<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP authentication does not work for Global Protect Clients in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/422185#M94042</link>
    <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/183298"&gt;@echahine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;What exactly is the issue that you are running into getting this to scale? Generally speaking I've found that the vast majority of people simply setup dynamic AD groups to manage this side of things and it works pretty well.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 26 Jul 2021 19:24:06 GMT</pubDate>
    <dc:creator>BPry</dc:creator>
    <dc:date>2021-07-26T19:24:06Z</dc:date>
    <item>
      <title>LDAP authentication does not work for Global Protect Clients</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/187847#M57099</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV&gt;We have got a working LDAP server profile. We have made sure user 'test' is listed on the group mapping.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Steps:&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;a) Setup group-mapping under Device-&amp;gt;User Identification-&amp;gt;Group Mapping Settings. Under 'Group Include List' pick a specific cn.&lt;/DIV&gt;&lt;DIV&gt;b) Device-&amp;gt;Authentication Profile. Add a new profile and add the same cn under allowed list.&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;Error: LDAP Authentication Profile test&lt;/DIV&gt;&lt;DIV&gt;=========================&lt;/DIV&gt;&lt;DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp; Test with TEST-ldap-all which allows all domain users.test@TEST-PA&amp;gt; test authentication authentication-profile TEST-ldap-all username test passwordEnter password :Target vsys is not specified,&lt;BR /&gt;user "test" is assumed to be configured with a shared auth profile. Do allow list check before sending out authentication request...name "test" is in group "all"Authentication to LDAP server at 10.1.1.3 for&lt;BR /&gt;user "test"Egress: 10.2.6.4 Type of authentication: plaintext Starting LDAP connection...Succeeded to create a session with LDAP serverDN sent to LDAP server:&lt;BR /&gt;CN=Company,OU=ITDept,OU=User,OU=Ann,DC=test,DC=netUser expires in days: neverAuthentication succeeded for user "test"2.&lt;BR /&gt;Test with ldap profile which points to a domain global security group.test@TEST-PA&amp;gt; test authentication authentication-profile test-ldap-globalprotect username test passwordEnter password :&lt;BR /&gt;Allow list check error:Target vsys is not specified, user "test" is assumed to be configured with a shared auth profile.&lt;BR /&gt;Do allow list check before sending out authentication request...User test is not allowed with authentication profile test-ldap-globalprotect&lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any thought on this?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Nov 2017 06:04:50 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/187847#M57099</guid>
      <dc:creator>Farzana</dc:creator>
      <dc:date>2017-11-20T06:04:50Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication does not work for Global Protect Clients</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/187943#M57111</link>
      <description>&lt;P&gt;I see an authentication success message in the logs &lt;EM&gt;'&lt;STRONG&gt;Authentication succeeded for user "test"2.'&lt;/STRONG&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Can you try connecting from Global protect client with the same user and share the output from the authd.log.&amp;nbsp;&lt;/P&gt;&lt;P&gt;You can run a "tail follow yes mp-log authd.log" in the command line when attempting to connect from client.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Nov 2017 12:51:40 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/187943#M57111</guid>
      <dc:creator>mgarg</dc:creator>
      <dc:date>2017-11-20T12:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication does not work for Global Protect Clients</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/188103#M57141</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/50136"&gt;@mgarg&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for that. Below is the authd.log for user 'angusg'.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2017-11-10 21:30:29.084 +1000 debug: _get_profile_domain(pan_auth_sysd.c:890): auth prof "test-ldap-globalprotect" on vsys "vsys1" does NOT have domain&lt;BR /&gt;2017-11-10 21:30:29.084 +1000 Error: authd_sysd_profile_domain_callback(pan_auth_sysd.c:936): find domain for auth profile: test-ldap-globalprotect; vsys vsys1&lt;BR /&gt;2017-11-10 21:30:29.086 +1000 debug: pan_auth_request_process(pan_auth_state_engine.c:3306): Receive request: msg type PAN_AUTH_REQ_REMOTE_INIT_AUTH, conv id 24, body length 2128&lt;BR /&gt;2017-11-10 21:30:29.087 +1000 debug: _authenticate_initial(pan_auth_state_engine.c:2362): Trying to authenticate (init auth): &amp;lt;profile: "test-ldap-globalprotect", vsys: "vsys1", policy: "", username "angusg"&amp;gt; ; timeout setting: 25 secs&lt;BR /&gt;; authd id: 6486741776332750875&lt;BR /&gt;2017-11-10 21:30:29.087 +1000 debug: _get_auth_prof_detail(pan_auth_util.c:1057): non-admin user thru Global Protect "angusg" ; auth profile "test-ldap-globalprotect" ; vsys "vsys1"&lt;BR /&gt;2017-11-10 21:30:29.087 +1000 debug: _get_authseq_profile(pan_auth_util.c:856): Auth profile/vsys (test-ldap-globalprotect/vsys1) is NOT auth sequence&lt;BR /&gt;2017-11-10 21:30:29.087 +1000 debug: _retrieve_svr_ids(pan_auth_service.c:645): could not find auth server id vector for test-ldap-globalprotect-vsys1-mfa&lt;BR /&gt;2017-11-10 21:30:29.087 +1000 debug: add_info_from_auth_profile_to_request(pan_auth_util.c:1020): MFA is not configured for the auth profile. No mfa server ids for the user "" (prof/vsys: test-ldap-globalprotect/vsys1)&lt;BR /&gt;2017-11-10 21:30:29.087 +1000 debug: pan_auth_cache_user_is_allowed(pan_auth_cache_allowlist_n_grp.c:185): This is a single vsys platform, group check for allow list is performed on "vsys1"&lt;BR /&gt;2017-11-10 21:30:29.087 +1000 debug: pan_auth_cache_user_is_allowed(pan_auth_cache_allowlist_n_grp.c:310): user "angusg" is NOT in allow list of auth prof/vsys "test-ldap-globalprotect/vsys1" (vsys in request "vsys1")&lt;BR /&gt;2017-11-10 21:30:29.087 +1000 failed authentication for user 'angusg'. Reason: User is not in allowlist. auth profile 'test-ldap-globalprotect', vsys 'vsys1', From: 122.104.158.11.&lt;BR /&gt;2017-11-10 21:30:29.087 +1000 debug: _log_auth_respone(pan_auth_server.c:263): Sent PAN_AUTH_FAILURE auth response for user 'angusg' (exp_in_days=-1 (-1 never; 0 within a day))(authd_id: 6486741776332750875)&lt;BR /&gt;2017-11-10 21:30:34.963 +1000 debug: pan_auth_cache_get_authprof_info(pan_auth_cache_authprof_n_authseqprof.c:176): prof "test-ldap-globalprotect", vsys "vsys1" (method: LDAP (active directory)) has sso hash table id: 0 (0 means no or i&lt;BR /&gt;nvalid keytab)&lt;BR /&gt;2017-11-10 21:30:35.004 +1000 debug: authd_sysd_profile_domain_callback(pan_auth_sysd.c:911): profiledomain triggered via sysd&lt;BR /&gt;2017-11-10 21:30:35.004 +1000 debug: authd_sysd_profile_domain_callback(pan_auth_sysd.c:931): get domain for vsys1/test-ldap-globalprotect&lt;BR /&gt;2017-11-10 21:30:35.004 +1000 debug: pan_auth_cache_get_authprof_info(pan_auth_cache_authprof_n_authseqprof.c:176): prof "test-ldap-globalprotect", vsys "vsys1" (method: LDAP (active directory)) has sso hash table id: 0 (0 means no or i&lt;BR /&gt;nvalid keytab)&lt;BR /&gt;2017-11-10 21:30:35.004 +1000 debug: _get_profile_domain(pan_auth_sysd.c:890): auth prof "test-ldap-globalprotect" on vsys "vsys1" does NOT have domain&lt;BR /&gt;2017-11-10 21:30:35.004 +1000 Error: authd_sysd_profile_domain_callback(pan_auth_sysd.c:936): find domain for auth profile: test-ldap-globalprotect; vsys vsys1&lt;BR /&gt;2017-11-10 21:30:35.006 +1000 debug: pan_auth_request_process(pan_auth_state_engine.c:3306): Receive request: msg type PAN_AUTH_REQ_REMOTE_INIT_AUTH, conv id 27, body length 2128&lt;BR /&gt;2017-11-10 21:30:35.006 +1000 debug: _authenticate_initial(pan_auth_state_engine.c:2362): Trying to authenticate (init auth): &amp;lt;profile: "test-ldap-globalprotect", vsys: "vsys1", policy: "", username "angusg"&amp;gt; ; timeout setting: 25 secs&lt;BR /&gt;; authd id: 6486741776332750878&lt;/P&gt;</description>
      <pubDate>Tue, 21 Nov 2017 05:04:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/188103#M57141</guid>
      <dc:creator>Farzana</dc:creator>
      <dc:date>2017-11-21T05:04:52Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication does not work for Global Protect Clients</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/188322#M57177</link>
      <description>&lt;P&gt;when you add the username to the auth profile, does the user auto populate for you to select ?&lt;/P&gt;</description>
      <pubDate>Wed, 22 Nov 2017 12:07:51 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/188322#M57177</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-22T12:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication does not work for Global Protect Clients</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/188453#M57197</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks. Your hint helped to figure out that I need to replace&amp;nbsp;&lt;SPAN&gt;allow-list from “cn=test global protect users,ou=security groups,ou=user1,DC=test,DC=net” to individual users like test\user1.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I then added all the users in this list.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;But this does not seem to be scalable. I even tried using the short name test\ test global protect users, which did not work.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Is there a better scalable solution?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 02:59:19 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/188453#M57197</guid>
      <dc:creator>Farzana</dc:creator>
      <dc:date>2017-11-23T02:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication does not work for Global Protect Clients</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/188541#M57208</link>
      <description>&lt;P&gt;In the logs i see this error "failed authentication for user 'angusg'. Reason: User is not in allowlist"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In your authentication profile change the user domain to none ( you will have to type it) and keep the user name modifier as&lt;/P&gt;&lt;P&gt;%USERINPUT%&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 17:07:44 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/188541#M57208</guid>
      <dc:creator>mgarg</dc:creator>
      <dc:date>2017-11-23T17:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication does not work for Global Protect Clients</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/188545#M57210</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/45418"&gt;@Farzana&lt;/a&gt;&lt;/P&gt;&lt;P&gt;Just start typing test global, this should also auto populate a matching group.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;it works for me....&lt;/P&gt;</description>
      <pubDate>Thu, 23 Nov 2017 17:48:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/188545#M57210</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2017-11-23T17:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication does not work for Global Protect Clients</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/350198#M86936</link>
      <description>&lt;P&gt;I know this was from long ago, but I had a similar issue.&amp;nbsp; It turns out that group mappings dont work well with security groups that have a - (dash) in the name.&amp;nbsp; Took me a couple days to realize this.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 17 Sep 2020 18:11:07 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/350198#M86936</guid>
      <dc:creator>AMCNLA</dc:creator>
      <dc:date>2020-09-17T18:11:07Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication does not work for Global Protect Clients</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/422071#M94038</link>
      <description>&lt;P&gt;Hey. I know this is an old forum, but I was wondering if anyone found a more scalable way to solve this issue? As it still persists to this day (PAN-OS 9.1.10)&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jul 2021 14:51:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/422071#M94038</guid>
      <dc:creator>echahine</dc:creator>
      <dc:date>2021-07-26T14:51:52Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP authentication does not work for Global Protect Clients</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/422185#M94042</link>
      <description>&lt;P&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/183298"&gt;@echahine&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;What exactly is the issue that you are running into getting this to scale? Generally speaking I've found that the vast majority of people simply setup dynamic AD groups to manage this side of things and it works pretty well.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 26 Jul 2021 19:24:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/ldap-authentication-does-not-work-for-global-protect-clients/m-p/422185#M94042</guid>
      <dc:creator>BPry</dc:creator>
      <dc:date>2021-07-26T19:24:06Z</dc:date>
    </item>
  </channel>
</rss>

