Global Protect Connectivity Issue

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Global Protect Connectivity Issue

L1 Bithead

 

I am deploying GlobalProtect and have configured the Gateway Agent Client Settings with the following Source User in the Config Selection Criteria: connect\vpnusers

I am a member of this group. The group is retrieved from our internal LDAP server via User Identification → Group Mapping, with the following attributes configured:

  • Primary Username: sAMAccountName

  • Email: mail

Users authenticate to the GlobalProtect portal and gateway using SAML (Duo). The Authentication Profile that references the SAML server profile is configured with the following Username Attribute:

 

duo_username

The issue I am encountering is that whenever I attempt to connect, GlobalProtect fails with the error: Matching Client Config not found

 

However, when I change the Source User in the Config Selection Criteria to any, the connection succeeds. This indicates that the issue is specifically related to the user group–based matching.

I strongly suspect there is a username format mismatch between SAML and LDAP. I have tried multiple variations of the username format, but none have resolved the issue.

According to the GlobalProtect logs, the firewall is identifying me as:

 

user1@connect.com

Can anyone please advise on how to correctly align the SAML and LDAP username formats so that the user is properly matched to the LDAP group and the correct client configuration is applied?

3 REPLIES 3

Cyber Elite

@H.Thiam,

Someone with Duo can probably provide you more information, but it looks like the attribute that Duo wants to utilize would be User.Username for your authentication profile according to their docs

Thanks for the feedback . I have tried the User.Username attribute but  same outcome . I have also come across a recommendation to update the User Domain  and User  Modifier fields within the  SAML authentication profile so it forces the firewall  to match the SAML format to the LDAP group  Mapping  . However those fields are only applicable to the TACACS type . 

Cyber Elite

Hi @H.Thiam ,

 

I had a similar problem with my GP SAML username format user@domain.com and my LDAP group mapping domain\user.  The users were not matching the groups.  Changing the User Domain under Device > User Identification > Group Mapping Settings > [edit group mapping] > Server Profile > Domain Setting caused the GP SAML usernames to change from user@domain.com to domain\user so that the LDAP groups would work.  All other fields remained the default (except the Update Interval).

 

TomYoung_0-1768524467740.png

 

Thanks,

 

Tom

Help the community: Like helpful comments and mark solutions.
  • 399 Views
  • 3 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!