<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Kerberos SSO PAN-OS 7.0.1 in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/kerberos-sso-pan-os-7-0-1/m-p/273672#M75066</link>
    <description>&lt;P&gt;It started working when I&amp;nbsp; followed exactly what is described in the the KB: &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boBiCAI" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boBiCAI&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I had to move the user account (mapped to the fqdn) to the OU "Users" in order to avoid the password error.&lt;/P&gt;&lt;P&gt;Other point is: I was using the same account created for LDAP queries (And it is a Domain Admin account). When I created a new account and followed the procedure exactly how it is it worked.&lt;/P&gt;</description>
    <pubDate>Thu, 27 Jun 2019 20:26:29 GMT</pubDate>
    <dc:creator>Renan_Ribeiro</dc:creator>
    <dc:date>2019-06-27T20:26:29Z</dc:date>
    <item>
      <title>Kerberos SSO PAN-OS 7.0.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kerberos-sso-pan-os-7-0-1/m-p/3266#M2436</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;at the moment I'm trying to set up a SSO Auth with the Admin Web Interface (and Captive Portal). I set it up like the documentation of PAN-OS 7.0 told me. I tried different Crypto types but all with the same error.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1. Log in to the KDC and open a command prompt.&lt;/P&gt;&lt;P&gt;2. Enter the following command, where &amp;lt;principal_name&amp;gt;,&lt;/P&gt;&lt;P&gt;&amp;lt;password&amp;gt;, and &amp;lt;algorithm&amp;gt; are variables. The Kerberos&lt;/P&gt;&lt;P&gt;principal name and password are of the firewall, not the user.&lt;/P&gt;&lt;P&gt;ktpass /princ &amp;lt;principal_name&amp;gt; /pass&lt;/P&gt;&lt;P&gt;&amp;lt;password&amp;gt; /crypto &amp;lt;algorithm&amp;gt; /ptype&lt;/P&gt;&lt;P&gt;KRB5_NT_PRINCIPAL /out &amp;lt;file_name&amp;gt;.keytab&lt;/P&gt;&lt;P&gt;If the firewall is in Federal Information Processing&lt;/P&gt;&lt;P&gt;Standards (FIPS) or Common Criteria (CC) mode, the&lt;/P&gt;&lt;P&gt;algorithm must be aes128-cts-hmac-sha1-96 or&lt;/P&gt;&lt;P&gt;aes256-cts-hmac-sha1-96. Otherwise, you can also&lt;/P&gt;&lt;P&gt;use des3-cbc-sha1 or arcfour-hmac. To use an&lt;/P&gt;&lt;P&gt;Advanced Encryption Standard (AES) algorithm, the&lt;/P&gt;&lt;P&gt;functional level of the KDC must be Windows Server&lt;/P&gt;&lt;P&gt;2008 or later and you must enable AES encryption for&lt;/P&gt;&lt;P&gt;the firewall account.&lt;/P&gt;&lt;P&gt;The algorithm in the keytab must match the algorithm&lt;/P&gt;&lt;P&gt;in the service ticket that the TGS issues to clients. Your&lt;/P&gt;&lt;P&gt;Kerberos administrator determines which algorithms&lt;/P&gt;&lt;P&gt;the service tickets use.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I put the keytab file into the Authentication Profile. After the commit I see in the authd.log the following:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2015-07-31 08:54:02.468 +0200 debug: pan_auth_request_process(pan_auth_state_engine.c:1514): Receive request: msg type PAN_AUTH_SSO_AUTH, conv id 68, body length 235&lt;/P&gt;&lt;P&gt;2015-07-31 08:54:02.468 +0200 debug: _authenticate_sso(pan_auth_state_engine.c:281): Trying to auth sso: &amp;lt;profile: "", vsys: "", remotehost "", ticket size 66&amp;gt;&lt;/P&gt;&lt;P&gt;2015-07-31 08:54:02.468 +0200 debug: _krb_init_token_decode(pan_authd_kerberos_sso.c:1000): succeed to base64 decode service ticket&lt;/P&gt;&lt;P&gt;2015-07-31 08:54:02.469 +0200 debug: check_n_set_config_env_if_gone(pan_authd_kerberos_sso.c:170): got env KRB5_CONFIG = /opt/pancfg/mgmt/global/authd/krb5.config.**.**.**.1, no need to set it up&lt;/P&gt;&lt;P&gt;2015-07-31 08:54:02.469 +0200 debug: check_n_set_keytab_env_if_gone(pan_authd_kerberos_sso.c:199): got env KRB5_KTNAME = /opt/pancfg/mgmt/global/authd/krb5.keytab.**.**.**.1 (service principal HTTP/**.**.**.**), no need to set it up&lt;/P&gt;&lt;P&gt;2015-07-31 08:54:02.469 +0200 Error:&amp;nbsp; _dislay_gss_return_code(pan_authd_kerberos_sso.c:98): GSS_S_BAD_MECH&lt;/P&gt;&lt;P&gt;2015-07-31 08:54:02.469 +0200 Error:&amp;nbsp; _krb_accept_sec_context(pan_authd_kerberos_sso.c:1046): gss_accept_sec_context() : Unknown error&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2015-07-31 08:54:02.469 +0200 failed authentication for user ''.&amp;nbsp; Reason: Single-sign-on failed.&lt;/P&gt;&lt;P&gt;2015-07-31 08:54:02.471 +0200 debug: _log_auth_respone(pan_auth_server.c:240): Sent FAILED auth response for user '' (exp_in_days=-1 (-1 never; 0 within a day))&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did somebody get this to work? Is there a mistake in the documentation?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for any anwser.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kind regards&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Christoph&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 31 Jul 2015 07:07:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kerberos-sso-pan-os-7-0-1/m-p/3266#M2436</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2015-07-31T07:07:33Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos SSO PAN-OS 7.0.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kerberos-sso-pan-os-7-0-1/m-p/64388#M38620</link>
      <description>&lt;P&gt;I have the same problem. Did you ever find a solution for the same?&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2015 22:22:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kerberos-sso-pan-os-7-0-1/m-p/64388#M38620</guid>
      <dc:creator>EdwardWaithaka</dc:creator>
      <dc:date>2015-09-09T22:22:15Z</dc:date>
    </item>
    <item>
      <title>Re: Kerberos SSO PAN-OS 7.0.1</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/kerberos-sso-pan-os-7-0-1/m-p/273672#M75066</link>
      <description>&lt;P&gt;It started working when I&amp;nbsp; followed exactly what is described in the the KB: &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boBiCAI" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boBiCAI&lt;/A&gt;&lt;/P&gt;&lt;P&gt;I had to move the user account (mapped to the fqdn) to the OU "Users" in order to avoid the password error.&lt;/P&gt;&lt;P&gt;Other point is: I was using the same account created for LDAP queries (And it is a Domain Admin account). When I created a new account and followed the procedure exactly how it is it worked.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Jun 2019 20:26:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/kerberos-sso-pan-os-7-0-1/m-p/273672#M75066</guid>
      <dc:creator>Renan_Ribeiro</dc:creator>
      <dc:date>2019-06-27T20:26:29Z</dc:date>
    </item>
  </channel>
</rss>

