<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Invalid username/password with LDAP for Captive Portal in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/invalid-username-password-with-ldap-for-captive-portal/m-p/11874#M8722</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I'd completed this, as per one of the other articles (didn't read the small print when I was originally setting it up).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, it's now working, removing and putting the configuration must have got me most of the way there, but I just rechecked the LDAP configuration as you outlined to check and noticed that SSL was ticked, which is something I must have missed during the re-inputting (previously unticked, and running on port 389, and not 636 for SSL).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I unchecked this and it's now working. Not sure if it was related, but I originally setup the auth profile with spaces in the names until I read another article about PanOS not supporting that (but allowing you to put it anyway), and changed the profile name to without spaces. As already mentioned, maybe removing it all and starting from scratch is the answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your input&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 26 Mar 2013 13:27:16 GMT</pubDate>
    <dc:creator>johndickson</dc:creator>
    <dc:date>2013-03-26T13:27:16Z</dc:date>
    <item>
      <title>Invalid username/password with LDAP for Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/invalid-username-password-with-ldap-for-captive-portal/m-p/11872#M8720</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Running a PA-500 on software version 5.0.2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was wondering if anyone could point me in the right direction, I'm trying to get a captive portal working that using LDAP groups to provide access through the policy.&lt;/P&gt;&lt;P&gt;The LDAP servers are configured ok, as I can browse the OUs and add the necessary CNs, and if I run the show user group name "cn=groupname,dc=domain,dc=local" if works, meaning that bind username and LDAP setup must be fine. The captive portal works fine if I use the local db.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The LDAP auth profile is setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Name : name_with_no_spaces&lt;/P&gt;&lt;P&gt;Allow List : all&lt;/P&gt;&lt;P&gt;Authentication : LDAP&lt;/P&gt;&lt;P&gt;Server Profile : LDAPAccounts&lt;/P&gt;&lt;P&gt;Login Attribute : sAMAccountName&lt;/P&gt;&lt;P&gt;Password Expiry Warning : 7&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I've had a look through &lt;A __default_attr="4417" __jive_macro_name="document" class="jive_macro jive_macro_document" href="https://live.paloaltonetworks.com/"&gt;&lt;/A&gt; and I've verified that the bind account is fine, as I've changed the password and can see the Group Mapping refresh failing so reverted it back, the LDAP servers are reachable (otherwise I wouldn't be able to browse the OUs in the group mapping), and the user does exist as it's my account which I use day to day.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As per &lt;A href="https://live.paloaltonetworks.com/message/11333"&gt;Captive Portal with LDAP&lt;/A&gt; I tried recreating it all again from scratch and still no joy.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The authd.log shows (username, domain and IP changed to generic)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_service_req(pan_authd.c:3310): Authd:Trying to remote authenticate user: user1&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_service_auth_req(pan_authd.c:1186): AUTH Request &amp;lt;'vsys1','DomainAuthProfile','user1'&amp;gt;&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_common_authenticate(pan_authd.c:1646): Authenticating user using service /etc/pam.d/pan_ldap_vsys1_:core:auth:profile_0,username domain\user1&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_authenticate_service(pan_authd.c:665): authentication failed (6)&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_common_authenticate(pan_authd.c:1669): Authenticating user using service /etc/pam.d/pan_ldap_vsys1_:core:auth:profile_0,username domain\user1 failed - trying other hosts&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_common_authenticate(pan_authd.c:1646): Authenticating user using service /etc/pam.d/pan_ldap_vsys1_:core:auth:profile_1,username domain\user1&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_authenticate_service(pan_authd.c:665): authentication failed (6)&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_common_authenticate(pan_authd.c:1669): Authenticating user using service /etc/pam.d/pan_ldap_vsys1_:core:auth:profile_1,username domain\user1 failed - trying other hosts&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_common_authenticate(pan_authd.c:1641): Skipping LDAP server due to missing Auth-Profile: pan_ldap_vsys1_:core:auth:profile_2&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_common_authenticate(pan_authd.c:1641): Skipping LDAP server due to missing Auth-Profile: pan_ldap_vsys1_:core:auth:profile_3&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 authentication failed for user &amp;lt;vsys1,DomainAuthProfile,domain\user1&amp;gt;&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_process_authresult(pan_authd.c:1366): pan_authd_process_authresult: domain\user1 authresult not auth'ed&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_process_authresult(pan_authd.c:1409): Alarm generation set to: False.&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 User 'domain\user1' failed authentication.&amp;nbsp; Reason: Invalid username/password From: ::ffff:192.168.1.10.&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_get_system_cmd_output(pan_cfg_utils.c:4275): executing: /usr/local/bin/sdb -n -r cfg.operational-mode&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_authd_generate_system_log(pan_authd.c:902): CC Enabled=False&lt;/P&gt;&lt;P&gt;Mar 26 13:00:54 pan_get_system_cmd_output(pan_cfg_utils.c:4275): executing: /usr/local/bin/sdb -n -r cfg.operational-mode&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If anyone has any ideas of what else I could try, please let me know.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Mar 2013 13:12:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/invalid-username-password-with-ldap-for-captive-portal/m-p/11872#M8720</guid>
      <dc:creator>johndickson</dc:creator>
      <dc:date>2013-03-26T13:12:59Z</dc:date>
    </item>
    <item>
      <title>Re: Invalid username/password with LDAP for Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/invalid-username-password-with-ldap-for-captive-portal/m-p/11873#M8721</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Be sure you write Netbios name of AD at LDAPAccounts configuration (domain tab)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Mar 2013 13:21:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/invalid-username-password-with-ldap-for-captive-portal/m-p/11873#M8721</guid>
      <dc:creator>Retired Member</dc:creator>
      <dc:date>2013-03-26T13:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: Invalid username/password with LDAP for Captive Portal</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/invalid-username-password-with-ldap-for-captive-portal/m-p/11874#M8722</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, I'd completed this, as per one of the other articles (didn't read the small print when I was originally setting it up).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, it's now working, removing and putting the configuration must have got me most of the way there, but I just rechecked the LDAP configuration as you outlined to check and noticed that SSL was ticked, which is something I must have missed during the re-inputting (previously unticked, and running on port 389, and not 636 for SSL).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I unchecked this and it's now working. Not sure if it was related, but I originally setup the auth profile with spaces in the names until I read another article about PanOS not supporting that (but allowing you to put it anyway), and changed the profile name to without spaces. As already mentioned, maybe removing it all and starting from scratch is the answer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your input&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 26 Mar 2013 13:27:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/invalid-username-password-with-ldap-for-captive-portal/m-p/11874#M8722</guid>
      <dc:creator>johndickson</dc:creator>
      <dc:date>2013-03-26T13:27:16Z</dc:date>
    </item>
  </channel>
</rss>

