Having upgraded our Panorama from 4.1.7 to 4.1.8 - we can no longer use the LDAP user authentication.
The user constantly gets "invalid username or password" (same message on the Panorama) - yet this worked without any problems with 4.1.7
On Panorama - one can see that in the LDAP profile - the Base option is never getting populated (dropdown option is only "none" rather than domain name).
Is this a new "feature" ?
Solved! Go to Solution.
We are having the same/similar issue on a PA-2050 and on Panorama.
The reason why I write similar is because I noticed the problem after not being able to log into the PA at all after upgrading after some time.
When I looked at the cpu usage on the PA (show system resources follow) it showed that the authd is using 100% cpu and this "blocks" all other attempts to authenticate on the PA (localusers, radius, ldap etc..).
I still had problems after downgrading to version 4.1.7, but then I noticed a error message in the systemlog regarding ldap not being able to connect to the ldap server on SSL..
I disabled SSL and changed the ldap port to 389 and everything seems to be working OK.
I have opened up a case on support (#00096705) and the issue has been escalated to TAC.
just more fyi - I downgraded my pa-2050 and ldap auth (for admin login) started working again - leaving my panorama at 4.1.8 for now in hopes of a fix coming soon :smileyhappy:
This is specifically LDAP authentication into the administrative website of the Palo Alto *only*, correct?
I am having other issues in 4.1.7 that I really need resolved and are known fixes in 4.1.8. I use LDAP for user based rules, however my admin users are all locally defined to the PAs.
Hi guys, I was able to reproduce the same behavior my lab testing. The LDAP server profile is now (in 4.1.8) not able to see the server correctly. The LDAP server is auto populating the base server info in the earlier version but not in 4.1.8. This looks buggy. Please open a ticket with support.
pretty sure kerberos had an issue all along though - i was advised by TAC to use ldap/ad instead of kerb some time ago, and that fixed the issues i had then - these ldap issues now I only noticed in admin-auth, I didnt test on ssl-vpn auth before downgrading, but I dont use ldap in rules, I use user/groups but that is provided by the DC agents i believe, I dont think that was affected but I didnt test it all through
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!