<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Cli command to test Authentication Profile requiring exact match in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214284#M62281</link>
    <description>&lt;P&gt;Hi Luke&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Group-mapping is in place; that user (*domain\username) appears (when I run &amp;gt; show user user-ids) as a member of the correct group (the one named in the Auth profile), so its not that its not up to date.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can run the command with &amp;gt; test authentication authentication-profile username *domain\username&amp;nbsp; &amp;nbsp; or just *username - and unless that specific username is listed in the Auth profile Allow lIst the auth test fails. The fact they are a member of that group (as prove by '&lt;SPAN&gt;&amp;gt; show user user-ids' output proves) doesn't seem to be taken inot account.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To answer your question- yes; either long name or short name (&lt;SPAN&gt;*domain\username or&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN&gt;*username)&amp;nbsp;&lt;/SPAN&gt;in the Allow List works the same&amp;nbsp; (my Auth Profile is set ot append it automatically) .&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 15 May 2018 09:55:08 GMT</pubDate>
    <dc:creator>OneAmongMany</dc:creator>
    <dc:date>2018-05-15T09:55:08Z</dc:date>
    <item>
      <title>Cli command to test Authentication Profile requiring exact match</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214265#M62276</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hey All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;While working a support case for a customer, I've come accross an odd situation and before I go log to Palo TAC I wondered if anyone else had seen this/was aware of it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So Authentication profile configured with an allow list restricted for one LDAP group. I can use that Auth Policy in say GlobalProtect and sure enough- only users who are members of that group can connect to the portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; show user user-ids all&lt;/P&gt;&lt;P&gt;-shows the list of users pulled in by User/Group mapping (so the firewall knows a user is in that group), but when I run;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; test authentication authentication-profile X username Y ...etc.etc.&lt;/P&gt;&lt;P&gt;- this always fails ("User Y is not allowed with Authentication Profile X"), unless I include the specific username in the allow list in the Auth Profile, or I allow 'All'. With and without appending domain info - same result.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking at the documentation available - all examples of testing an Auth Profile using LDAP, matches the group 'All'&lt;BR /&gt;(e.g &lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/cli-gsg/use-the-cli/test-the-configuration/test-the-authentication-configuration" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/cli-gsg/use-the-cli/test-the-configuration/test-the-authentication-configuration&lt;/A&gt;&lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"Do allow list check before sending out authentication request...&lt;BR /&gt;name "bzobrist" is in group "all" ..."&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;(its never a restricted LDAP group)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I did see here :&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/web-interface-help/device/device-authentication-profile/configure-an-authentication-profile" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/web-interface-help/device/device-authentication-profile/configure-an-authentication-profile&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;-that "Because you cannot configure the firewall to modify the domain/username string that a user enters during SAML logins, the login username must exactly match an Allow Listentry."&lt;/P&gt;&lt;P&gt;I am seeing this behaviour with LDAP, both in the customer's environment and I have replicated it simply enough in our lab.&lt;/P&gt;&lt;P&gt;Anyone restricted an Auth Profile to an LDAP group and then been able to run the '&amp;gt;test authentication...' cli command&amp;nbsp; and have it work?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Many Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 07:57:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214265#M62276</guid>
      <dc:creator>OneAmongMany</dc:creator>
      <dc:date>2018-05-15T07:57:26Z</dc:date>
    </item>
    <item>
      <title>Re: Cli command to test Authentication Profile requiring exact match</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214275#M62278</link>
      <description>&lt;P&gt;Do you get the same behavior if you add both the long and short group name to the allow list?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Considering the default group mapping refresh interval (default 60 minutes) you ,may need to initiate a manual group mapping refresh via:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;debug user-id refresh group-mapping all&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 08:47:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214275#M62278</guid>
      <dc:creator>LukeBullimore</dc:creator>
      <dc:date>2018-05-15T08:47:48Z</dc:date>
    </item>
    <item>
      <title>Re: Cli command to test Authentication Profile requiring exact match</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214284#M62281</link>
      <description>&lt;P&gt;Hi Luke&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Group-mapping is in place; that user (*domain\username) appears (when I run &amp;gt; show user user-ids) as a member of the correct group (the one named in the Auth profile), so its not that its not up to date.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can run the command with &amp;gt; test authentication authentication-profile username *domain\username&amp;nbsp; &amp;nbsp; or just *username - and unless that specific username is listed in the Auth profile Allow lIst the auth test fails. The fact they are a member of that group (as prove by '&lt;SPAN&gt;&amp;gt; show user user-ids' output proves) doesn't seem to be taken inot account.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;To answer your question- yes; either long name or short name (&lt;SPAN&gt;*domain\username or&amp;nbsp;&lt;/SPAN&gt; &lt;SPAN&gt;*username)&amp;nbsp;&lt;/SPAN&gt;in the Allow List works the same&amp;nbsp; (my Auth Profile is set ot append it automatically) .&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Alex&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 09:55:08 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214284#M62281</guid>
      <dc:creator>OneAmongMany</dc:creator>
      <dc:date>2018-05-15T09:55:08Z</dc:date>
    </item>
    <item>
      <title>Re: Cli command to test Authentication Profile requiring exact match</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214285#M62282</link>
      <description>&lt;P&gt;According to &lt;STRONG&gt;&lt;A href="https://live.paloaltonetworks.com/t5/Management-Articles/GlobalProtect-Login-Fails-When-Using-a-Group-in-the-Allow-List/tac-p/194754#M4990" target="_blank"&gt;this&lt;/A&gt;&lt;/STRONG&gt; post it is/was a bug, the &lt;EM&gt;'&lt;/EM&gt;&lt;SPAN&gt;&lt;EM&gt;test authentication authentication-profile'&lt;/EM&gt;&amp;nbsp;&lt;/SPAN&gt;command does not work properly.&lt;BR /&gt;Unfortunately there is no bug ID mentioned and I do not know if it is already fixed or not.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 May 2018 11:02:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214285#M62282</guid>
      <dc:creator>JBal</dc:creator>
      <dc:date>2018-05-15T11:02:07Z</dc:date>
    </item>
    <item>
      <title>Re: Cli command to test Authentication Profile requiring exact match</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214288#M62283</link>
      <description>&lt;P&gt;Thanks Bud!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Glad its not just me.!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;****Edited****&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OK, so there is a confirmed bug with the test command:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;gt; test authentication authentiocation-profile...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;resulting in the following error:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;SPAN&gt;Allow list check error:&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;Target vsys is not specified, user "silentbob" is assumed to be configured with a shared auth profile.&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;Do allow list check before sending out authentication request...&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;User Administrator is not allowed with authentication profile LDAP"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(membership of LDAP groups is ignored in the authentication profile allow list).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Its registered under&amp;nbsp;PAN-80160 - but this is not publicly documented (not in Limitations or known issues of 8.0).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Hopefully search engines will bring people here.... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;The bug is resolved in 8.1&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 28 May 2018 10:01:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/cli-command-to-test-authentication-profile-requiring-exact-match/m-p/214288#M62283</guid>
      <dc:creator>OneAmongMany</dc:creator>
      <dc:date>2018-05-28T10:01:14Z</dc:date>
    </item>
  </channel>
</rss>

