<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Binding to AD with globalprotect in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229051#M65839</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Ya depending on how you utilize that attribute in AD this can cause some issues going forward; many places will automatically disable accounts that haven't logged-in during a certain timeframe. Your only real option is to simply remind people that they need to login within 'x' days or move away from LDAP as the authentication method for GP.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 31 Aug 2018 18:33:07 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2018-08-31T18:33:07Z</dc:date>
    <item>
      <title>Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/228896#M65796</link>
      <description>&lt;P&gt;We have user accessing the globalprotect VPN using their AD account and we have userid enabled, but we do not see any evidence of the users in the AD domain controller, is that because GP is accessing the DC using a service account? Is there anyway to get the AD accounts to bind on the DC? We need these records for other things&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 14:37:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/228896#M65796</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-08-30T14:37:42Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/228954#M65806</link>
      <description>&lt;P&gt;What authentication are you using... is it ldap?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Aug 2018 19:39:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/228954#M65806</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-08-30T19:39:25Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229006#M65824</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&lt;/P&gt;&lt;P&gt;That is what it is setup for on the PA but i did not set it up and I have been told that the LDAP is used as a connector to AD. So LDAP connector AD authentication&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 12:51:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229006#M65824</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-08-31T12:51:37Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229011#M65826</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;Are you looking for like the 'last logon date' getting updated or something like that? That's not really going to work at all. When you auth with GlobalProtect the firewall is uing the ADs LDAP function to verify that the user and the password is correct; if that comes back as True then you are continue the login process.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Technically when you use LDAP you&amp;nbsp;&lt;STRONG&gt;aren't&lt;/STRONG&gt; actually 'logged in' as far as AD is concerned, that's just a function of how LDAP functions. The firewall is simply acting as a 'client' and whatever is hosting your LDAP service is acting as the 'Server'. The client connects to the server and basically asks "does user 'bpry' with password 'PaloAltoFakePass'" exist within the database. If the server responds 'Yup' then it'll let you login, if not then the process won't continue.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 13:54:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229011#M65826</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-08-31T13:54:20Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229012#M65827</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Correct that is what my colleague is&amp;nbsp; looking to have the last login date updated and there is no other way to do this that would give us that is there.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So LDAP is looking in AD to make sure that the user and password are correct? Is the userid showing up in the traffic logs because userid is enabled or something else?&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 14:06:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229012#M65827</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-08-31T14:06:01Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229020#M65829</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;If you login to GlobalProtect the firewall will by default record the source-user, as it verified the user internally and will automatically include this user in the user-id table.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 14:09:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229020#M65829</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-08-31T14:09:26Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229021#M65830</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Well I guess I am stuck with the way things are, the only users this really applies to are users who are soley using the VPN and never login locally I would say.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 14:12:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229021#M65830</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-08-31T14:12:19Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229051#M65839</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Ya depending on how you utilize that attribute in AD this can cause some issues going forward; many places will automatically disable accounts that haven't logged-in during a certain timeframe. Your only real option is to simply remind people that they need to login within 'x' days or move away from LDAP as the authentication method for GP.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 18:33:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229051#M65839</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-08-31T18:33:07Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229055#M65843</link>
      <description>&lt;P&gt;You could run a post GP logon script, they run auto when connected.&lt;/P&gt;&lt;P&gt;perhaps map the users home drive, this will force domain auth in the background, this will be recorded in the AD security log &amp;nbsp;and PA user id will pick this up....&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 18:40:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229055#M65843</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-08-31T18:40:00Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229057#M65845</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;That would work if this is a domain joined machine and you actually want to be mapping a drive. My assumption in a university enviroment would be that this is more of an issue with users that are using personal devices or home devices correct&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/18719"&gt;@jdprovine&lt;/a&gt;?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 18:41:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229057#M65845</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2018-08-31T18:41:15Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229059#M65847</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Yeah the real issue is with retirees that need to get on some of our internal site to do healthcare forms etc. so they are no longer using a domain joined pc but a personal one, but it was a good thought mickball&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 18:46:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229059#M65847</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-08-31T18:46:01Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229060#M65848</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes you are correct &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/43480"&gt;@BPry&lt;/a&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 18:46:58 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229060#M65848</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-08-31T18:46:58Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229062#M65850</link>
      <description>&lt;P&gt;Ok gotcha... thanks for the clarifimaca.. claricafatio.... clamicafati.. &amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks for letting me know.,!&lt;/P&gt;&lt;P&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 18:52:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229062#M65850</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2018-08-31T18:52:46Z</dc:date>
    </item>
    <item>
      <title>Re: Binding to AD with globalprotect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229064#M65852</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&lt;/P&gt;&lt;P&gt;LOL you crack me up mickball, I like the clamification of it all&lt;/P&gt;</description>
      <pubDate>Fri, 31 Aug 2018 18:58:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/binding-to-ad-with-globalprotect/m-p/229064#M65852</guid>
      <dc:creator>jdprovine</dc:creator>
      <dc:date>2018-08-31T18:58:17Z</dc:date>
    </item>
  </channel>
</rss>

