top of page

PA LDAP AD AUTHENTICATION

  • Writer: Mukesh Chanderia
    Mukesh Chanderia
  • Jan 30, 2022
  • 1 min read

The default port for LDAP is port 389, but LDAPS uses port 636 and establishes TLS/SSL upon connecting with a client.


Step 1 : Create Server Profile


Device --> Server Profiles --> LDAP



ree



Step 2 :

Go to Device --> User Identification --> Group Mapping Settings



ree

Step 3 :

Now go to Group Include List and AD must expand . If it doesn't then it's not properly configured.


ree

Step 4 : Select Groups from AD whose user's must be authenticated.

Now say we want only users from user & Admin group to be authenticated using AD.



ree

Note if you aren't able to expand DC then there is issue in connecting to AD server.


Step 5 :


Go to Devices --> Create Authentication Profile


ree


ree


ree


ree

Step 6 :


Device --> User Identification


Here is default settings


ree

Click edit



ree

Let's enable Server log monitor session & client probing (By Default they aren't enable)



ree



ree


ree

Step 7 :


Now go to Zone in which you want users to be authenticated & enable user identification.



ree

You may need to enable Source User to see Traffic Monitoring showing user ID


ree

To see details of traffic click on magnifier



ree

Recent Posts

See All
PANORAMA

Hook Firewall & Panorama Step 1: Go to Firewall and add the IP address of Primary and secondary Panorama. Step 2: Go to Panorama and in...

 
 
 

Comments


Follow me

© 2021 by Mukesh Chanderia
 

Call

T: 8505812333  

  • Twitter
  • LinkedIn
  • Facebook Clean
©Mukesh Chanderia
bottom of page