User-ID Agent error: "ldap connect failed: Strong Authentication Required"

User-ID Agent error: "ldap connect failed: Strong Authentication Required"

219
Created On 01/31/26 03:21 AM - Last Modified 02/03/26 20:58 PM


Symptom


Error messages in UaCredDebug.log

06/23/25 13:37:57:946 [Error 1074]: pan_ldap_bind() failed
06/23/25 13:37:57:959 [Error 1892]: ldap connect failed: Strong Authentication Required
06/23/25 13:37:57:971 [Error 1701]: Failed to bind to LDAP server
06/23/25 13:38:08:135 [Error  542]: ldap_connect(user@DOMAIN.COM) return(8) : Strong Authentication Required

Note:

  • UaCredDebug.log is found in the installation directory of the Credential Agent.
  • By default, the installation directory is: C:\Program Files\Palo Alto Networks\User-ID Credential Agent


Environment


  • User-ID Agent version 11.1.1 or newer
  • User-ID Credential Service version 11.1.1 or newer 


Cause


  • This error indicates that the LDAP server rejected the connection attempt from the User-ID Agent.
  • The rejection is because the server requires a more secure connection, such as LDAPS. 


Resolution


  • Enable the LDAPS on the Windows Server.
  • Steps to to enable LDAPS on Windows Server are shown below.

 

  1. Open Server Manager (Start -> Server Manager).
  2. Go to Manage -> Add Roles and Features.

LDAP-1

 

  1. In the “Add Roles and Features Wizard” window that opens, click “Next” on the initial screen.

LDAP-2

 

  1. On the “Select installation type” screen, ensure this option is selected: “Role-based or feature-based installation”. Click “Next” 

LDAP-3

 

  1. On the “Select destination server” screen, ensure “Select a server from the server pool” is enabled, and the current server is selected. Click “Next”.

LDAP-4

 

  1. On the “Select Server Roles” screen, select “Active Directory Certificate Services”.

LDAP-5

 

  1. In the pop-up that opens, click “Add Features”.

LDAP-6

 

  1. Click “Next”.

LDAP-7

 

  1. On the “Active Directory Certificate Services”, click “Next”.

LDAP-8

 

  1. On the “Select role services” screen, click “Next”.

LDAP-9

 

  1. Optionally, enable “Restart the destination server automatically if required”. On the “Confirm installation selections” screen, click “Install”.

LDAP-10

 

  1. After the installation completes, open Server Manager and select “Configure Active Directory Certificate Services on the destination server”.

LDAP-11

 

  1. On the “Credentials” screen, you can choose to use the credentials of the current user or type different credentials. Click “Next”.

LDAP-12

 

  1. On the “Role Services” screen, enable “Certificate Authority” and click “Next”.

LDAP-13

 

  1. On the “Setup Type” screen, select “Enterprise CA” and click “Next”.

LDAP-14

 

  1. On the “Ca Type” screen, select the option that is best for your use case and click “Next”.

LDAP-15 

 

  1. On the “Private Key” screen, select the option that is best for your use case and click “Next”.

LDAP-16

 

  1. On the “Cryptography for CA” screen, select the option that is best for your use case and click “Next”.

LDAP-17

 

  1. On the “CA Name” screen, configure the common name, distinguished name and distinguished name suffix for the CA and click “Next”.

LDAP-18

 

  1. On the “Validity Period” screen, configure the desired validity and click “Next”.

LDAP-19

 

  1. On the “CA Database” screen, configure the desired locations and click “Next”.

LDAP-20

 

  1. On the “Confirmation” screen, validate the configuration and click “Configure”.

LDAP-21

 

  1. Once the configuration completes, click “Close”.

LDAP-22

 



Additional Information


  • This article is written for informational purposes.
  • The procedure may change when different patches/versions are installed on Windows.
  • Palo Alto Networks does not support any third-party operating systems.


Actions
  • Print
  • Copy Link

    https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA1Ki000000sYFNKA2&lang=en_US&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail