<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD group for administratoin using authentication through LDAP in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46842#M34432</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would be per user. &lt;/P&gt;&lt;P&gt;If you would like to use user groups on AD, then you can try to use RADIUS since with RADIUS, you can return attributes for authorization (which cannot be done with LDAP - hence each user has to be created on the firewall, assigned a role and authenticated remotely).&lt;/P&gt;&lt;P&gt;Here is a document describing the configuration for RADIUS with VSA for your reference: &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1765"&gt;https://live.paloaltonetworks.com/docs/DOC-1765&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 16 May 2013 19:11:08 GMT</pubDate>
    <dc:creator>goku123</dc:creator>
    <dc:date>2013-05-16T19:11:08Z</dc:date>
    <item>
      <title>AD group for administratoin using authentication through LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46839#M34429</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I'm trying to authenticate an AD group for administrative access for our PA. I'm missing the last step to implement it and I may have some of the steps messed up. could someone fill in the blanks for me?&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Create an LDAP profile&lt;/LI&gt;&lt;LI&gt;Create an authentication profile&lt;/LI&gt;&lt;LI&gt;???&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry if this question has been covered before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 18:22:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46839#M34429</guid>
      <dc:creator>TheOriginalgiga</dc:creator>
      <dc:date>2013-05-16T18:22:36Z</dc:date>
    </item>
    <item>
      <title>Re: AD group for administratoin using authentication through LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46840#M34430</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;#3. Create an administrator under Device&amp;gt;administrators and assign the auth profile from #2 to the user.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 18:42:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46840#M34430</guid>
      <dc:creator>goku123</dc:creator>
      <dc:date>2013-05-16T18:42:02Z</dc:date>
    </item>
    <item>
      <title>Re: AD group for administratoin using authentication through LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46841#M34431</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;In the administrator section, can I use the AD group name (such as "firewall Admins") or will it have to be per individual user within that group?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 18:51:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46841#M34431</guid>
      <dc:creator>TheOriginalgiga</dc:creator>
      <dc:date>2013-05-16T18:51:08Z</dc:date>
    </item>
    <item>
      <title>Re: AD group for administratoin using authentication through LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46842#M34432</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;It would be per user. &lt;/P&gt;&lt;P&gt;If you would like to use user groups on AD, then you can try to use RADIUS since with RADIUS, you can return attributes for authorization (which cannot be done with LDAP - hence each user has to be created on the firewall, assigned a role and authenticated remotely).&lt;/P&gt;&lt;P&gt;Here is a document describing the configuration for RADIUS with VSA for your reference: &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1765"&gt;https://live.paloaltonetworks.com/docs/DOC-1765&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 19:11:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46842#M34432</guid>
      <dc:creator>goku123</dc:creator>
      <dc:date>2013-05-16T19:11:08Z</dc:date>
    </item>
    <item>
      <title>Re: AD group for administratoin using authentication through LDAP</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46843#M34433</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;thank you, exactly what I wanted to know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 16 May 2013 20:49:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ad-group-for-administratoin-using-authentication-through-ldap/m-p/46843#M34433</guid>
      <dc:creator>TheOriginalgiga</dc:creator>
      <dc:date>2013-05-16T20:49:40Z</dc:date>
    </item>
  </channel>
</rss>

