[IMPORTANT] Please note that this site will be disabled on October 31. In it's place, the new JumpCloud Help Center is live! Check it out here!

Support Center

Configuring a Palo Alto Networks Firewall to use JumpCloud's LDAP-as-a-Service

This article was tested with PAN-OS 6.1, and is current as of 09/19/2016.

When using Palo Alto Networks VPN LDAP integration, here are the basic settings to configure authentication with JumpCloud's hosted LDAP service:

Prerequisites:
See Using JumpCloud's LDAP-as-a-Service to obtain the JumpCloud specific settings required below.


LDAP Server Profile


Domain: ldap.jumpcloud.com
Type: other
Base: ou=Users,o=<your-organization-id>,dc=jumpcloud,dc=com 
Bind DN: uid=<ldap-binding-user>,ou=Users,o=<your-organization-id>,dc=jumpcloud,dc=com
Bind & Confirm Bind Password: <ldap-binding-user's-password>
SSL: Checked (SSL on port 636), Unchecked (StartTLS on port 389) 


 

Group Mapping


Group Objects


Search Filter: (blank)
Object Class: groupOfNames
Group Name: cn
Group Member: uid, member


User Objects


Search Filter: (blank)
Object Class: inetOrgPerson
User Name: uid


Mail Domains


Mail Attributes: mail

Authentication Profile


Type: LDAP
Login Attribute: uid
User Domain: jumpcloud.com
Username Modifier: %USERINPUT%



 
 

Last Updated: Oct 03, 2016 01:32PM MDT

Related Articles
desk-forwarding@jumpcloud.com
http://assets2.desk.com/
false
desk
Loading
seconds ago
a minute ago
minutes ago
an hour ago
hours ago
a day ago
days ago
about
false
Invalid characters found
/customer/en/portal/articles/autocomplete