<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: LDAP Authentication failed in SSL VPN in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24905#M4971</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally I have raised TAC case. Let see how it goes. &lt;/P&gt;&lt;P&gt;I will update the findings&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Fri, 26 Jan 2018 13:08:06 GMT</pubDate>
    <dc:creator>Gaurav_Pandya</dc:creator>
    <dc:date>2018-01-26T13:08:06Z</dc:date>
    <item>
      <title>LDAP Authentication failed in SSL VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24899#M4965</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We are facing issue of authentication fail with LDAP for some of the users in Mobile SSL VPN. However other users are working fine even though they are in same group. In tracker it is showing like,&lt;/P&gt;&lt;P&gt;Action : Failed Log in&lt;/P&gt;&lt;P&gt;Reason : No Access rule defined for user&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have followed &lt;SPAN style="margin: 0px; color: #000000; font-size: 11pt; font-family: 'Calibri',sans-serif;"&gt;sk112374&lt;/SPAN&gt; and finally captured cvpnd.elg file for working user as well as non-working user. But there is no much difference in logs for both users. Below is the errors which is shown in cvpnd.elg&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="margin: 0px;"&gt;&lt;SPAN style="margin: 0px; color: #000000; font-size: medium; font-family: 'Courier New';"&gt;[ 4335][23 Jan 14:15:16][AUTHNMAN] [CVPN_INFO] Cvpn::AuthSession::updateLogReason: Not authenticated, reason: (No access rules defined for user) Methods: (Password)&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0px;"&gt;&lt;SPAN style="margin: 0px; color: #000000; font-size: medium; font-family: 'Courier New';"&gt;[ 4335][23 Jan 14:15:16][AUTHNMAN] [CVPN_INFO] Cvpn::AuthSession::createGroupsCollection: User not authenticated&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0px;"&gt;&lt;SPAN style="color: #000000; font-family: Calibri; font-size: medium;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0px;"&gt;&lt;SPAN style="margin: 0px; color: #000000; font-size: medium; font-family: 'Courier New';"&gt;Error Message = &amp;gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0px;"&gt;&lt;SPAN style="margin: 0px; color: #000000; font-size: medium; font-family: 'Courier New';"&gt;[ 4335][23 Jan 14:15:52][CPLDAPCL] Using LDAP bind authentication&lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0px;"&gt;&lt;SPAN style="margin: 0px; color: #000000; font-size: medium; font-family: 'Courier New';"&gt;[ 4335][23 Jan 14:15:52][CPLDAPCL] Params&amp;lt;dn = 'CN=JSmith-Lakow,OU=Information &lt;/SPAN&gt;&lt;/P&gt;&lt;P style="margin: 0px;"&gt;&lt;/P&gt;&lt;P style="margin: 0px;"&gt;&lt;SPAN style="margin: 0px; color: #000000; font-size: medium; font-family: 'Courier New';"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 12:09:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24899#M4965</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-01-24T12:09:10Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication failed in SSL VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24900#M4966</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Gaurav,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please specify version, show the actual access rule, show the LDAP tree that contains this group, i.e.:&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62531_pastedImage_1.png" style="width: 211px; height: 282px;" /&gt;&lt;/P&gt;&lt;P&gt;Participating user groups:&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62532_pastedImage_2.png" style="width: 339px; height: 222px;" /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;As per documentation (see text in red towards the end):&lt;/P&gt;&lt;H4 class="" style="color: #333333; background-color: inherit; font-weight: 200; text-decoration: none; font-size: 20px; margin: 0.5cm 0px 0em; padding: 15px 0pt 1px;"&gt;User Authentication to the Mobile Access Portal&lt;/H4&gt;&lt;P class="" style="color: #333333; background-color: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;To enter the Mobile Access portal and get access to its applications, users defined in SmartConsole must authenticate to the Security Gateway. Authentication ensures that a user is who he or she claims to be. Users authenticate using one or more of these authentication schemes:&lt;/P&gt;&lt;UL class="" style="color: #333333; margin-top: 3pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;Username and password -&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Users enter a user name and password.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;Client Certificates&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Digital Certificates are issued by the Internal Certificate Authority or by a third party OPSEC certified Certificate Authority.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;RADIUS Server&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- Remote Authentication Dial-In User Service (RADIUS) is an external authentication scheme. The Security Gateway forwards authentication requests by remote users to the RADIUS server. The RADIUS server, which stores user account information, authenticates the users. The RADIUS protocol uses UDP for communications with the gateway. RADIUS Servers and RADIUS Server Group objects are defined in SmartConsole.&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0cm; padding: 0pt;"&gt;For more about configuring a Security Gateway to use a RADIUS server, see the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;&lt;A class="" href="http://downloads.checkpoint.com/dc/download.htm?ID=54842" style="color: #0026ff;" target="_blank" title=""&gt;R80.10 Security Management Administration Guide&lt;/A&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;.&lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;SecurID -&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;/STRONG&gt;SecurID is a proprietary authentication method of RSA Security. An external SecurID server manages access by changing passwords every few seconds. Each user carries a SecurID token, a piece of hardware or software that is synchronized with the central server and displays the current password. The Security Gateway forwards authentication requests by remote users to the ACE/Server.&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 6pt 0cm; padding: 0pt;"&gt;For more about configuring a Security Gateway to use SecurID, see the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;&lt;A class="" href="http://downloads.checkpoint.com/dc/download.htm?ID=54842" style="color: #0026ff;" target="_blank" title=""&gt;R80.10 Security Management Administration Guide&lt;/A&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;.&lt;/EM&gt;&lt;/EM&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;DynamicID One Time Password&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- DynamicID One Time Password can be required as a secondary or later authentication method (not the first). When this is configured, users who successfully complete the first-phase or phases of authentication are challenged to enter an additional credential: a DynamicID One Time Password (OTP). The OTP is sent by email or text message to a mobile phone, or other mobile communication device.&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; font-size: 14px; padding: 0pt;"&gt;Defined on user record (Legacy Authentication)&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;- The authentication method for each user is defined on the user record. For internal users, it is in the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Authentication&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page of the User Properties. &lt;SPAN style="color: #ff0000;"&gt;&lt;STRONG&gt;For LDAP users, it is on the user record in LDAP.&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P class="" style="color: #333333; background-color: inherit; text-decoration: none; margin: 6pt 0pt; padding: 0pt;"&gt;&lt;SPAN style="color: #ff0000;"&gt;A user who tries to authenticate with an authentication scheme that is not configured for the Mobile Access gateway will not be allowed to access resources through the gateway.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 13:36:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24900#M4966</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-01-24T13:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication failed in SSL VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24901#M4967</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Checkpoint version is R77.30. I have not done LDAP integration with user directory.&lt;/P&gt;&lt;P&gt;During enabling of&amp;nbsp;Mobile Access blade, it asks weather you want to integrate with LDAP or not. &amp;nbsp;There I have put credentials of LDAP server so I am able to see LDAP users.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 14:28:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24901#M4967</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-01-24T14:28:55Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication failed in SSL VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24902#M4968</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Do your Gateway Properties settings allow for Legacy Auth?&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62537_pastedImage_1.png" style="width: 453px; height: 430px;" /&gt;&lt;/P&gt;&lt;P&gt;and the users themselves are configured with "OS Password" authentication?&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-2 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62538_pastedImage_3.png" style="width: 451px; height: 406px;" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG class="" style="color: #000000; background-color: inherit; font-size: 14px; padding: 0pt;"&gt;From Documentation:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG class="" style="color: #000000; background-color: inherit; font-size: 14px; padding: 0pt;"&gt;OS Password -&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #000000;"&gt;means that users are challenged to enter their Operating System password for the Security Management Server. There are no scheme-specific parameters for this authentication scheme.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class="" style="color: #000000; background-color: inherit; text-decoration: none; margin: 6pt 0cm; padding: 0pt;"&gt;The Security Gateway can authenticate using the user name and password that is stored on the operating system of the machine on which the Security Gateway is installed. You can also use passwords that are stored in a Windows domain.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, please check if you are not running into situation described here:&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk107472" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk107472"&gt;Mobile Access and Endpoint clients LDAP nested groups are not enforced correctly&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 14:55:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24902#M4968</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-01-24T14:55:23Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication failed in SSL VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24903#M4969</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;In Gateway Properties --&amp;gt; Authentication&amp;nbsp;--&amp;gt; "Username &amp;amp; Password" is selected.&lt;/P&gt;&lt;P&gt;I am having issue with some LDAP users. Local users are working fine.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 15:20:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24903#M4969</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-01-24T15:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication failed in SSL VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24904#M4970</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you have "Username and Password" selected, only the users defined on the gateway will be authenticated, not the LDAP users, for that you should use "Legacy Authentication" and use "OS Password" on individual user's properties:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG class="image-1 jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/62539_pastedImage_1.png" style="width: 620px; height: 282px;" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Jan 2018 15:44:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24904#M4970</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2018-01-24T15:44:17Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication failed in SSL VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24905#M4971</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Finally I have raised TAC case. Let see how it goes. &lt;/P&gt;&lt;P&gt;I will update the findings&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Jan 2018 13:08:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24905#M4971</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-01-26T13:08:06Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication failed in SSL VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24906#M4972</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Finally LDAP authentication issue is resolved. There are 2 LDAP account and in which same AD server is included. In one LDAP account the password for AD server was not correct so failing users were going to this LDAP account and failing to authenticate. Now correct password is given and everything is working fine.&lt;/P&gt;&lt;P style="margin: 0px;"&gt;&lt;SPAN style="margin: 0px; color: #1f497d; font-size: medium; font-family: calibri;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 29 Jan 2018 13:31:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24906#M4972</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-01-29T13:31:59Z</dc:date>
    </item>
    <item>
      <title>Re: LDAP Authentication failed in SSL VPN</title>
      <link>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24907#M4973</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To add more on this we have decided to delete additional LDAP account unit which is causing unnecessary issue. But I am not able to delete LDAP account unit, getting error "&lt;EM&gt;Account_Unit&lt;/EM&gt; is used by another object" while deleting LDAP account unit.&lt;/P&gt;&lt;P&gt;I have followed &lt;STRONG&gt;sk111081&lt;/STRONG&gt; and removed AD users from Mobile access policy then deleted additional LDAP account unit. After that again added AD users in policy so that it will be authenticated by single AD/ LDAP account unit.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 09 Feb 2018 16:11:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/LDAP-Authentication-failed-in-SSL-VPN/m-p/24907#M4973</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-02-09T16:11:19Z</dc:date>
    </item>
  </channel>
</rss>

