panorama as it will only use the LDAP connection for checking the password. If you want to avoid setting up the accounts explicitly, you can use RADIUS VSAs to have Panorama (or the device) leverage directory information to determine which accounts should have access to the system (and what level of access).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 23 Jul 2010 17:42:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37745#M27661</guid>
      <dc:creator>mjacobsen</dc:creator>
      <dc:date>2010-07-23T17:42:17Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating Panorama users with AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37746#M27662</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Mike, I cant get this to work. I set up AD Admin auth just like it is setup on my firewalls. I get invalid username/password.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Apr 2011 19:15:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37746#M27662</guid>
      <dc:creator>jhickey</dc:creator>
      <dc:date>2011-04-25T19:15:21Z</dc:date>
    </item>
    <item>
      <title>Re: Authenticating Panorama users with AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37747#M27663</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;nevermind I got it.. DN of the id to query AD had a syntax error.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Apr 2011 19:21:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authenticating-panorama-users-with-ad/m-p/37747#M27663</guid>
      <dc:creator>jhickey</dc:creator>
      <dc:date>2011-04-25T19:21:48Z</dc:date>
    </item>
  </channel>
</rss>

