<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Alternative to sAMAccountname ,when using Ldap for Authentication in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45897#M33726</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmm.I see.maybe we should change auth method also&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Nov 2012 19:32:50 GMT</pubDate>
    <dc:creator>Retired Member</dc:creator>
    <dc:date>2012-11-08T19:32:50Z</dc:date>
    <item>
      <title>Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45889#M33718</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When we use to authenticate users through AD, we configure LDAP profile and in Authentication profile tab.&lt;/P&gt;&lt;P&gt;We write "sAMAccountname" for attribute at this window.We want to change this attribute and we want users not to log in with just username; We want them to log in with username@domain&amp;nbsp; or&amp;nbsp; domain\username so What attribute should we use ? I tried userPrincipalName but it did not work.Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:11:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45889#M33718</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-11-08T19:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45890#M33719</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You got to keep &lt;SPAN style="color: #000000; font-family: Arial, Helvetica, sans-serif; font-size: 12px; background-color: #ffffff;"&gt;sAMAccountname&lt;/SPAN&gt; but if you have multiple domains, you will need to configure several LDAP servers (one for each domain) or use a Global one if you infrastructure allows it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:16:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45890#M33719</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2012-11-08T19:16:41Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45891#M33720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;we have configured Ldap for each domain.We have 3 domains, 3Ldap profiles.But there are some people with the same name on different domains so&lt;/P&gt;&lt;P&gt;dc1&amp;nbsp; username: u1&lt;/P&gt;&lt;P&gt;dc2&amp;nbsp; username: u1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;when u1 tries to log in , authentication sequence cannot understand which u1 is he/she user should log in with domain name credential but how ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:21:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45891#M33720</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-11-08T19:21:48Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45892#M33721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;did you create an authentication Sequence with Profile 1, Profile 2 and Profile 3 ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:23:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45892#M33721</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2012-11-08T19:23:36Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45893#M33722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;yes as you said we created.But when it looks the first match of username it doesn't look the other so it cannot understand the person is on 2nd or 3rd.(with that config it is impossible)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:26:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45893#M33722</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-11-08T19:26:15Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45894#M33723</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmm I have a slighlty different experience : over here it tests my 4 authentication servers one after the other until it matches&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:29:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45894#M33723</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2012-11-08T19:29:08Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45895#M33724</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I see the difference with your setup : I use Kerberos, not LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I use LDAP for Group extraction only. Authentication is done with Kerberos&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:31:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45895#M33724</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2012-11-08T19:31:00Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45896#M33725</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;you also have users with the same name because otherwise no problem occurs.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:31:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45896#M33725</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-11-08T19:31:01Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45897#M33726</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hmm.I see.maybe we should change auth method also&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:32:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45897#M33726</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-11-08T19:32:50Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45898#M33727</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I do have users with same name, no problem so far. But there is a small probabilty that not all of them are using my captive portal ....&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:34:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45898#M33727</guid>
      <dc:creator>essnet</dc:creator>
      <dc:date>2012-11-08T19:34:56Z</dc:date>
    </item>
    <item>
      <title>Re: Alternative to sAMAccountname ,when using Ldap for Authentication</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45899#M33728</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I understand.Thanks very much for help.I opened a case let me look what support will do and I'll write if there is any option to solve it.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 19:55:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/alternative-to-samaccountname-when-using-ldap-for-authentication/m-p/45899#M33728</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2012-11-08T19:55:52Z</dc:date>
    </item>
  </channel>
</rss>

