<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP (Active directory) Authentication for administrators in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40536#M29773</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had the exact same problem with my LDAP-login.&lt;/P&gt;&lt;P&gt;For domain,&lt;STRONG&gt; you need to enter the Netbios name, not the FQDN&lt;/STRONG&gt;, as the users are identified as domain\username, not domain.com\username.&lt;/P&gt;&lt;P&gt;In your case, domain should simply be "csg", not "csg.es".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When logging in I would try to first go ahead without specifying the domain, and if that doesn't work, try domain\username.&lt;/P&gt;&lt;P&gt;If you've been having trouble with policies based on AD-groups not working, this will also solve that problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another thing I noticed is the Bind DN, this is the entire DN, and it seems like you have typed the username of the Palo Alto firewall user?&lt;/P&gt;&lt;P&gt;To make sure you get this right, open Active Directory Users and Computers on your Active Directory server, select the user properties and go to the Attribute Editor. (go to View, and select Advanced Features to get this option)&lt;/P&gt;&lt;P&gt;Copy the contents of the field distinguishedName.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 03 Jul 2013 10:13:36 GMT</pubDate>
    <dc:creator>arvesynd</dc:creator>
    <dc:date>2013-07-03T10:13:36Z</dc:date>
    <item>
      <title>LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40525#M29762</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Im trying to configure my PA to validate with my AD to can manage it. I have create a group in my Active Directory called (com_cos), this group has the user to manage the PA. I have add this group in Group mapping and Authentication profile (Allowlist) but it seems like the PA has any problem with the group in AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is output error: User 'csg.es\as' failed authentication. Reason: User is not in allowlist From: 172.16.28.133.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I attach the config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 06:01:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40525#M29762</guid>
      <dc:creator>soporteseguridad</dc:creator>
      <dc:date>2013-07-02T06:01:46Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40526#M29763</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you try using the netbios name i.e just cgs under the domain filed in your LDAP server profile.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 06:05:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40526#M29763</guid>
      <dc:creator>sraghunandan</dc:creator>
      <dc:date>2013-07-02T06:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40527#M29764</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried it and it didnt work &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt; ..... &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 08:14:03 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40527#M29764</guid>
      <dc:creator>soporteseguridad</dc:creator>
      <dc:date>2013-07-02T08:14:03Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40528#M29765</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;try to refresh group mapping&lt;/P&gt;&lt;P&gt;clear all user cache&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1- clear user-cache&amp;nbsp;&amp;nbsp; and&amp;nbsp; clear user-cache-mp&lt;/P&gt;&lt;P&gt;2- debug user-id refresh group-mapping all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;try again.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 08:18:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40528#M29765</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-07-02T08:18:53Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40529#M29766</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;i jus tried and not working &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this is the error output&lt;/P&gt;&lt;P&gt;User 'CSG\jeca' failed authentication. Reason: User is not in allowlist From: 172.16.28.135.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;do i need to configure something in AD in order to PA can read the groups????&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 08:54:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40529#M29766</guid>
      <dc:creator>soporteseguridad</dc:creator>
      <dc:date>2013-07-02T08:54:46Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40530#M29767</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;write a security rule for that group&lt;/P&gt;&lt;P&gt;after commit look for the user information from cli if you see the group or not&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;show user ip-user-mapping ip&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 09:00:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40530#M29767</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-07-02T09:00:04Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40531#M29768</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;With LDAP,you would have to define each user in&amp;nbsp; the AD group ,on the firewall ,as an Administrator.&lt;/P&gt;&lt;P&gt;For&amp;nbsp; AD group-based Authentication ,you can use Radius Refer: &lt;A href="https://live.paloaltonetworks.com/docs/DOC-1765"&gt;Radius Vendor Specific Attributes (VSA)  &lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 09:02:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40531#M29768</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-02T09:02:43Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40532#M29769</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Its not working &lt;img id="smileysad" class="emoticon emoticon-smileysad" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-sad.png" alt="Smiley Sad" title="Smiley Sad" /&gt; the user is assgined to the correct group.......but i dont know why its not allowed in the list&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User 'CSG\jeca' failed authentication. Reason: User is not in allowlist From: 172.16.28.135.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;IP address:&amp;nbsp; 172.16.28.135 (vsys1)&lt;/P&gt;&lt;P&gt;User:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; csg\jeca&lt;/P&gt;&lt;P&gt;From:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; UIA&lt;/P&gt;&lt;P&gt;Idle Timeout: 2933s&lt;/P&gt;&lt;P&gt;Max. TTL:&amp;nbsp;&amp;nbsp;&amp;nbsp; 2933s&lt;/P&gt;&lt;P&gt;Groups that the user belongs to (used in policy)&lt;/P&gt;&lt;P&gt;Group(s):&amp;nbsp;&amp;nbsp;&amp;nbsp; cn=com_cos,cn=users,dc=csg,dc=es&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 09:26:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40532#M29769</guid>
      <dc:creator>soporteseguridad</dc:creator>
      <dc:date>2013-07-02T09:26:26Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40533#M29770</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Change the Allow-list to &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;all&lt;/STRONG&gt;&lt;/SPAN&gt; as&amp;nbsp; AD Group_based Auth for FW Admin&amp;nbsp; is not possible using LDAP.&lt;/P&gt;&lt;P&gt;You can authenticate individual AD users.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So to authenticate &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt; &lt;/SPAN&gt;user &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt; csg\jeca&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="font-size: 10pt; line-height: 1.5em;"&gt;Create a local Admin under Device&amp;gt;Administrators called &lt;/SPAN&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;jeca and assign it&amp;nbsp; with Auth Profile using Server profile&amp;nbsp; LDAP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;Make sure you change the &lt;/SPAN&gt; the Allow-list to &lt;SPAN style="text-decoration: underline;"&gt;&lt;STRONG&gt;all&lt;/STRONG&gt;&lt;/SPAN&gt;&amp;nbsp; in the Auth Profile&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 09:33:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40533#M29770</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-02T09:33:20Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40534#M29771</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes i had that configuration before, but its quite annoying to create a user in PA each time that user go in the company. it would be easier that PA could auth with AD groups in this way i only would have to create the user in ldap and the PA use the LDAP group............&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Ok ill revert the conf........thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 09:43:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40534#M29771</guid>
      <dc:creator>soporteseguridad</dc:creator>
      <dc:date>2013-07-02T09:43:54Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40535#M29772</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Just to reiterate &lt;SPAN style="line-height: 1.5em; color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;,you can use Radius for AD-Group based Admin Authentication&amp;nbsp; Refer: &lt;/SPAN&gt;&lt;A _jive_internal="true" data-containerid="2027" data-containertype="14" data-objectid="1765" data-objecttype="102" href="https://live.paloaltonetworks.com/docs/DOC-1765" style="line-height: 1.5em; font-size: 12px; font-family: Arial, Helvetica, sans-serif; color: #316989; background-color: #ffffff;"&gt;Radius Vendor Specific Attributes (VSA) &lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 02 Jul 2013 10:30:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40535#M29772</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-02T10:30:53Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40536#M29773</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had the exact same problem with my LDAP-login.&lt;/P&gt;&lt;P&gt;For domain,&lt;STRONG&gt; you need to enter the Netbios name, not the FQDN&lt;/STRONG&gt;, as the users are identified as domain\username, not domain.com\username.&lt;/P&gt;&lt;P&gt;In your case, domain should simply be "csg", not "csg.es".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When logging in I would try to first go ahead without specifying the domain, and if that doesn't work, try domain\username.&lt;/P&gt;&lt;P&gt;If you've been having trouble with policies based on AD-groups not working, this will also solve that problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Another thing I noticed is the Bind DN, this is the entire DN, and it seems like you have typed the username of the Palo Alto firewall user?&lt;/P&gt;&lt;P&gt;To make sure you get this right, open Active Directory Users and Computers on your Active Directory server, select the user properties and go to the Attribute Editor. (go to View, and select Advanced Features to get this option)&lt;/P&gt;&lt;P&gt;Copy the contents of the field distinguishedName.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps. &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 03 Jul 2013 10:13:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40536#M29773</guid>
      <dc:creator>arvesynd</dc:creator>
      <dc:date>2013-07-03T10:13:36Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40537#M29774</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;When you&amp;nbsp; try to configure this using CLI ,it clearly suggests that &lt;STRONG&gt;Only RADIUS method is supported for &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt; for non-local admins&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;# set deviceconfig system &lt;STRONG&gt;authentication-profile&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;lt;value&amp;gt;&amp;nbsp; Authentication profile to use for non-local admins.&lt;STRONG&gt; Only RADIUS method is supported.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So if you need to use AD groups for admins not configured locally you need RADIUS.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 17 Jul 2013 21:23:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40537#M29774</guid>
      <dc:creator>UhMayYeah</dc:creator>
      <dc:date>2013-07-17T21:23:58Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40538#M29775</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I have a similar issue: I have several outside vendors defined as local users, they can log on to a 'captive portal' and then connect to a server in our DMZ. The users are created, enabled, and added to a user group; and also added to the users column of the policy allowing them to connect to the server - basically any source, these users, that destination, https. Of the two users I have added one is working fine but the other fails at the firewall authentication with the system log message: User '&amp;lt;name&amp;gt;' failed authentication.&amp;nbsp; Reason: User is not in allowlist From: &amp;lt;remote IP&amp;gt;.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone have any ideas where I should be looking for an answer?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;Ian&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 19 Aug 2013 14:49:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40538#M29775</guid>
      <dc:creator>IanJohnston</dc:creator>
      <dc:date>2013-08-19T14:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40539#M29776</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Keep in mind that for creating new PA's admin, the amin account has to exist in your AD and you have to recreate it in the administrator menu in the palo.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;V.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 11:59:32 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40539#M29776</guid>
      <dc:creator>VinceM</dc:creator>
      <dc:date>2013-08-21T11:59:32Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP (Active directory) Authentication for administrators</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40540#M29777</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per my knowledge,.. you can't create group based authentication (correct me if i am wrong), instead create a admin with the unique user name as in the AD. Below snaps shows the same.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create a auth profile.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" height="98" src="https://live.paloaltonetworks.com/legacyfs/online/7798_pastedImage_0.png" style="width: 906.866px; height: 98px;" width="907" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Create a&amp;nbsp; new administrator. In the below snap, Name : nithin is same as in the AD ( Name should match the user name in the AD)&lt;/P&gt;&lt;P&gt;&lt;IMG alt="" class="jiveImage" src="https://live.paloaltonetworks.com/legacyfs/online/7802_pastedImage_1.png" style="max-width: 1200px; max-height: 900px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Gururaj&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 21 Aug 2013 12:23:47 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-active-directory-authentication-for-administrators/m-p/40540#M29777</guid>
      <dc:creator>Gururaj</dc:creator>
      <dc:date>2013-08-21T12:23:47Z</dc:date>
    </item>
  </channel>
</rss>

