<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PAN Firewall LDAP Authentication user handling in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/pan-firewall-ldap-authentication-user-handling/m-p/279946#M75793</link>
    <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so i've got a small "issue"/question regarding PAN Firewalls and LDAP User-Authentication handling.&lt;/P&gt;&lt;P&gt;I configured it like it is documented &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGuCAK" target="_self"&gt;here&lt;/A&gt;&lt;/P&gt;&lt;P&gt;My issue now is that when i add an Administrator, then delete the user from the Active-Directory group, the user is still able to log on even after the firewall refreshes the connection.&lt;/P&gt;&lt;P&gt;Am i doing something wrong here, or do i manually have to delete the user, from the firewall so he cant connect to it anymore?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
    <pubDate>Tue, 30 Jul 2019 08:32:28 GMT</pubDate>
    <dc:creator>christoph_oppelt</dc:creator>
    <dc:date>2019-07-30T08:32:28Z</dc:date>
    <item>
      <title>PAN Firewall LDAP Authentication user handling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-firewall-ldap-authentication-user-handling/m-p/279946#M75793</link>
      <description>&lt;P&gt;Hello Community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;so i've got a small "issue"/question regarding PAN Firewalls and LDAP User-Authentication handling.&lt;/P&gt;&lt;P&gt;I configured it like it is documented &lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGuCAK" target="_self"&gt;here&lt;/A&gt;&lt;/P&gt;&lt;P&gt;My issue now is that when i add an Administrator, then delete the user from the Active-Directory group, the user is still able to log on even after the firewall refreshes the connection.&lt;/P&gt;&lt;P&gt;Am i doing something wrong here, or do i manually have to delete the user, from the firewall so he cant connect to it anymore?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 08:32:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-firewall-ldap-authentication-user-handling/m-p/279946#M75793</guid>
      <dc:creator>christoph_oppelt</dc:creator>
      <dc:date>2019-07-30T08:32:28Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Firewall LDAP Authentication user handling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-firewall-ldap-authentication-user-handling/m-p/279967#M75799</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105853"&gt;@christoph_oppelt&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;For the user to actually be removed from the firewall, yes you would need to delete the account manually. However as long as the admin session had expired, I wouldn't expect that the user would actually be allowed to login unless your LDAP server was still giving the firewall the 0 response code. If the user account no longer exists you should be getting a 49 response and the firewall wouldn't auth the user.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;* I just saw that you said group. Have you tried ensuring that the group membership has actually updated on the firewall through the cli command 'show user group name &amp;lt;group&amp;gt;'. Otherwise the firewall will simply verify that the LDAP credentials are correct.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 10:40:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-firewall-ldap-authentication-user-handling/m-p/279967#M75799</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2019-07-30T10:40:35Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Firewall LDAP Authentication user handling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-firewall-ldap-authentication-user-handling/m-p/279968#M75800</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/105853"&gt;@christoph_oppelt&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Current versions doesn't support remote authorization for administrators using LDAP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/firewall-administration/manage-firewall-administrators/administrative-authentication.html#" target="_self"&gt;Administrative Authentication&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;&lt;STRONG&gt;The administrative accounts are defined on an external SAML, TACACS+, or RADIUS server. &lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;The server performs both authentication and authorization.&lt;/STRONG&gt;&lt;/PRE&gt;&lt;P&gt;For that reason as you have seen from the KB in order to authenticate admin via LDAP you need to localy (on the FW) create the username and set it to authenticate using the LDAP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Behind the scenes the firewall is try to made a bind request using the username and password provided during your login attempt. FW doesn't really care in what user group this user is configured in the AD. As long as you have provide valid username and password, the bind request will successed and you will be allowed to login.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;You actually have a "workaround" to tell the FW to try to authenticate only specific users.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When you are configuring the authentication profile, you can specify "allow list". This list will tell what users are allowed to authenticate using this profile. That way you can tell the FW you allow only users member of FW_admins user-group in the AD. This will mean that when you try to login there will be additional step:&lt;/P&gt;&lt;P&gt;- you type your username and password&lt;/P&gt;&lt;P&gt;- FW will check if the username you have provide is member of the that allow list&lt;/P&gt;&lt;P&gt;- If it is in this list, FW will again try to make bind request with provided username and password&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;So what you can do is on the step 2c from the guide instead of all you can list the user group or specific users&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 10:39:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-firewall-ldap-authentication-user-handling/m-p/279968#M75800</guid>
      <dc:creator>aleksandar.astardzhiev</dc:creator>
      <dc:date>2019-07-30T10:39:24Z</dc:date>
    </item>
    <item>
      <title>Re: PAN Firewall LDAP Authentication user handling</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/pan-firewall-ldap-authentication-user-handling/m-p/279979#M75802</link>
      <description>&lt;P&gt;Alright, thanks to both of you.&lt;/P&gt;&lt;P&gt;Guess i'll have to just live with it.&lt;/P&gt;</description>
      <pubDate>Tue, 30 Jul 2019 11:36:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/pan-firewall-ldap-authentication-user-handling/m-p/279979#M75802</guid>
      <dc:creator>christoph_oppelt</dc:creator>
      <dc:date>2019-07-30T11:36:35Z</dc:date>
    </item>
  </channel>
</rss>

