<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic LDAP Authentication - Parse error for maxPwdAge attr search in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/238797#M68397</link>
    <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to setup &lt;A href="https://www.paloaltonetworks.com/documentation/80/globalprotect/globalprotect-admin-guide/globalprotect-quick-configs/remote-access-vpn-with-pre-logon" target="_self"&gt;GlobalProtect with Prelogon&lt;/A&gt;, but I'm having trouble authenticating the user at the portal.&amp;nbsp; I'm trying to test just the user authentication with the Windows Server 2016 ActiveDirectory DC at 192.168.###.9.&amp;nbsp; Using the Pan-OS 8.0.13 CLI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;admin@fw-1&amp;gt; test authentication authentication-profile "Corp-LDAP" username "DOMAIN\username" password
Enter password :

Target vsys is not specified, user "DOMAIN\username" is assumed to be
 configured with a shared auth profile.

Do allow list check before sending out authentication request...
name "DOMAIN\username" is in group "all"

Authentication to LDAP server at 192.168.###.9 for user "DOMAIN\username"
Egress: 192.168.###.41
Type of authentication: plaintext
Starting LDAP connection...
Succeeded to create a session with LDAP server
Parse error for maxPwdAge attr search
Authentication failed against LDAP server at 192.168.###.9:389 for user "DOMAIN\username"


Authentication failed for user "DOMAIN\username"

admin@fw-1&amp;gt;&lt;/PRE&gt;&lt;P&gt;I haven't had much luck searching for "Parse error for maxPwdAge attr search".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I run &lt;A href="https://stackoverflow.com/a/13126461" target="_self"&gt;this script&lt;/A&gt; on the domain controller, it reports 42 days, so it seems that some reasonable data exists in the LDAP database.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Potentially noteworthy, when the DOMAIN\username user was created earlier today, I checked the account option "Password never expires".&amp;nbsp; Unchecking this option for this user doesn't change the output of the&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;test authentication authentication-profile "Corp-LDAP" username "DOMAIN\username" password&lt;/PRE&gt;&lt;P&gt;command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 07 Nov 2018 01:25:15 GMT</pubDate>
    <dc:creator>michaelprofinancial</dc:creator>
    <dc:date>2018-11-07T01:25:15Z</dc:date>
    <item>
      <title>LDAP Authentication - Parse error for maxPwdAge attr search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/238797#M68397</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;I'm trying to setup &lt;A href="https://www.paloaltonetworks.com/documentation/80/globalprotect/globalprotect-admin-guide/globalprotect-quick-configs/remote-access-vpn-with-pre-logon" target="_self"&gt;GlobalProtect with Prelogon&lt;/A&gt;, but I'm having trouble authenticating the user at the portal.&amp;nbsp; I'm trying to test just the user authentication with the Windows Server 2016 ActiveDirectory DC at 192.168.###.9.&amp;nbsp; Using the Pan-OS 8.0.13 CLI&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;admin@fw-1&amp;gt; test authentication authentication-profile "Corp-LDAP" username "DOMAIN\username" password
Enter password :

Target vsys is not specified, user "DOMAIN\username" is assumed to be
 configured with a shared auth profile.

Do allow list check before sending out authentication request...
name "DOMAIN\username" is in group "all"

Authentication to LDAP server at 192.168.###.9 for user "DOMAIN\username"
Egress: 192.168.###.41
Type of authentication: plaintext
Starting LDAP connection...
Succeeded to create a session with LDAP server
Parse error for maxPwdAge attr search
Authentication failed against LDAP server at 192.168.###.9:389 for user "DOMAIN\username"


Authentication failed for user "DOMAIN\username"

admin@fw-1&amp;gt;&lt;/PRE&gt;&lt;P&gt;I haven't had much luck searching for "Parse error for maxPwdAge attr search".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When I run &lt;A href="https://stackoverflow.com/a/13126461" target="_self"&gt;this script&lt;/A&gt; on the domain controller, it reports 42 days, so it seems that some reasonable data exists in the LDAP database.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Potentially noteworthy, when the DOMAIN\username user was created earlier today, I checked the account option "Password never expires".&amp;nbsp; Unchecking this option for this user doesn't change the output of the&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;test authentication authentication-profile "Corp-LDAP" username "DOMAIN\username" password&lt;/PRE&gt;&lt;P&gt;command.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2018 01:25:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/238797#M68397</guid>
      <dc:creator>michaelprofinancial</dc:creator>
      <dc:date>2018-11-07T01:25:15Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication - Parse error for maxPwdAge attr search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/238939#M68445</link>
      <description>&lt;P&gt;From your log output, it looks like the communication is probably plaintext (port 389 is rarely used for TLS). If that's true, you could take a packet capture of the communication between the firewall and DC.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/monitoring/take-packet-captures/take-a-packet-capture-on-the-management-interface" target="_blank"&gt;https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/monitoring/take-packet-captures/take-a-packet-capture-on-the-management-interface&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Check the LDAP response for "maxPwdAge" to see what the value is. It looks like the initial LDAP bind is failing, so you should be able to catch it there.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interestingly, Microsoft's&amp;nbsp;&lt;A href="https://docs.microsoft.com/en-us/windows/desktop/ADSchema/a-maxpwdage" target="_self"&gt;Max-Pwd-Age&lt;/A&gt;&amp;nbsp;site doesn't say how it should be represented on a 2016 server. I'm sure it exists, so you may want to check it out on the DC itself if the capture doesn't reveal any results.&lt;/P&gt;</description>
      <pubDate>Wed, 07 Nov 2018 18:41:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/238939#M68445</guid>
      <dc:creator>gwesson</dc:creator>
      <dc:date>2018-11-07T18:41:25Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication - Parse error for maxPwdAge attr search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/239268#M68514</link>
      <description>&lt;P&gt;I have recently receive similar error, trying to establish LDAP connection.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Interestingly the issues had nothing to do with this attribute. I already forgot what was actually the issue - I believe it was something with wrong bindDN (or pass).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So I would definately support the previous comment and encurage you to make a packet capture with filter your AD server as source and&amp;nbsp; destination. Plaintext LDAP is straight forward - you you wiill see bindRequest from the firewall, sending the username and the password, if successfull you should see success as reply.&lt;/P&gt;</description>
      <pubDate>Fri, 09 Nov 2018 11:27:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/239268#M68514</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2018-11-09T11:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication - Parse error for maxPwdAge attr search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/239335#M68539</link>
      <description>&lt;P&gt;Thanks gwesson (and Alexander),&lt;/P&gt;&lt;P&gt;I installed Wireshark on the domain controller (capture filter: tcp port 389, display filter: ldap), and the failure messages were much more useful, indicating that my Base DN was incorrect in the LDAP server profile (Device -&amp;gt; Server Profiles -&amp;gt; LDAP).&amp;nbsp; It now authenticates from the CLI using the&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;test authentication authentication-profile "Corp-LDAP" username "DOMAIN\username" password&lt;/PRE&gt;&lt;P&gt;command.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Let's say my domain name was internal.fabrikam.com.&lt;BR /&gt;(Does not authenticate) Base DN: DC=internal,DC=fabrikam,DC=com&lt;BR /&gt;(Authenticates) Base DN: ou=Domain Users,DC=internal,DC=fabrikam,DC=com&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now to figure out why the user still doesn't authenticate from the GlobalProtect portal despite authenticating from the CLI.&amp;nbsp; Back to wireshark&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the help!&lt;/P&gt;</description>
      <pubDate>Fri, 09 Nov 2018 20:05:48 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/239335#M68539</guid>
      <dc:creator>michaelprofinancial</dc:creator>
      <dc:date>2018-11-09T20:05:48Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication - Parse error for maxPwdAge attr search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/239778#M68691</link>
      <description>&lt;P&gt;I'm not sure why, but it now authenticates from the CLI using the original Base DN value, "DC=internal,DC=fabrikam,DC=com" using the same test command:&lt;/P&gt;&lt;PRE&gt;admin@fw-bby-in2net-1&amp;gt; test authentication authentication-profile "Corp-LDAP" username "DOMAIN\username" password
Enter password :

Target vsys is not specified, user "DOMAIN\username" is assumed to be
 configured with a shared auth profile.

Do allow list check before sending out authentication request...
name "DOMAIN\username" is in group "all"

Authentication to LDAP server at 192.168.XXX.9 for user "DOMAIN\username"
Egress: 192.168.XXX.41
Type of authentication: plaintext
Starting LDAP connection...
Succeeded to create a session with LDAP server
DN sent to LDAP server: CN=Bruce Wayne,OU=Domain Users,DC=internal,DC=fabrikam,DC=com
User expires in days: never

Authentication succeeded for user "DOMAIN\username"&lt;/PRE&gt;&lt;P&gt;However, I still haven't got the GlobalProtect Portal Login page to authenticate properly.&amp;nbsp; When I enter the same DOMAIN\username and password, I get "&lt;SPAN&gt;Authentication failed: Invalid username or password&lt;/SPAN&gt;".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the Wireshark capture on the AD domain controller when successfully attempting a login from the above test command (DOMAIN\Administrator is the Bind DN):&lt;/P&gt;&lt;PRE&gt;144	23173.464770	192.168.XXX.41	192.168.XXX.9	LDAP	118	bindRequest(1) "DOMAIN\Administrator" simple 
146	23174.367042	192.168.XXX.9	192.168.XXX.41	LDAP	88	bindResponse(1) success 
148	23174.367773	192.168.XXX.41	192.168.XXX.9	LDAP	155	searchRequest(2) "DC=internal,DC=fabrikam,DC=com" baseObject 
149	23174.367977	192.168.XXX.9	192.168.XXX.41	LDAP	190	searchResEntry(2) "DC=internal,DC=fabrikam,DC=com"  | searchResDone(2) success  [2 results]
150	23174.368603	192.168.XXX.41	192.168.XXX.9	LDAP	391	searchRequest(3) "DC=internal,DC=fabrikam,DC=com" wholeSubtree 
151	23174.410304	192.168.XXX.9	192.168.XXX.41	LDAP	651	searchResEntry(3) "CN=Bruce Wayne,OU=Domain Users,DC=internal,DC=fabrikam,DC=com"  | searchResRef(3)  | searchResRef(3)  | searchResRef(3)  | searchResDone(3) success  [2 results]
152	23174.420534	192.168.XXX.41	192.168.XXX.9	LDAP	161	bindRequest(4) "CN=Bruce Wayne,OU=Domain Users,DC=internal,DC=fabrikam,DC=com" simple 
153	23174.461876	192.168.XXX.9	192.168.XXX.41	LDAP	88	bindResponse(4) success 
154	23174.462549	192.168.XXX.41	192.168.XXX.9	LDAP	73	unbindRequest(5) &lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's the&amp;nbsp;full Wireshark capture on the AD domain controller when unsuccessfully attempting a login from the GlobalProtect Portal Login&amp;nbsp; page:&lt;/P&gt;&lt;PRE&gt;127	17631.999659	192.168.XXX.41	192.168.XXX.9	LDAP	118	bindRequest(1) "DOMAIN\Administrator" simple 
128	17632.003200	192.168.XXX.9	192.168.XXX.41	LDAP	88	bindResponse(1) success 
130	17632.004308	192.168.XXX.41	192.168.XXX.9	LDAP	155	searchRequest(2) "DC=internal,DC=fabrikam,DC=com" baseObject 
131	17632.004440	192.168.XXX.9	192.168.XXX.41	LDAP	190	searchResEntry(2) "DC=internal,DC=fabrikam,DC=com"  | searchResDone(2) success  [2 results]&lt;/PRE&gt;&lt;P&gt;Notice how there is the same bindRequest-bindResponse and the first searchRequest-searchResEntry, but subsequent messages are missing compared to the successful authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here's an excerpt from the authd.log when unsuccessfully attempting a login from GlobalProtect Portal Login:&lt;/P&gt;&lt;PRE&gt;admin@fw-1&amp;gt; tail mp-log authd.log
2018-11-13 22:37:50.679 -0800 debug: _process_user_info(pan_authd_shared_ldap.c:314): found LDAP attribute: maxPwdAge
2018-11-13 22:37:50.679 -0800 debug: _process_user_info(pan_authd_shared_ldap.c:358): AD : Got value maxPwdAge : 0 in 100 nanosecond intervals since January 1, 1601 (UTC)
2018-11-13 22:37:50.679 -0800 debug: pan_authd_ldap_authenticate(pan_authd_shared_ldap.c:1021): searching basedn "DC=internal,DC=fabrikam,DC=com" for filter "(sAMAccountName=DOMAIN\username)", attrs "framedIPAddress", LDAPp=0x1086d6c0
2018-11-13 22:37:50.679 -0800 Error:  _send_async_ldap_search(pan_authd_shared_ldap.c:666): Failed to search. filter (sAMAccountName=DOMAIN\username), attr[0] framedIPAddress. error code: -7, (Bad search filter)
2018-11-13 22:37:50.679 -0800 Error:  pan_authd_ldap_authenticate(pan_authd_shared_ldap.c:1027): send userdn search request
2018-11-13 22:37:50.679 -0800 Error:  _start_sync_auth(pan_auth_service_handle.c:626): sync request for user "DOMAIN\username" is failed or possibly timed out against 192.168.XXX.9:389 with 0th VOIDp=0x1086d6c0
2018-11-13 22:37:50.679 -0800 debug: pan_auth_response_process(pan_auth_state_engine.c:4270): auth status: auth state unknown
2018-11-13 22:37:50.679 -0800 debug: pan_auth_response_process(pan_auth_state_engine.c:4449): Authentication failed: &amp;lt;profile: "Corp-LDAP", vsys: "vsys1", username "DOMAIN\username"&amp;gt;
2018-11-13 22:37:50.679 -0800 failed authentication for user 'DOMAIN\username'.  Reason: Invalid username/password. auth profile 'Corp-LDAP', vsys 'vsys1', server profile 'internal.fabrikam', server address '192.168.XXX.9', From: AAA.BBB.CCC.DDD.
2018-11-13 22:37:50.680 -0800 debug: _log_auth_respone(pan_auth_server.c:263): Sent PAN_AUTH_FAILURE auth response for user 'DOMAIN\username' (exp_in_days=-1 (-1 never; 0 within a day))(authd_id: 6615420242061427090)
admin@fw-1&amp;gt;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;</description>
      <pubDate>Wed, 14 Nov 2018 17:29:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/239778#M68691</guid>
      <dc:creator>michaelprofinancial</dc:creator>
      <dc:date>2018-11-14T17:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication - Parse error for maxPwdAge attr search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/240057#M68762</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/101087"&gt;@michaelprofinancial&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You will always see the first bind request-response pair, this is requried for the firewall to bind to the AD first before sending any query.&lt;/P&gt;&lt;P&gt;Next step is to search the base of your AD (the baseDN, the top level from which it will start the search) for the provided username.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you open your wireshark for the unsuccessfull GP authentication and select searchRequest packet and dig into the LDAP you should see what filter the firewall is sending for the query. By default the PAN FW is using samAccountName, so your fillter will probably look like:&lt;BR /&gt;&lt;BR /&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Untitled.png" style="width: 562px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/17557i6ADB81AC0D67E520/image-dimensions/562x236/is-moderation-mode/true?v=v2" width="562" height="236" role="button" title="Untitled.png" alt="Untitled.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;I will make an assumption that in the filter you will actually see samAccountName=domain\username, which means that the firewall is not removing the "domain\" from the user input and sending the whole string. And logically the AD is sending empty search result, because you don't have such user.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I am right (I believe so as I had similar issue &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; ) you should try:&lt;/P&gt;&lt;P&gt;- to change the user input modifier under the authentication profile.&lt;/P&gt;&lt;P&gt;- Or if you don't use different domains and you are authenticating users only from one domain, you don't need to put prepent the "domain\" infront of your username and just put the username.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Nov 2018 20:43:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/240057#M68762</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2018-11-15T20:43:59Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication - Parse error for maxPwdAge attr search</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/240199#M68832</link>
      <description>&lt;P&gt;Thanks &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt;,&lt;BR /&gt;&lt;BR /&gt;With the unsuccessful GP authentication, there is:&lt;BR /&gt;1) the bindRequest-bindResponse pair and then&lt;BR /&gt;2) a searchRequest-searchResEntry with baseObject scope,&lt;/P&gt;&lt;P&gt;but no following searchRequest with wholeSubtree scope. &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I changed the user input modifier (as you suggested) for the Corp-LDAP authentication profile (Device-&amp;gt;Authentication Profile) from %USERDOMAIN%\%USERINPUT% to %USERINPUT%.&amp;nbsp; After that, my GP Portal logins authenticate successfully in addition to my CLI "test authentication authentication-profile ... username..." authentications.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My final task is to enable a certificate profile in the GP Gateway that can be used for &lt;A href="https://www.paloaltonetworks.com/documentation/80/globalprotect/globalprotect-admin-guide/globalprotect-quick-configs/remote-access-vpn-with-pre-logon" target="_self"&gt;prelogon&lt;/A&gt; and as a &lt;A href="https://www.paloaltonetworks.com/documentation/80/globalprotect/globalprotect-admin-guide/globalprotect-quick-configs/remote-access-vpn-with-two-factor-authentication" target="_self"&gt;second factor&lt;/A&gt;, basically combining the two configurations.&amp;nbsp; My initial efforts failed, but I may make a second post since this is probably independent of the LDAP authentication.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for all the help&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/70130"&gt;@aleksandar.astardzhiev&lt;/a&gt; and&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/28203"&gt;@gwesson&lt;/a&gt;.&amp;nbsp; Is there a way to accept multiple comments as a solution?&lt;/P&gt;</description>
      <pubDate>Fri, 16 Nov 2018 21:36:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-parse-error-for-maxpwdage-attr-search/m-p/240199#M68832</guid>
      <dc:creator>michaelprofinancial</dc:creator>
      <dc:date>2018-11-16T21:36:16Z</dc:date>
    </item>
  </channel>
</rss>

