<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Authentication using LDAP/AD in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13613#M9986</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it has been identified as a bug and is targeted to be fixed in the next release, 4.1.3. The workaround is to set the Allow List to 'all' under the Authentication Profile and define a Security Rule to allow access only to the specific AD group.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 13 Feb 2012 21:56:05 GMT</pubDate>
    <dc:creator>rmonvon</dc:creator>
    <dc:date>2012-02-13T21:56:05Z</dc:date>
    <item>
      <title>Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13608#M9981</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm trying to get LDAP authentication working using Active directory. I have created an LDAP server profile, an Authentication Profile and Group Mapping settings profile. When I'm setting up the Group mappings I can go in and see the entire directory tree and pick groups so I know that it is connecting the the AD server and pulling information. However, in the Authentication Profile, if I try to pick users for the allow list, it doesn't find anything from the AD only local users. I have tried creating a firewall Administrator using the LDAP profile, and cannot login. When I look at the system log, it says "authentication profile not found for user".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm obviously missing something somewhere, but can't figure it out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Kenton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 00:14:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13608#M9981</guid>
      <dc:creator>smithkopel</dc:creator>
      <dc:date>2012-02-09T00:14:21Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13609#M9982</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi...Within the Authentication Profile, please make sure you set the authentication=LDAP and set the Server Profile=&amp;lt;LDAP server&amp;gt;.&amp;nbsp; Then select 'all' for the Allow List.&amp;nbsp; Please give that a try.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 09 Feb 2012 02:18:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13609#M9982</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-02-09T02:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13610#M9983</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thanks @rmonvon but those are the settings I currently have.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kenton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 10 Feb 2012 21:54:02 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13610#M9983</guid>
      <dc:creator>smithkopel</dc:creator>
      <dc:date>2012-02-10T21:54:02Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13611#M9984</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have 'all' selected under the Allow List, the authentication should work on all users.&amp;nbsp; There is another post where some users could not get the group listing to display.&amp;nbsp; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="https://live.paloaltonetworks.com/thread/4083?tstart=0"&gt;https://live.paloaltonetworks.com/thread/4083?tstart=0&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Maybe you can check back on this other posting to see the result once they have contacted support.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 11 Feb 2012 02:12:28 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13611#M9984</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-02-11T02:12:28Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13612#M9985</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank-you for the link. There is a suggestion in that thread that this might be a bug in 4.1.2 (which we are running). Has it been determined that it is a bug?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kenton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Feb 2012 21:25:18 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13612#M9985</guid>
      <dc:creator>smithkopel</dc:creator>
      <dc:date>2012-02-13T21:25:18Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13613#M9986</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it has been identified as a bug and is targeted to be fixed in the next release, 4.1.3. The workaround is to set the Allow List to 'all' under the Authentication Profile and define a Security Rule to allow access only to the specific AD group.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Feb 2012 21:56:05 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13613#M9986</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-02-13T21:56:05Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13614#M9987</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Thank-you. Should this workaround work for device Administrators as well? Because it doesn't. I haven't tried it with the Portal and VPN because I don't want to break our currently working configuration. However, when I try to add an Administrator using the same LDAP profile it will not authenticate users in AD.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kenton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Feb 2012 22:12:30 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13614#M9987</guid>
      <dc:creator>smithkopel</dc:creator>
      <dc:date>2012-02-13T22:12:30Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13615#M9988</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The bug is not allowing the AD groups to be displayed for you to select from.&amp;nbsp; So leaving the Allow List='all' at default should work for admin authentication.&amp;nbsp; I suggest that you delete the Authentication Profile that is not working and create a new Authentication Profile.&amp;nbsp; Make sure to set the authentication=LDAP, select the LDAP server, and the login cn=sAMAccountName if this is an AD LDAP.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 13 Feb 2012 22:37:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13615#M9988</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-02-13T22:37:04Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13616#M9989</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Still no luck. Attached is screenshot of my config. Error in system log says "authentication profile not found for the user from: &amp;lt;IP Address&amp;gt;.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2012 01:01:54 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13616#M9989</guid>
      <dc:creator>smithkopel</dc:creator>
      <dc:date>2012-02-14T01:01:54Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13617#M9990</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Can you check the admin account setting please.&amp;nbsp; The error appears to indicate the admin setting is missing the authen profile.&amp;nbsp; If it looks correct and the problem persists, please contact support.&amp;nbsp; Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2012 04:48:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13617#M9990</guid>
      <dc:creator>rmonvon</dc:creator>
      <dc:date>2012-02-14T04:48:56Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13618#M9991</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes the profile is there. I'll call support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Kenton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 14 Feb 2012 17:45:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13618#M9991</guid>
      <dc:creator>smithkopel</dc:creator>
      <dc:date>2012-02-14T17:45:33Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13619#M9992</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Kenton,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;did you get this working?&amp;nbsp; im having the same issues.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sun, 04 Mar 2012 08:10:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13619#M9992</guid>
      <dc:creator>jeffrolc</dc:creator>
      <dc:date>2012-03-04T08:10:14Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13620#M9993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No I haven't. I haven't called support yet because the real thing I'm trying to get to work is the AD authentication for the VPN and there is a bug in that. So I figured I'd just wait until they fix the bug. Hopefully that wil be relatively soon.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kenton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Mar 2012 17:42:21 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13620#M9993</guid>
      <dc:creator>smithkopel</dc:creator>
      <dc:date>2012-03-05T17:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13621#M9994</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Having similiar issues at a customer.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;@smithkopel - Did you manage to get this issue resolved?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2012 12:24:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13621#M9994</guid>
      <dc:creator>Quinton</dc:creator>
      <dc:date>2012-05-25T12:24:16Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13622#M9995</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No I haven't worked on it any more. I intend to upgrade to a newer version of the OS in a couple of weeks and hopefully that will fix the root of the problem.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Kenton&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2012 15:21:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13622#M9995</guid>
      <dc:creator>smithkopel</dc:creator>
      <dc:date>2012-05-25T15:21:17Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13623#M9996</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The CN should equal a real user such as administrator&amp;nbsp; not samaccountname.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 25 May 2012 17:01:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13623#M9996</guid>
      <dc:creator>kslyons</dc:creator>
      <dc:date>2012-05-25T17:01:33Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13624#M9997</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I&amp;nbsp; have had this similar issue and I figured out that, the user ID which you are using to authenticate to the AD, should be listed in PA locally as an administrator. Then the AD can be used to authenticate this account. As per my SE, they have submitted an enhancement request and will update you guys once I get to know anything.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jun 2012 03:31:17 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13624#M9997</guid>
      <dc:creator>nmsecteam</dc:creator>
      <dc:date>2012-06-25T03:31:17Z</dc:date>
    </item>
    <item>
      <title>Re: Authentication using LDAP/AD</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13625#M9998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I was having this same problem and switched to Kerberos (assuming it's an AD environment?).&amp;nbsp; Worked like a charm.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 25 Jun 2012 15:42:41 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/authentication-using-ldap-ad/m-p/13625#M9998</guid>
      <dc:creator>cmateam</dc:creator>
      <dc:date>2012-06-25T15:42:41Z</dc:date>
    </item>
  </channel>
</rss>

