Vigyata.AI
Is this your channel?

#paloaltofirewalltraining | Day 46 | How to Configure Global Protect VPN with AD Authentication

762 views· 18 likes· 21:35· Jan 29, 2026

🛍️ Products Mentioned (2)

Join this channel to get access to perks: https://www.youtube.com/channel/UCBujQdd5rBRg7n70vy7YmAQ/join Please checkout my new video on How to Configure Global Protect VPN with AD Authentication. If you like this video give it a thumps up and subscribe my channel for more video. Have any question put it on comment section Recommend Video #paloaltofirewalltraining | Day 44 | How to Configure Global Protect VPN in Palo Alto https://youtu.be/8imTv9xYlJY #paloaltofirewalltraining | Day 43 | Global Protect SSL VPN in Palo Alto | Concept https://youtu.be/0ca7xsa1K_w Recommend Link (Playlist for EVE-NG LAB Setup) https://www.youtube.com/playlist?list=PLaUiizP3D7fPMmUQqS5QKX_FVSoMP68Z5 Palo Alto Certification information URL: https://www.paloaltonetworks.com/services/education For Palo Alto Documentation https://docs.paloaltonetworks.com/ Please follow me Instagram : https://www.instagram.com/bikashtech Twitter : https://twitter.com/Bikashshaw82 E-mail ID : bikashshaw261@gmail.com #Paloaltotraining ##bikashtech #paloaltofirewalltraining #paloaltonetworks #paloaltotraining #paloaltovpn #vpn #ike #ipsec

About This Video

In Day 46 of my PCNSA series, I focused on one specific and very practical piece of GlobalProtect: how to authenticate GlobalProtect users using Active Directory (AD). In my previous video I explained SAML-based authentication, but here I wanted to show you what AD is in simple terms and why it’s so useful in real organizations. AD is basically the directory where the company keeps user details like username/password and it also controls what users can do on their domain PCs. So when we integrate Palo Alto with AD, the firewall can validate the same corporate credentials users already use every day. In the lab, I didn’t rebuild the full GlobalProtect configuration again—I only showed the AD/LDAP integration and the changes needed on the portal and gateway authentication. I first adjusted the Service Route (so DNS/Kerberos/LDAP don’t incorrectly try to use the management interface), then I added the LDAP server profile pointing to my Windows Server (192.168.20.20) with the proper Base DN (DC=bikashtech,DC=com) and a bind user. After that, I created a test user (GP test) in AD, updated the GlobalProtect portal and gateway to use the LDAP authentication profile, and finally tested from the client. I also captured the traffic so you can literally see the LDAP bind request and the success—proof that the firewall is validating credentials from AD.

Frequently Asked Questions

🎬 More from Bikash's Tech