<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Problem with LDAP group usage in Authentication Profile in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/317768#M81665</link>
    <description>&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;I have a strange issue with LDAP groups in our PA-5220 setup.&lt;/P&gt;&lt;P&gt;Our setup is two HS-clusters with each containing two PA-5220. All of the devices are fully managed using Panorama. All of the firewalls are running 9.0.5 and Panorama is also of version 9.0.5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The configuration looks like this, I have configured a LDAP server object with all of our AD domain controllers, and set the "Base DN" to be the root of the domain. I have created a "&lt;EM&gt;Group mapping&lt;/EM&gt;" containing a group for testing. I have created a "&lt;EM&gt;LDAP Authentication Profile&lt;/EM&gt;" targeting the LDAP server configured earlier.&lt;/P&gt;&lt;P&gt;The problem is that the LDAP authentication only works if I have the "&lt;EM&gt;Allow list&lt;/EM&gt;" set to "All". If I specify the AD group either using the NetBIOS name/short name or the full DN name, authentication will fail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I from the console list, the users in the group using "&lt;EM&gt;show user group name&lt;/EM&gt;" all expected users are listed. If I test the Authentication Profile using the command "&lt;EM&gt;test authentication authentication-profile&lt;/EM&gt;" it works when the allow list is set to All, but not if I a LDAP group is specified. The test fails based on "Do allow list check before sending out authentication request".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked all of the KB I have been able to find and made sure that I for instance have all the LDAP paths in lower cases. I have compered it with another device with a working configuration, but at another company, but except for the paths and server names, everything is more or less the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClizCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClizCAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloqCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloqCAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What could be causing this issue? What to check next?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Johan Christensson&lt;/P&gt;</description>
    <pubDate>Fri, 20 Mar 2020 21:39:59 GMT</pubDate>
    <dc:creator>ess_johanchristensson</dc:creator>
    <dc:date>2020-03-20T21:39:59Z</dc:date>
    <item>
      <title>Problem with LDAP group usage in Authentication Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/317768#M81665</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;&lt;P&gt;I have a strange issue with LDAP groups in our PA-5220 setup.&lt;/P&gt;&lt;P&gt;Our setup is two HS-clusters with each containing two PA-5220. All of the devices are fully managed using Panorama. All of the firewalls are running 9.0.5 and Panorama is also of version 9.0.5.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The configuration looks like this, I have configured a LDAP server object with all of our AD domain controllers, and set the "Base DN" to be the root of the domain. I have created a "&lt;EM&gt;Group mapping&lt;/EM&gt;" containing a group for testing. I have created a "&lt;EM&gt;LDAP Authentication Profile&lt;/EM&gt;" targeting the LDAP server configured earlier.&lt;/P&gt;&lt;P&gt;The problem is that the LDAP authentication only works if I have the "&lt;EM&gt;Allow list&lt;/EM&gt;" set to "All". If I specify the AD group either using the NetBIOS name/short name or the full DN name, authentication will fail.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If I from the console list, the users in the group using "&lt;EM&gt;show user group name&lt;/EM&gt;" all expected users are listed. If I test the Authentication Profile using the command "&lt;EM&gt;test authentication authentication-profile&lt;/EM&gt;" it works when the allow list is set to All, but not if I a LDAP group is specified. The test fails based on "Do allow list check before sending out authentication request".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have checked all of the KB I have been able to find and made sure that I for instance have all the LDAP paths in lower cases. I have compered it with another device with a working configuration, but at another company, but except for the paths and server names, everything is more or less the same.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClizCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClizCAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloqCAC" target="_blank"&gt;https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000CloqCAC&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What could be causing this issue? What to check next?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;BR /&gt;Johan Christensson&lt;/P&gt;</description>
      <pubDate>Fri, 20 Mar 2020 21:39:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/317768#M81665</guid>
      <dc:creator>ess_johanchristensson</dc:creator>
      <dc:date>2020-03-20T21:39:59Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with LDAP group usage in Authentication Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/317970#M81697</link>
      <description>&lt;P&gt;is the dropdown in the authentication profile actually returning the group you want to use or do you need to enter it manually ? (if b, your ldap profile is not working)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;also pay VERY close attention to how your users are identified: in the group mapping are your users UPN or sAM ? (user@domain or domain\user) and if you leave the auth profile to all and the user is logged in, how is he/she identified, same as group mapping or different ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;if different, you need to fix the user-id group mapping so it maps users in the SAME format as the auth profile (you can force it to upn or sam)&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2020 12:24:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/317970#M81697</guid>
      <dc:creator>reaper</dc:creator>
      <dc:date>2020-03-23T12:24:34Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with LDAP group usage in Authentication Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/318348#M81743</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/7608"&gt;@reaper&lt;/a&gt;, thanks for your reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regarding the drop-down of LDAP groups, that depends if I try to configure this using Panorama or directly on the firewall. If using Panorama the drop-down doesn’t work, but if I go directly to the firewall it works.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In any case, your suggestion to pay close attention to how the users are identified. If I look in the monitor of users that are connected while the "Allow list" is set to "All", they are identified as “domain\username”. If I try my test LDAP Authentication profile and enter my name as domain/username the authentication works, even if I change "All" to a LDAP Group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But this kind of makes me wonder about the "Username modifier". If I have entered the correct "User domain" and I set the "Username modifier" to "%USERDOMAIN%\%USERINPUT%", shouldn’t this mean that if I try with just username, the domain name would automatically be added transform it into “domain\username”? This does not seem to be happening.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If a on the LDAP Authentication profile that is actually being used for the GP configuration change the “Username modifier” change it from “%USERINPUT%" to "%USERDOMAIN%\%USERINPUT%" I cannot logon to the GP Portal any more. Doesn’t make any difference if I enter it as “domain\username” or “username”. If I change it back to being “%USERINPUT%” it works again if I enter “username” but not “domain\username”.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I fail to see to red thread in this.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2020 23:06:36 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/318348#M81743</guid>
      <dc:creator>ess_johanchristensson</dc:creator>
      <dc:date>2020-03-24T23:06:36Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with LDAP group usage in Authentication Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/326257#M83154</link>
      <description>&lt;P&gt;This issue have been put to the side for a while, but I decided to look into it again.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can get this to work, filtering users based on group membership if the configuration is applied on the local cluster. But when the same configuration is applied though Panorama I cannot get it to work. And I have tested all variations I can think of, but the pattern is the same. A configuration that works on the local cluster will not work when applied trough Panorama.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The good news is that the "user filtering" on at least policy still seems works, even if the rule is configured though Panorama.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But my question here is: Is this "by design" or is this a bug?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2020 22:36:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/326257#M83154</guid>
      <dc:creator>ess_johanchristensson</dc:creator>
      <dc:date>2020-05-05T22:36:22Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with LDAP group usage in Authentication Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/346694#M86539</link>
      <description>&lt;P&gt;hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have the same problem.&lt;/P&gt;&lt;P&gt;Tryed to get functionnal global protect with ldap auth (ad) by filtering with "advanced/allow list" in "device/authentication profiles"&lt;/P&gt;&lt;P&gt;Works fine if set-up localy on my devices but not when pushed via panorama.&lt;/P&gt;&lt;P&gt;i lost one day to do many tests to try to do it functionnal but nothing and i don't want set it up locally.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;IS someone did the trick ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;panorama and panos on 9.4&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Sep 2020 16:07:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/346694#M86539</guid>
      <dc:creator>Mazarine</dc:creator>
      <dc:date>2020-09-03T16:07:54Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with LDAP group usage in Authentication Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/426049#M94428</link>
      <description>&lt;P&gt;Hi&lt;/P&gt;&lt;P&gt;Do you find any solution on this issue?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;br&lt;/P&gt;</description>
      <pubDate>Wed, 11 Aug 2021 08:56:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/426049#M94428</guid>
      <dc:creator>YordanYordanov</dc:creator>
      <dc:date>2021-08-11T08:56:12Z</dc:date>
    </item>
    <item>
      <title>Re: Problem with LDAP group usage in Authentication Profile</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/487052#M104678</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have you checked your User-ID master device for your template stack?&lt;/P&gt;&lt;P&gt;You can do this by going to Panorama &amp;gt; Templates &amp;gt; select template stack and then select the active firewall as the master.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Commit the config to Panorama&lt;/P&gt;</description>
      <pubDate>Fri, 13 May 2022 10:38:15 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/problem-with-ldap-group-usage-in-authentication-profile/m-p/487052#M104678</guid>
      <dc:creator>mhartyeos</dc:creator>
      <dc:date>2022-05-13T10:38:15Z</dc:date>
    </item>
  </channel>
</rss>

