<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP auth for the WEB UI access clarification in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282554#M76105</link>
    <description>&lt;P&gt;Palo Alto uses a more secure mentality for the Admin users on the firewalls. Calling out the users specificly is a lot more secure they refrenceing an AD group. Anyone with the right AD privlages could modify the AD group and give themselves superuser access to the firewalls.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 13 Aug 2019 19:25:38 GMT</pubDate>
    <dc:creator>Mark_Brook</dc:creator>
    <dc:date>2019-08-13T19:25:38Z</dc:date>
    <item>
      <title>LDAP auth for the WEB UI access clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282534#M76103</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why do we need step 3 mentioned in the KB below for the WB UI authentication with LDAP?:&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGuCAK" target="_blank" rel="noopener"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClGuCAK&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="LDAP.PNG" style="width: 748px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/20995i0E7FF0945AC98ACB/image-size/large/is-moderation-mode/true?v=v2&amp;amp;px=999" role="button" title="LDAP.PNG" alt="LDAP.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Why do we need to create a local user? Won't Palo be an LDAP proxy (grabbing username/password and verifying it against LDAP server database)?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 19:22:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282534#M76103</guid>
      <dc:creator>myky</dc:creator>
      <dc:date>2019-08-13T19:22:05Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth for the WEB UI access clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282554#M76105</link>
      <description>&lt;P&gt;Palo Alto uses a more secure mentality for the Admin users on the firewalls. Calling out the users specificly is a lot more secure they refrenceing an AD group. Anyone with the right AD privlages could modify the AD group and give themselves superuser access to the firewalls.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 19:25:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282554#M76105</guid>
      <dc:creator>Mark_Brook</dc:creator>
      <dc:date>2019-08-13T19:25:38Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth for the WEB UI access clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282555#M76106</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/102857"&gt;@Mark_Brook&lt;/a&gt;&amp;nbsp; thanks, it makes sense. So what is PA actually verifying, just AD membership group and not username/password?&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 19:37:55 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282555#M76106</guid>
      <dc:creator>myky</dc:creator>
      <dc:date>2019-08-13T19:37:55Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth for the WEB UI access clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282556#M76107</link>
      <description>&lt;P&gt;Its verifying Username(both places), Password, and if you configured a group in your Ldap profile it will do that as well.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 19:37:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282556#M76107</guid>
      <dc:creator>Mark_Brook</dc:creator>
      <dc:date>2019-08-13T19:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth for the WEB UI access clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282557#M76108</link>
      <description>&lt;P&gt;Cool, so the local user is another (additional) check as you mentioned earlier. Thanks.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Aug 2019 19:41:09 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282557#M76108</guid>
      <dc:creator>myky</dc:creator>
      <dc:date>2019-08-13T19:41:09Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth for the WEB UI access clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282716#M76132</link>
      <description>&lt;P&gt;Palo Alto only has this requirment for LDAP Authentication only when managing the device.&amp;nbsp; You can use a RADIUS server with RADIUS authentication profile to allow management by AD group, and that works fine, so if you have Microsoft IAS, or other RADIUS server, that will work for allowing a group to authenticate to the firewall and/or panorama.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 13:54:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282716#M76132</guid>
      <dc:creator>BrandonWright</dc:creator>
      <dc:date>2019-08-14T13:54:40Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth for the WEB UI access clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282717#M76133</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/36251"&gt;@BrandonWright&lt;/a&gt;&amp;nbsp; this now clear as day (but not a typical day in UK &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Aug 2019 13:59:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/282717#M76133</guid>
      <dc:creator>myky</dc:creator>
      <dc:date>2019-08-14T13:59:16Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth for the WEB UI access clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/1227379#M124100</link>
      <description>&lt;P&gt;Do you have a reference for this.&amp;nbsp; Why would palo do this only for LDAP?&amp;nbsp; &amp;nbsp;Extremely annoying moving from tacacs to ldap.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Apr 2025 19:33:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/1227379#M124100</guid>
      <dc:creator>AustinClark</dc:creator>
      <dc:date>2025-04-24T19:33:38Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP auth for the WEB UI access clarification</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/1228486#M124224</link>
      <description>&lt;P&gt;Because LDAP server doesn't send back admin role so you can't do authorization with LDAP server.&lt;/P&gt;</description>
      <pubDate>Thu, 08 May 2025 12:48:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-auth-for-the-web-ui-access-clarification/m-p/1228486#M124224</guid>
      <dc:creator>santonic</dc:creator>
      <dc:date>2025-05-08T12:48:46Z</dc:date>
    </item>
  </channel>
</rss>

