<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP Authentication 4.1.x Panorama and FW in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-4-1-x-panorama-and-fw/m-p/4899#M3594</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you - i have been fiddling with this all day - and discovered its not working right when doing the LDAP stuff from panorama, or at least, it works better from the firewall itself,&amp;nbsp; the FQDN versus Wintendo-netbios network name was one of the issues, I had portal working but not the gateway, removal of fqdn fixed that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 19 Jun 2012 19:38:28 GMT</pubDate>
    <dc:creator>tstokkeland</dc:creator>
    <dc:date>2012-06-19T19:38:28Z</dc:date>
    <item>
      <title>LDAP Authentication 4.1.x Panorama and FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-4-1-x-panorama-and-fw/m-p/4896#M3591</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There is a ton of various old and somewhat newer info on LDAP related info around, but I have not been able to find any good source on step by step and how to troubleshoot - a lot of the junk seems to reference user-id stuff, which I believe is not relevant, shouldnt I be able to configure an LDAP server profile, a authentication profile, and then use this for authentication (wether admin access or ssl vpn?).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have been unable to find any logs or info on how to test if my LDAP server profile is even working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I had kerberos authentication working just fine, but the bugs with Kerberos and groups makes it unusable, so I have to get LDAP configured, but so far I have not been able to.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for my testing I am doing this in panorama, for the local admin logons to Panorama (because it is so much faster to commit with than a firewall):&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;here is what I did - which I believe should work:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;created a user in the domain named&amp;nbsp; pan-admin&amp;nbsp; (for sake of troubleshooting I gave it domain admin rights)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Created LDAP Server Profile&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Name: adtest&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Servers: Added two DC's by IP, port 389&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Domain: mydom.local&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Type: Active-Directory&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Base: DC=mydom,DC=local&amp;nbsp;&amp;nbsp;&amp;nbsp; (this pulled up by dropdown)&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Bind DN: DN=pan-admin,OU=Service Accounts,DC=mydom,DC=local&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Password: **&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;I unchecked SSL&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;the rest is default.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Created an Authentication Profile&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Name: adAuthAdmin&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Allow List:&amp;nbsp; removed all, and added a single user&amp;nbsp; like&amp;nbsp;&amp;nbsp; mydom\username&amp;nbsp; and a group&amp;nbsp; mydom\groupname&amp;nbsp; by typing them in (I would think that just group should work, but for testing purposes I also added my speciifc user)&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Authentication: LDAP&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Server Profile: adtest&lt;/P&gt;&lt;P style="padding-left: 30px;"&gt;Login Attribute:&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (left blank, dont really get what the hell this is)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Under Administrators I added 2 users, one for the group (mydom\groupname) and also my individual user for testing, usint the "adAuthAdmin" profile and superuser...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;shouldnt that work?&lt;/P&gt;&lt;P&gt;I cant even find out how to test if the LDAP Server profile is even working - logs show nothing at all - when trying a login the system log just shows &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; User 'mydom\username' failed authentication.&amp;nbsp; Reason: Authentication profile not found for the user From: 10.159.14.11.' )&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried a lot of different things but I have no luck really - the DC's are 2003's - I have 2008R2's as well but figured there be less prone to issues using the old ones...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;btw - user-identification working fine with the agents and all that - I dont see how that is even relevant other than that it uses it for dropdowns on the firewalls (not in panorama since it doesnt have user-id.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;any help appreciate - I might open a ticket soon,...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 13:57:13 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-4-1-x-panorama-and-fw/m-p/4896#M3591</guid>
      <dc:creator>tstokkeland</dc:creator>
      <dc:date>2012-06-19T13:57:13Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication 4.1.x Panorama and FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-4-1-x-panorama-and-fw/m-p/4897#M3592</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;more searching and digging and I found this post&lt;/P&gt;&lt;P&gt;&lt;A __default_attr="2262" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt;which lead me to the device/panorama setting, where a profile has to be chosen for the box.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;so this works as long as I add each individual user to the administrators list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Shouldnt this work by just adding a group?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;and I still have no good way of debugging this crap &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 14:47:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-4-1-x-panorama-and-fw/m-p/4897#M3592</guid>
      <dc:creator>tstokkeland</dc:creator>
      <dc:date>2012-06-19T14:47:07Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication 4.1.x Panorama and FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-4-1-x-panorama-and-fw/m-p/4898#M3593</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Authentication profiles can be used with the following features:&lt;/P&gt;&lt;P&gt;- Captive Portal&lt;/P&gt;&lt;P&gt;- Global Protect&lt;/P&gt;&lt;P&gt;- Administrator login&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Captive Portal and Global Protect will work by specifying the group in the allow list. Administrator login functions differently as it is required to add each individual user(unless VSA is setup &lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1701"&gt;https://live.paloaltonetworks.com/docs/DOC-1701&lt;/A&gt;).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;A couple notes on your configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) In the LDAP Server Profile you have the FQDN defined. If left to the FQDN then there can be issues with the user mapping correctly to a group as there will be two separate references to the user&lt;/P&gt;&lt;P&gt;mydom.local\user1&lt;/P&gt;&lt;P&gt;mydom\user1&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To prevent this problem instead of - Domain: mydom.local&lt;/P&gt;&lt;P&gt;Enter - Domain: mydom&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) In the Authentication Profile you would set the login attribute to sAMAccountName if using AD/LDAP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For troubleshooting, you want to review system logs and authd.log. Other common issues can be solved by review the output of various 'show user' commands such as:&lt;/P&gt;&lt;P&gt;&amp;gt; show user group name &amp;lt;group name&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show user user-IDs match-user &amp;lt;username&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;gt; show user group-mapping state all&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Stefan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 18:47:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-4-1-x-panorama-and-fw/m-p/4898#M3593</guid>
      <dc:creator>sspringer</dc:creator>
      <dc:date>2012-06-19T18:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication 4.1.x Panorama and FW</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-4-1-x-panorama-and-fw/m-p/4899#M3594</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank you - i have been fiddling with this all day - and discovered its not working right when doing the LDAP stuff from panorama, or at least, it works better from the firewall itself,&amp;nbsp; the FQDN versus Wintendo-netbios network name was one of the issues, I had portal working but not the gateway, removal of fqdn fixed that.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 19 Jun 2012 19:38:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-4-1-x-panorama-and-fw/m-p/4899#M3594</guid>
      <dc:creator>tstokkeland</dc:creator>
      <dc:date>2012-06-19T19:38:28Z</dc:date>
    </item>
  </channel>
</rss>

