<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSO Kerberos setup for Admin in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/426718#M94527</link>
    <description>&lt;P&gt;i have the very exact same issue, and i think the problem is here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2017-07-12 08:35:39.527 -0400 debug: pan_authd_handle_group_req(pan_auth_state_engine.c:1381): Could not get user role for user user@DOMAIN.LOCAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;palo tries to find "user@DOMAIN.LOCAL" in it's local administrators database, instead it should simply look for "user" (without the domain). i think this is simply a software bug.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 13 Aug 2021 11:53:24 GMT</pubDate>
    <dc:creator>RobertRostek</dc:creator>
    <dc:date>2021-08-13T11:53:24Z</dc:date>
    <item>
      <title>SSO Kerberos setup for Admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/166087#M53269</link>
      <description>&lt;P&gt;I have been able to set up Kerberos for explict userid/password entry at the logon screen. Now I am trying to setup SSO.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I at least get to the Click the button to login as user@domain.local. Yet when I proceed, I get Not Authroized.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;System log shows 'Authorization failed for user 'user@domain.local' vs the explict login that shows a login for 'user' w/o the domain.local appended.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I turned on debugging and authd.log shows&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2017-07-12 08:35:39.494 -0400 Certificate validated for user 'user@DOMAIN.LOCAL'. From: 10.1.4.40.&lt;/P&gt;&lt;P&gt;2017-07-12 08:35:39.496 -0400 debug: _log_auth_respone(pan_auth_server.c:263): Sent PAN_AUTH_SUCCESS auth response for user 'user@DOMAIN.LOCAL' (exp_in_days=-1 (-1 never; 0 within a day))(authd_id: 6441520795817607314)&lt;/P&gt;&lt;P&gt;2017-07-12 08:35:39.527 -0400 debug: pan_auth_request_process(pan_auth_state_engine.c:3208): Receive request: msg type PAN_AUTH_REQ_GROUP, conv id 36, body length 32&lt;/P&gt;&lt;P&gt;2017-07-12 08:35:39.527 -0400 debug: pan_db_funcs_request_process(pan_auth_state_engine.c:1527): init'ing group request (authorization)&lt;/P&gt;&lt;P&gt;2017-07-12 08:35:39.527 -0400 debug: pan_authd_handle_group_req(pan_auth_state_engine.c:1368): start to authorize user "user@DOMAIN.LOCAL"&lt;/P&gt;&lt;P&gt;2017-07-12 08:35:39.527 -0400 debug: pan_authd_handle_group_req(pan_auth_state_engine.c:1381): Could not get user role for user user@DOMAIN.LOCAL&lt;/P&gt;&lt;P&gt;2017-07-12 08:35:39.527 -0400 debug: pan_authd_handle_group_req(pan_auth_state_engine.c:1477): Sent authorization response for user "user@DOMAIN.LOCAL":&lt;BR /&gt;role/domain="/"; expiring_in_days=-1; rem_grace_period=-1, rem_login_count=-1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I tried all kinds of options for the admin user but some mapping seems to be wrong. Any idea where to look or for more debugging?&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2017 13:50:25 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/166087#M53269</guid>
      <dc:creator>ThomasMConnors</dc:creator>
      <dc:date>2017-07-12T13:50:25Z</dc:date>
    </item>
    <item>
      <title>Re: SSO Kerberos setup for Admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/166176#M53281</link>
      <description>&lt;P&gt;Can you explain more what you are trying to use the single sign on for? &amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;This sounds like you are trying to authenticate to the management interface for the Palo Alto. &amp;nbsp;We were successful in setting up an LDAPs policy to talk to the Windows Domain Controller and are able to logon to Panormama and the PA FW's using our AD credentials. &amp;nbsp;There is no need to specify the domain with this option.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you are trying to identify user traffic that is crossing the firewall for security rules - I would suggest a different approach. &amp;nbsp;Again this was integrated to a Windows AD domain using the WMI functionality and LDAPS to hit the domain controllers. &amp;nbsp;We also used the agent software on our Citrix servers to give more identification to systems that have mutliple user logged on locally. &amp;nbsp;This works very well and the setup was fairly simple. &amp;nbsp;No need to link into Kerberos.&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jul 2017 18:41:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/166176#M53281</guid>
      <dc:creator>davanderson</dc:creator>
      <dc:date>2017-07-12T18:41:04Z</dc:date>
    </item>
    <item>
      <title>Re: SSO Kerberos setup for Admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/426718#M94527</link>
      <description>&lt;P&gt;i have the very exact same issue, and i think the problem is here:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;2017-07-12 08:35:39.527 -0400 debug: pan_authd_handle_group_req(pan_auth_state_engine.c:1381): Could not get user role for user user@DOMAIN.LOCAL&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;palo tries to find "user@DOMAIN.LOCAL" in it's local administrators database, instead it should simply look for "user" (without the domain). i think this is simply a software bug.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Aug 2021 11:53:24 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/426718#M94527</guid>
      <dc:creator>RobertRostek</dc:creator>
      <dc:date>2021-08-13T11:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: SSO Kerberos setup for Admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/427770#M94642</link>
      <description>&lt;P&gt;had a ticket with palo alto support and they provided me with a workaround that is fine for our environment:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;set auth strict-username-check no&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;maybe this helps.&lt;/P&gt;</description>
      <pubDate>Thu, 19 Aug 2021 13:45:06 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/427770#M94642</guid>
      <dc:creator>RobertRostek</dc:creator>
      <dc:date>2021-08-19T13:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: SSO Kerberos setup for Admin</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/522100#M108171</link>
      <description>&lt;P&gt;Thank you RobertRostek.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We were trying to enable Kerberos SSO to the firewall web portal and seeing the same suspicious line in the authd log. We tried a lot of different things to make this work, but changing strict-username-check seemed to be the only thing that helped.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We now have our effectively-passwordless Server Admin accounts logging into the firewall with YubiKeys and our Kerberos infrastructure. Feels good.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks Again!&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 17:18:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/sso-kerberos-setup-for-admin/m-p/522100#M108171</guid>
      <dc:creator>LRCAIT</dc:creator>
      <dc:date>2022-11-22T17:18:12Z</dc:date>
    </item>
  </channel>
</rss>

