[IMPORTANT] Please note that this site will be disabled on October 31. In it's place, the new JumpCloud Help Center is live! Check it out here!

Support Center

Configuring a Palo Alto Networks Firewall to use JumpCloud's LDAP-as-a-Service

This article was tested with PAN-OS 6.1, and is current as of 09/19/2016.

When using Palo Alto Networks VPN LDAP integration, here are the basic settings to configure authentication with JumpCloud's hosted LDAP service:

See Using JumpCloud's LDAP-as-a-Service to obtain the JumpCloud specific settings required below.

LDAP Server Profile

Domain: ldap.jumpcloud.com
Type: other
Base: ou=Users,o=<your-organization-id>,dc=jumpcloud,dc=com 
Bind DN: uid=<ldap-binding-user>,ou=Users,o=<your-organization-id>,dc=jumpcloud,dc=com
Bind & Confirm Bind Password: <ldap-binding-user's-password>
SSL: Checked (SSL on port 636), Unchecked (StartTLS on port 389) 


Group Mapping

Group Objects

Search Filter: (blank)
Object Class: groupOfNames
Group Name: cn
Group Member: uid, member

User Objects

Search Filter: (blank)
Object Class: inetOrgPerson
User Name: uid

Mail Domains

Mail Attributes: mail

Authentication Profile

Type: LDAP
Login Attribute: uid
User Domain: jumpcloud.com
Username Modifier: %USERINPUT%


Last Updated: Oct 03, 2016 01:32PM MDT

Related Articles
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
Invalid characters found