Troubleshoot Authentication Issues
Focus
Focus

Troubleshoot Authentication Issues

Table of Contents

Troubleshoot Authentication Issues

When users fail to authenticate to a Palo Alto Networks firewall or Panorama, or the Authentication process takes longer than expected, analyzing authentication-related information can help you determine whether the failure or delay resulted from:
  • User behavior
    —For example, users are locked out after entering the wrong credentials or a high volume of users are simultaneously attempting access.
  • System or network issues
    —For example, an authentication server is inaccessible.
  • Configuration issues
    —For example, the Allow List of an authentication profile doesn’t have all the users it should have.
The following CLI commands display information that can help you troubleshoot these issues:
Task
Command
Display the number of locked user accounts associated with the authentication profile (
auth-profile
), authentication sequence (
is-seq
), or virtual system (
vsys
).
To unlock users, use the following operational command:
>
request authentication [unlock-admin | unlock-user]
PA-220> show authentication locked-users    {    vsys
<value>
|    auth-profile
<value>
|    is-seq       {yes | no}       {auth-profile | vsys}
<value>
   }
Use the
debug authentication
command to troubleshoot authentication events.
Use the
show
options to display authentication request statistics and the current debugging level:
  • show
    displays the current debugging level for the authentication service (authd).
  • show-active-requests
    displays the number of active checks for authentication requests, allow lists, locked user accounts, and Multi-Factor Authentication (MFA) requests.
  • show-pending-requests
    displays the number of pending checks for authentication requests, allow lists, locked user accounts, and MFA requests.
  • connection-show
    displays authentication request and response statistics for all authentication servers or for a specific protocol type.
Use the
connection-debug
options to enable or disable authentication debugging:
  • Use the
    on
    option to enable or the
    off
    option to disable debugging for authd.
  • Use the
    connection-debug-on
    option to enable or the
    connection-debug-off
    option to disable debugging for all authentication servers or for a specific protocol type.
PA-220> debug authentication    {    on {debug | dump | error | info | warn} |    show |    show-active-requests |    show-pending-requests |        connection-show |       {       connection-id |       protocol-type          {          Kerberos connection-id
<value>
|          LDAP connection-id
<value>
|          RADIUS connection-id
<value>
|          TACACS+ connection-id
<value>
|          }    connection-debug-on |       {       connection-id |       debug-prefix |       protocol-type          {          Kerberos connection-id
<value>
|          LDAP connection-id
<value>
|          RADIUS connection-id
<value>
|          TACACS+ connection-id
<value>
|          }    connection-debug-off |       {       connection-id |       protocol-type          {          Kerberos connection-id
<value>
|          LDAP connection-id <value> |          RADIUS connection-id <value> |          TACACS+ connection-id <value> |          }    connection-debug-on    }
Test the connection and validity of the certificate profile.
PA-220> test authentication authentication-profile auth-profile username
<username>
password
<password>
Troubleshoot a specific authentication using the
Authentication ID
displayed in
Monitor
Logs
Authentication
.
PA-220> grep
<Authentication ID>

Recommended For You