<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP configuration Using User ID Agent in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166950#M53405</link>
    <description>&lt;P&gt;Reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your clarification , could you please comment on our requirement .&amp;nbsp; We want to integrate firewall to AD through userid agent, not directly , sounds like a centralized user id agent to all of the firewalls. Will this can be achievable ?&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jul 2017 07:34:46 GMT</pubDate>
    <dc:creator>ymamis</dc:creator>
    <dc:date>2017-07-18T07:34:46Z</dc:date>
    <item>
      <title>Centralized User ID Agent to All firewalls  with AD integration</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166781#M53388</link>
      <description>&lt;P&gt;Dear Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kindly note that we would like to achieve AD integration through centralized user id agent ,in that all of the firewalls will have userid agent which is integrated with AD.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So basically userid agent work as a proxy, How this can be achived. I had gone through this link,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Configuration-Articles/User-ID-Agent-as-LDAP-Proxy-for-Group-Mapping-and-Authentication/ta-p/58914" target="_blank"&gt;https://live.paloaltonetworks.com/t5/Configuration-Articles/User-ID-Agent-as-LDAP-Proxy-for-Group-Mapping-and-Authentication/ta-p/58914&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding LDAP configuration part , nothing is mentioned .Appreciate if any body help&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 07:36:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166781#M53388</guid>
      <dc:creator>ymamis</dc:creator>
      <dc:date>2017-07-18T07:36:16Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP proxy configuration Using User ID Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166947#M53403</link>
      <description>&lt;P&gt;hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/47854"&gt;@ymamis&lt;/a&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The article you provided shows you how to enable LDAP proxy, what this does is this:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Under normal circumstances if you configure an LDAP server profile and an authentication profile calls for this LDAP server to authenticate someone (captive portal, VPN, admin ,...) the firewall will send out an LDAP connection from the management port (the tcp session will physically source from the management interface)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you want to change that source for security reasons (eg. you want unencrypted ldap but you don't want a sniffer to be able to pick up your authentication sessions) you can enable ldap proxy on one of your UserID agents.&lt;/P&gt;
&lt;P&gt;This setting will 'proxy' your ldap session over the secure user-id connection: the firewall has a permanent encrypted connection with the user-id agent, and an ldap session can be tunneled through that session. this will make the 'physical' source of the ldap, be the socket on the server where the user-id agent is installed (instead of the management interface)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;your LDAP configuration does not change&lt;/P&gt;
&lt;P&gt;enabling the proxy setting simply tells the firewall to send the tcp session over the user-id link instead of out the management interface&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you may want to look into service routes also : &lt;A title=" Setting a Service Route for Services to Use a Dataplane Interface from the Web UI and CLI" href="https://live.paloaltonetworks.com/t5/Configuration-Articles/Setting-a-Service-Route-for-Services-to-Use-a-Dataplane/ta-p/59433" target="_blank"&gt; Setting a Service Route for Services to Use a Dataplane Interface from the Web UI and CLI&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 07:10:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166947#M53403</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-07-18T07:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP configuration Using User ID Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166950#M53405</link>
      <description>&lt;P&gt;Reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your clarification , could you please comment on our requirement .&amp;nbsp; We want to integrate firewall to AD through userid agent, not directly , sounds like a centralized user id agent to all of the firewalls. Will this can be achievable ?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 07:34:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166950#M53405</guid>
      <dc:creator>ymamis</dc:creator>
      <dc:date>2017-07-18T07:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP configuration Using User ID Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166960#M53406</link>
      <description>&lt;P&gt;can you elaborate on your requirement?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Which aspect do you want to integrate exactly?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;have you checked this article:&amp;nbsp;&lt;A title="Getting Started: User-ID " href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-User-ID/ta-p/69321" target="_blank"&gt;Getting Started: User-ID&lt;/A&gt;&amp;nbsp;it outlines everything about User-ID&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;the User-ID agent itself can only&amp;nbsp;perform 3 functions:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;-provide user-to-ip mapping to the firewall by means of reading security logs, server sessions, netbios/WMI probing or API/syslog&lt;/P&gt;
&lt;P&gt;&amp;nbsp;-provide NTLM authentication through the AD it is installed on&lt;/P&gt;
&lt;P&gt;&amp;nbsp;-proxy LDAP authentication sessions&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;multiple firewalls can connect to the same user-ID agent&lt;/P&gt;
&lt;P&gt;multiple user-ID agents can serve a firewall&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 08:44:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166960#M53406</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-07-18T08:44:38Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP configuration Using User ID Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166984#M53407</link>
      <description>&lt;P&gt;Hello Reaper,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your comments, and our requirement is this one .&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;User&lt;/STRONG&gt;----&lt;EM&gt;Captive portal&lt;/EM&gt;--&amp;gt; &lt;STRONG&gt;Palo Alto&lt;/STRONG&gt; Firewall --&amp;gt;User ID agent&amp;nbsp;--&amp;gt; AD&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using windows based user id agent and its integrated to AD. And there is no other integration from PA firewall to AD through palo-alto agents. &lt;STRONG&gt;Our target is to achieve browser challenge with NTLM authentication using User ID agent &amp;nbsp;from PA firewall.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp; Specifically&amp;nbsp; the concerns are&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Is this suffice to integrate firewall with user id agent only and through this can we achieve NTLM authentication. That means there is no AD integration in firewall and only user id agent can being communicate to AD.&lt;/LI&gt;&lt;LI&gt;Do you have any document related to this ?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;·&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; The issue is that we have multiple firewalls and we don’t want every firewall to integrate with AD, rather than a centralized user id agent sounds good&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 11:08:39 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/166984#M53407</guid>
      <dc:creator>ymamis</dc:creator>
      <dc:date>2017-07-18T11:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP configuration Using User ID Agent</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/167049#M53416</link>
      <description>&lt;P&gt;have you read this article: &amp;nbsp; &lt;A title="Getting Started: User-ID " href="https://live.paloaltonetworks.com/t5/Featured-Articles/Getting-Started-User-ID/ta-p/69321" target="_blank"&gt;Getting Started: User-ID &lt;/A&gt;&amp;nbsp;?&lt;/P&gt;
&lt;P&gt;it covers all aspects of user-ID including NTLM.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;you will need to configure an ldap profile and enable LDAP proxy on the user-id agent, and also enable NTLM on the user-id agent. as soon as those 2 boxes are checked only the agent will communicate with the AD&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;to tie everything together you'll need to enable Captive Portal with ntlm policies&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="captive portal.png" style="width: 800px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/10451i251D689FEEF5CE29/image-size/large?v=v2&amp;amp;px=999" role="button" title="captive portal.png" alt="captive portal.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jul 2017 19:12:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/centralized-user-id-agent-to-all-firewalls-with-ad-integration/m-p/167049#M53416</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2017-07-18T19:12:19Z</dc:date>
    </item>
  </channel>
</rss>

