<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User authentication - Global Protect in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1076#M836</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, I know the LDAP server is working because if I add individual users into the "allow" list one at a time, they authenticate properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It just won't enumerate the group members.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can work around it, but I'd really like to know WHY I can't use an AD group membership for authentication.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sun, 23 Sep 2012 20:32:29 GMT</pubDate>
    <dc:creator>darren_g</dc:creator>
    <dc:date>2012-09-23T20:32:29Z</dc:date>
    <item>
      <title>User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1067#M827</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;HI.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm pre-staging a couple of PA2020's (active/passive), and am having an issue with getting authentication via AD working for Global Protect through Active Directory.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I can tell, the LDAP configuration is correct - the firewall connects to the agent, and gets a list of users from the groups I have configured to be allowed - but every time I try to login to the portal, it fails, and I get the following log entries&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;TABLE class="log" style="width: 100%;"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;GlobalProtect portal user authentication failed. Login from: XXX.XXX.XXX.XXX, User name: domain\first.last, Reason: Authentication failed: Invalid username or password .&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;09/21 12:05:38&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;User 'domain\first.last' failed authentication. Reason: Invalid username/password From: XXX.XXX.XXX.XXX.&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;09/21 12:05:38&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;(I've sanitized the actual details, obviously).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I *know* the user is in the AD group which is in the allowed list - a CLI query shows the following output&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;admin@Gate(active)&amp;gt; show user group name domain\vpn-users&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;group short name: domain\vpn-users&lt;/P&gt;&lt;P&gt;[11&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; ] domain\first.last&lt;/P&gt;&lt;TABLE&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can anyone suggest where I might be going wrong? I've tried every possible combination/form of username, and I know I'm using the correct password - is there any way from the CLI to try and verify what is going wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 02:20:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1067#M827</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2012-09-21T02:20:56Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1068#M828</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Did you actually create an authentication profile and use this in the gp configuration ? I believe your authentication profile settings might not be correct. You can create an authentication profile as shown for the users like in the below pic and can use the same in the gp&amp;nbsp; config. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="dddCapture.PNG" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4110_dddCapture.PNG" width="450" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 02:31:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1068#M828</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-09-21T02:31:04Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1069#M829</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I have created an Authentication Profile. Picture shown below&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="auth_profile.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4118_auth_profile.jpg" width="450" /&gt;&lt;/P&gt;&lt;P&gt;I couldn't commit the GP setup until I had it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The GP is setup as follows&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Gateway Config&lt;/P&gt;&lt;P&gt;&lt;IMG alt="gateway-config.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4119_gateway-config.jpg" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Portal config&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG alt="portal_config.jpg" class="jive-image-thumbnail jive-image" src="https://live.paloaltonetworks.com/legacyfs/online/4120_portal_config.jpg" width="450" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm open to other suggestions.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 02:42:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1069#M829</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2012-09-21T02:42:33Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1070#M830</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P style="font-style: inherit; font-family: inherit;"&gt;If you believe the configuration is correct. From the CLI you can verify the whole authentication process from the logs. While you are trying to connect via gp and doing authentication, please open a cli session run the below command and look for the information in this log.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-style: inherit; font-family: inherit;"&gt;"tail follow yes mp-log authd.log"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="font-style: inherit; font-family: inherit;"&gt;You can actually look the firewall sending the authentication requests to LDAP server for the gp users and LDAP server replying back with the results.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 02:50:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1070#M830</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-09-21T02:50:07Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1071#M831</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;OK, I did that, and got the following output.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sep 21 13:37:48 pan_authd_service_req(pan_authd.c:2604): Authd:Trying to remote authenticate user: domain\darren.gibbs&lt;/P&gt;&lt;P&gt;Sep 21 13:37:48 pan_authd_service_auth_req(pan_authd.c:1115): AUTH Request &amp;lt;'vsys1','VPNUsers','domain\darren.gibbs'&amp;gt;&lt;/P&gt;&lt;P&gt;Sep 21 13:37:48 Error: pan_authd_get_sysd_multivsys(pan_authd.c:3527): failed to fetch: NO_MATCHES&lt;/P&gt;&lt;P&gt;Sep 21 13:37:48 pan_authd_common_authenticate(pan_authd.c:1511): Authenticating user using service /etc/pam.d/pan_ldap_vsys1_:v:p:n:users_0,username domain\darren.gibbs&lt;/P&gt;&lt;P&gt;Sep 21 13:37:48 pan_authd_authenticate_service(pan_authd.c:663): authentication failed (6)&lt;/P&gt;&lt;P&gt;Sep 21 13:37:48 pan_authd_common_authenticate(pan_authd.c:1531): Authenticating user using service /etc/pam.d/pan_ldap_vsys1_:v:p:n:users_0,username domain\darren.gibbs failed - trying other hosts&lt;/P&gt;&lt;P&gt;Sep 21 13:37:48 pan_authd_common_authenticate(pan_authd.c:1506): Skipping LDAP server due to missing Auth-Profile: pan_ldap_vsys1_:v:p:n:users_1&lt;/P&gt;&lt;P&gt;Sep 21 13:37:48 pan_authd_common_authenticate(pan_authd.c:1506): Skipping LDAP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now, the errors tell me there's obviously something wrong - but I can't figure out what. I'm sure it's something simple, but I'm stuffed if I know what.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Any ideas will be tried.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 03:40:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1071#M831</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2012-09-21T03:40:19Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1072#M832</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just had a thought.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What path are these authentication requests passed through? The management interface, or the actual dataplane interface? I have the management interface connected and able to talk to the domain controller, but the dataplane interfaces are only connected to dummy ports on a stand-alone switch (to bring them up), they're not actually connected to the live network.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could this be causing the problem, or would the authentication be handled over the management interface?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 03:55:35 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1072#M832</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2012-09-21T03:55:35Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1073#M833</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The authentication requests to domain controller are passed through the mgmt interface. Just curious, you said you have the data plane interfaces connected to dummy interfaces&amp;nbsp; ? then how are the gp clients connecting to the firewall ? &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://live.paloaltonetworks.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;From the previous logs I see that the actual user information is being sent to the LDAP server and it seems like the server is not able to match the user info.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 04:10:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1073#M833</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-09-21T04:10:28Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1074#M834</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;There are no "clients" - there is one "client" - me. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; I've plugged my laptop direct into the "outside" interface and assigned it my Internet router's IP address, so it's "pretending" to be the Internet.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The source packet is coming from an external address, so the firewall just sees the client as another outside IP.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I don't know how the server is not matching the username - I can list the users in the group from the CLI, and the username I'm entering is in the group.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Is there some way to debug the agent on the server which might shed some light?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Message was edited by: Darren Gibbs&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 04:13:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1074#M834</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2012-09-21T04:13:49Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1075#M835</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We can try these things and see if it helps&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) One the LDAP server you can go to security events of the server and look out for the login auth tickets and see if the server is actually getting the LDAP queries from the firewall, if so the reason for the denial of the user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the below document you can the actual event IDs for logon/log off events on the windows server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A _jive_internal="true" href="https://live.paloaltonetworks.com/docs/DOC-1262"&gt;https://live.paloaltonetworks.com/docs/DOC-1262&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) We can try removing the LDAP filter for users in the authentication profile and allow all users temporarily and authenticate see if that works.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 21 Sep 2012 07:39:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1075#M835</guid>
      <dc:creator>sdurga</dc:creator>
      <dc:date>2012-09-21T07:39:21Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1076#M836</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Well, I know the LDAP server is working because if I add individual users into the "allow" list one at a time, they authenticate properly.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It just won't enumerate the group members.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can work around it, but I'd really like to know WHY I can't use an AD group membership for authentication.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 23 Sep 2012 20:32:29 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1076#M836</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2012-09-23T20:32:29Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1077#M837</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We have a comparable issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What I see is that when i login to global protect using a domain user domain\user and then look at the traffic logs I only see user&lt;/P&gt;&lt;P&gt;When I use rules from the globalprotect zone to the network using domain\group names they do not work. If i add user they work. In other zones adding user does not work because I have to add domain\user.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Did you ever get this sorted out ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 13:46:57 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1077#M837</guid>
      <dc:creator>seniornwb</dc:creator>
      <dc:date>2013-01-23T13:46:57Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1078#M838</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yeah, I got it right eventually.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It was a rather contorted process, and the documentation I found is somewhat dated and doesn't apply properly to current versions, but with some help from people here I got it working.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It came down to two configuration options I had wrong&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the LDAP server profile, you need to make sure you have your domain in the "Domain" section of the configuration - the documentation indicated I could leave that blank, but this is *not* the case.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In the Authentication profile group list, you need to enter your group in domain\group format, not in DN string format (which the firewall defaults to) - so instead of cn=&amp;lt;group&amp;gt;,dc=&amp;lt;domain&amp;gt;,dc=&amp;lt;suffix&amp;gt; format you need to put domain\group - you will likely need to manually enter this in the correct format.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There's a whole bunch of CLI troubleshooting you can do - if you can't get it working, do a search on discussions started by me with the title "LDAP Authentication not matching user groups", and you should find more hints.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Cheers.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Jan 2013 21:48:10 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/1078#M838</guid>
      <dc:creator>darren_g</dc:creator>
      <dc:date>2013-01-23T21:48:10Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication - Global Protect</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/429231#M94850</link>
      <description>&lt;P&gt;I'm also facing same issue. When I have call specific user group in authentication profile and after that called in global protect portal and gateway but at time of login in gp then showing invalid user name and password showing logs login failed,But If i called all user in authentication profile then login successful showing.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have use user id tefreash group mapping all command then check users in group showing my 45 users in group.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please suggest me solution&lt;/P&gt;</description>
      <pubDate>Wed, 25 Aug 2021 18:48:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/user-authentication-global-protect/m-p/429231#M94850</guid>
      <dc:creator>SurajN</dc:creator>
      <dc:date>2021-08-25T18:48:17Z</dc:date>
    </item>
  </channel>
</rss>

