Enhanced Security Measures in Place:   To ensure a safer experience, we’ve implemented additional, temporary security measures for all users.

Web UI authentication LDAP fails

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements

Web UI authentication LDAP fails

L3 Networker

Hi All,

 

I have configured everything correct. But no entry in LDAP server security logs while I try to login paloalto Web UI using LDAP profile.

 

 

Here at pan I can retrieve the all group user. I have configured the auth.

Profile to 'all' entry in allow list..tried both domain\username(captive portal working fine with this format) and username alone..Pls suggest

 

 

admin@paloalto> tail follow yes mp-log authd.log

 

2015-11-05 12:35:02.826 +0530 debug:

pan_auth_request_process(pan_auth_state_engine.c:1537): Trying to

authenticate: <profile: "", vsys: "", username "cslworld\paloaltotest">

 

2015-11-05 12:35:02.827 +0530 debug:

_get_auth_prof_detail(pan_auth_util.c:928): "cslworld\paloaltotest" is an admin user

 

2015-11-05 12:35:02.849 +0530 Error:

pan_auth_cache_get_admin_authprof(pan_auth_cache_adminusers.c:222): No default auth profile found for username paloaltotest

 

2015-11-05 12:35:02.849 +0530 Error:

_get_admin_authentication_profile_by_name(pan_auth_util.c:501): No admin auth prof found with the name paloaltotest

 

2015-11-05 12:35:02.849 +0530 Error:

_get_admin_authentication_profile(pan_auth_util.c:546): No auth prof/vsys is found for admin user "paloaltotest"

 

2015-11-05 12:35:02.849 +0530 Error:

pan_get_authprofile_n_setting(pan_auth_util.c:1029): Failed to get authentication profile for admin cslworld\paloaltotest

4 REPLIES 4

L5 Sessionator

Can you share the authentication profile that you have created for the authentication to GUI.

Hi Kumar,

 

I have created the auth. profile in device tab with all entry in allow list as per kb.

 

what is the auth. profile in device->setup tab?..on PAN-OS 7.0.3

L0 Member

make sure that the authentication profile has a login attribute "sAMAcount" which is case sensitive, also when you add a new administrator add it only by username that is available in the LDAP server "note that there is no autocompletion" , the firewall will authenticate this user using the LDAP server.

  • 3860 Views
  • 4 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!