LDAP groups not populating correctly

Showing results for 
Show  only  | Search instead for 
Did you mean: 

LDAP groups not populating correctly

L3 Networker

PA220, PANOS 8.1.1

Working on setting up GlobalProtect using AD/LDAP auth and groups to define access. 
I have userconfigs setup by AD Group and the log is "matching config not found" 
On digging into it some more, it appears that the user, in the PA, doesn't have the appropriate groups attached. Despite that they do in AD. 

AD Group has four members. Three of the members show up in the PA. The fourth does not. 
show user user-ids match-user domain\ProblemUser  returns an empty table. While the other three users in the group return complete information as expected. 
Account is functional and has full access to what all it's supposed to from the AD side of things. 

I've done a debug user-id reset group-mapping all and I'm  still having the same issues. 

Where should I start troubleshooting from here? 


Is - for whatever reason - the user in an exclude list or excluded in the LDAP filter in the Group mapping settings?

Nope, I don't have anything in the excludes.
Group Mapping is only looking at the AD Group. 

i assume you are using different AD accounts for user administration and ldap, it may be worth setting up another ldap profile with the full admin account and re test “show user group name..” . just to ensure the user is not masked somehow within AD.

The account in question isn't setup for admin rights to the PA, only auth for the GP portal. 
The LDAP Admins group is working correctly and shows up in the "show user group name" as expected. 

I'm using a single LDAP Server Profile setup in the PA. 
GroupMapping then is looking for specific groups. and then GP is limited further by group membership. 

Did I follow you correctly?

I dont think you understood me.. sorry....


nothing to do with pa admins...


your ldap profile has a bind account and password.


when you administer your domain i assume you are using a different account to the bind one...



try that AD admin account as your ldap bind.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!