- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
02-19-2013 03:00 AM
We have set up GP to authenticate against an AD server . User group mapping has done and u can pull the users . However, whenever you try to connect with one of the users from the GP client or portal web page , you get authentication fails message . Connecting with local db works fine . Any ideas ? I saw an article about spaces in the authentication profile . The profile has no space it is called localAD.
02-19-2013 06:58 AM
4.1.8 . Had to call TAC and they got to work . DN binding was incorrect and we missed the samaccountname under ldap authentication profile .
02-19-2013 03:07 AM
Hi,
I don't know what the problem with LDAP against AD could be in your case, but for the same purpose I am using a Kerberos Server Profile and a Kerberos Authentiction Profile in order to authenticate GP users against our MS AD. It looks like this
Maybe you can give it a try ?
Roland
02-19-2013 03:26 AM
Hello,
Upgraded the client to 1.2.1 now localdb doesn't work . I do get the cert error and allow it to import it
02-19-2013 04:15 AM
Did that and still doesnt work
02-19-2013 04:32 AM
Take small steps. Does localdb authentication work again ?
02-19-2013 04:42 AM
Yes . It does . I had to downgrade to 1.1.6 and use the original cert that was created when the box was deployed . Now I connect using local db , still no AD nor Kerberos connectivity
02-19-2013 05:21 AM
Which PANOS is running on your box ?
02-19-2013 06:58 AM
4.1.8 . Had to call TAC and they got to work . DN binding was incorrect and we missed the samaccountname under ldap authentication profile .
02-19-2013 07:14 AM
That's why I'm using Kerberos for authentication, it's much easier no fiddling around with bindings and samaccountnames etc.
02-19-2013 08:55 AM
I guess , we shall use Kerberos on other deployments
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!