<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SAML Authentication to Azure Entra ID with Authorization - Complete guide in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/273019#M103970</link>
    <description>&lt;P&gt;Super useful &lt;span class="lia-unicode-emoji" title=":raising_hands:"&gt;🙌&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 10 Mar 2026 16:48:29 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2026-03-10T16:48:29Z</dc:date>
    <item>
      <title>SAML Authentication to Azure Entra ID with Authorization - Complete guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/272983#M103960</link>
      <description>&lt;P&gt;Hi Checkmates&lt;BR /&gt;&lt;BR /&gt;For SAML Integration with Azure AD there is a lot of conflicting information on Checkpoint. I struggled to get the authorization part working (access role using Azure AD groups) . From discussion with Checkpoint (Huge thanks to Motty@CP) a lot of it is legacy config that pre-dates the introduction of Ms Entra ID objects ( R81.x I think) &amp;nbsp;I thought I would share a complete &amp;nbsp;SAML config where Entra ID is used for both authentication and authorization.&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is partially covered by&amp;nbsp;&lt;SPAN&gt;sk179788 but since it mentioned using LDAP&amp;nbsp; I overlooked it since I wasn't using LDAP&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Conceptually, &amp;nbsp;you only want the gateway to ask Entra ID whether this user is allowed to sign in or not. There is no need to verify group membership, this is Entra ID’s responsibility. &amp;nbsp;Don’t add complexity by asking CheckPoint to perform the same checks…&lt;/P&gt;&lt;P&gt;In this configuration, there is no need to create any manual groups EXT_ID_ or Identity tags. Those were required when there was no dedicated Entra ID object. Not anymore&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the purpose of this test, &amp;nbsp;my Azure/EntraID test user “jpot@...” is a member of 4 x EntraID security groups :&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;ENTRA-RAVPN-USERS&lt;/STRONG&gt; : A group used for controlling who can sign in to the remote access VPN service&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;EntraID_SunnyMonday&lt;/STRONG&gt; &amp;amp; &amp;nbsp;&lt;STRONG&gt;EntraID_RainyTuesday:&amp;nbsp; &lt;/STRONG&gt;groups used by access roles within the policy&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;EntraID_CloudyWednesday: &lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;A group not used anywhere in checkpoint&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121054.png" style="width: 668px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33678i7B5AD6EC062F8538/image-dimensions/668x427?v=v2" width="668" height="427" role="button" title="Screenshot 2026-03-10 121054.png" alt="Screenshot 2026-03-10 121054.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;Use case 1 : &amp;nbsp;Allow any authenticated users&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Keep the configuration simple: In this setup, a single Azure App Registration and Enterprise app are configured to perform both authentication and authorization. No need to create two separate apps. I found the doc wasn’t particularly clear on this.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In my setup my App Registration and Entreprise Application are called: CHKP-SAML-RAVPN&lt;/P&gt;&lt;DIV class=""&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121159.png" style="width: 543px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33679iFAF7DEE95AD8C486/image-dimensions/543x331?v=v2" width="543" height="331" role="button" title="Screenshot 2026-03-10 121159.png" alt="Screenshot 2026-03-10 121159.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;User and Group: &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;The entreprise application&amp;nbsp; is assigned a single Entra ID group named ENTRA-RAVPN-USERS which represents the users allowed to use the Remote Access VPN service. &amp;nbsp;&amp;nbsp;This is the authorization part of the VPN connectivity, done by EntraID&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Single Sign On (SSO) -&amp;gt; Attribute and Claims:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Here, no groups are being sent as part of SAML assertion. We simply don’t have a need &amp;nbsp;for it.&lt;/LI&gt;&lt;LI&gt;Unique User identifier.&amp;nbsp; Should be set to &amp;nbsp;“user.localuserprincipalname”. &amp;nbsp;It may work as well with “user.userprincipalname” but it is down to your environment especially if you have an hybrid AD setup. user.localuserprincipalname always sends &amp;nbsp;the UPN which is what the gateway use when querying the data center service (Ms EntraID object)&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121204.png" style="width: 595px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33680iC064081224D6CD04/image-dimensions/595x342?v=v2" width="595" height="342" role="button" title="Screenshot 2026-03-10 121204.png" alt="Screenshot 2026-03-10 121204.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Ms Entra ID object, secret &amp;nbsp;&amp;amp; API permissions:&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121209.png" style="width: 515px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33681i75B3FA968B8C9200/image-dimensions/515x273?v=v2" width="515" height="273" role="button" title="Screenshot 2026-03-10 121209.png" alt="Screenshot 2026-03-10 121209.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121213.png" style="width: 516px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33682iF0BA4A5570BA5FB0/image-dimensions/516x330?v=v2" width="516" height="330" role="button" title="Screenshot 2026-03-10 121213.png" alt="Screenshot 2026-03-10 121213.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121219.png" style="width: 519px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33683i008F9153292C1169/image-dimensions/519x350?v=v2" width="519" height="350" role="button" title="Screenshot 2026-03-10 121219.png" alt="Screenshot 2026-03-10 121219.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121224.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33684i151A202FA9EFBB6B/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2026-03-10 121224.png" alt="Screenshot 2026-03-10 121224.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121229.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33685i652AC7E895AC9124/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2026-03-10 121229.png" alt="Screenshot 2026-03-10 121229.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Offer Office Mode IP &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Set Allow Office mode to all users.&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121235.png" style="width: 507px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33686i9D4F0EBCF409C484/image-dimensions/507x285?v=v2" width="507" height="285" role="button" title="Screenshot 2026-03-10 121235.png" alt="Screenshot 2026-03-10 121235.png" /&gt;&lt;/span&gt;&lt;P&gt;Set Remote Access VPN participating user groups to &lt;STRONG&gt;all users&lt;/STRONG&gt;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121240.png" style="width: 525px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33687i09A5059C453181B3/image-dimensions/525x306?v=v2" width="525" height="306" role="button" title="Screenshot 2026-03-10 121240.png" alt="Screenshot 2026-03-10 121240.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;In SmartDashboard, create your generic user profile&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121244.png" style="width: 527px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33688i814C49955B2896B6/image-dimensions/527x236?v=v2" width="527" height="236" role="button" title="Screenshot 2026-03-10 121244.png" alt="Screenshot 2026-03-10 121244.png" /&gt;&lt;/span&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the login option (authentication realm), create a new login option, in this example “Azure_EntraID” and select your Azure identity Provider&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121250.png" style="width: 500px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33689i26B9D73B5F23CE8C/image-dimensions/500x612?v=v2" width="500" height="612" role="button" title="Screenshot 2026-03-10 121250.png" alt="Screenshot 2026-03-10 121250.png" /&gt;&lt;/span&gt;&lt;P&gt;Under User Directory, Select &lt;STRONG&gt;Manual &amp;nbsp;configuration&lt;/STRONG&gt;-&amp;gt; &amp;nbsp;&lt;STRONG&gt;LDAP Users&lt;/STRONG&gt;, &lt;STRONG&gt;external user profiles&lt;/STRONG&gt; and set the &lt;STRONG&gt;LDAP Lookup type&lt;/STRONG&gt; to be of &lt;STRONG&gt;UPN &lt;/STRONG&gt;(remember the UPN is what the saml assertion is sending for the Unique User identifier) . &amp;nbsp;&lt;STRONG&gt;This is really important&lt;/STRONG&gt;. It can easily be overlooked especially if you don’t use LDAP. &amp;nbsp;From what I was told, under the hood, the LDAP code was re-written &amp;nbsp;to include querying Azure AD using Ms Graph.&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121255.png" style="width: 554px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33690i8DDD8CAB832C9915/image-dimensions/554x396?v=v2" width="554" height="396" role="button" title="Screenshot 2026-03-10 121255.png" alt="Screenshot 2026-03-10 121255.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;Another thing to check is that the user directory lookup is set to all&amp;nbsp; otherwise it will ignore the data center and only query the LDAP UD defined&amp;nbsp;&lt;BR /&gt;&lt;P&gt;  &lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 145826.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33701i378525D277C0F29F/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2026-03-10 145826.png" alt="Screenshot 2026-03-10 145826.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Now SSH &amp;nbsp;onto the gateway&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Back up the current configuration file:&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;cp -v $CPDIR/conf/DataCenterServicesRealms.conf{,_BKP}&lt;/STRONG&gt;&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Edit the current configuration file:&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&lt;STRONG&gt;vi $CPDIR/conf/DataCenterServicesRealms.conf&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Add this line at the bottom:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;vpn_&amp;lt;NAME OF SAML REALM&amp;gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Use the name of the Login option, not the display name. In my example &lt;STRONG&gt;vpn_ Azure_EntraID&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;This is a list of authentication realms for which the gateway is told &amp;nbsp;to query the data centre service (your Azure Entra ID object) &amp;nbsp;This is for the authorization part for retrieving group membership&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Verification:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;You can tell the integration is working by noticing the “&lt;STRONG&gt;aad_group_&lt;/STRONG&gt;” &amp;nbsp;groups automatically mapped to the user account.&lt;/P&gt;&lt;P&gt;Upon signing in, &amp;nbsp;the user is automatically assigned groups and roles which have an active use in the security policy. Here, notice that EntraID_CloudyWednesday is not showing. The gateway didn’t ask for it since it has no use for it.&amp;nbsp;&amp;nbsp; Same for ENTRA-RAVPN-USERS. Since we told the gateway to accept any user, on the checkpoint side, there is no knowledge this test user belongs to the RAVPN group.&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121300.png" style="width: 658px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33691iA2F439736688CDDD/image-dimensions/658x249?v=v2" width="658" height="249" role="button" title="Screenshot 2026-03-10 121300.png" alt="Screenshot 2026-03-10 121300.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;Use case 2 : &amp;nbsp;Restrict access to some user groups&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now if you really want to control the authentication part with a group ( I don’t have a very strong use case; maybe you don’t want to offer office mode to everyone or some SAML users can only use mobile access while others use ravpn), &amp;nbsp;you can configure Azure to send the group assigned to the entreprise application as part of the SAML assertion.&lt;/P&gt;&lt;P&gt;In Azure AD, Modify the Attributes and Claims as follows:&lt;/P&gt;&lt;P&gt;By default, Azure sends the group’s object ID. Whatever it sends you need to have a matching &lt;STRONG&gt;EXT_ID_&amp;lt;whatever&amp;gt;&lt;/STRONG&gt; local group.&lt;/P&gt;&lt;P&gt;Add group claim -&amp;gt; Group Assigned to the application -&amp;gt; Cloud Only group display names. Tick Customize the name and type &amp;nbsp;&lt;STRONG&gt;group_attr&lt;/STRONG&gt;&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121306.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33692i48B741A8315BE719/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2026-03-10 121306.png" alt="Screenshot 2026-03-10 121306.png" /&gt;&lt;/span&gt;&lt;P&gt;In my setup this was the way to go, I don’t have an hybrid environment. Other combinations may work. &amp;nbsp;If unsure, use a saml-tracer browser extension to check what Azure is sending and make sure CheckPoint expects it.&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121311.png" style="width: 577px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33693iA86229229A08937E/image-dimensions/577x345?v=v2" width="577" height="345" role="button" title="Screenshot 2026-03-10 121311.png" alt="Screenshot 2026-03-10 121311.png" /&gt;&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;P&gt;So for my ENTRA-RAVPN-USERS group, I created an empty EXT_ID_ ENTRA-RAVPN-USERS group which I then assigned to office mode and remote access community&lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121316.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33694i26234A2876922222/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot 2026-03-10 121316.png" alt="Screenshot 2026-03-10 121316.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121320.png" style="width: 613px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33695i5AA713E833ED3230/image-dimensions/613x175?v=v2" width="613" height="175" role="button" title="Screenshot 2026-03-10 121320.png" alt="Screenshot 2026-03-10 121320.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121325.png" style="width: 604px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33696i9933C0BC968A5D5A/image-dimensions/604x368?v=v2" width="604" height="368" role="button" title="Screenshot 2026-03-10 121325.png" alt="Screenshot 2026-03-10 121325.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-03-10 121331.png" style="width: 719px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33697i8C0FEDCA83CD6EAF/image-dimensions/719x300?v=v2" width="719" height="300" role="button" title="Screenshot 2026-03-10 121331.png" alt="Screenshot 2026-03-10 121331.png" /&gt;&lt;/span&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;And there it is, I’m now receiving the group names assigned to the entreprise apps as part of my SAML assertion. &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hope this will help someone. &lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 14:59:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/272983#M103960</guid>
      <dc:creator>Kurpeus</dc:creator>
      <dc:date>2026-03-10T14:59:07Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Authentication to Azure Entra ID with Authorization - Complete guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/272988#M103961</link>
      <description>&lt;P&gt;Thank you,,,,, this helps&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 12:36:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/272988#M103961</guid>
      <dc:creator>JacWev</dc:creator>
      <dc:date>2026-03-10T12:36:05Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Authentication to Azure Entra ID with Authorization - Complete guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/273002#M103962</link>
      <description>&lt;P&gt;Appreciate you writing this up!&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 14:15:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/273002#M103962</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-03-10T14:15:13Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Authentication to Azure Entra ID with Authorization - Complete guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/273018#M103969</link>
      <description>&lt;P&gt;Your article is very good, congratulations!&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 16:34:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/273018#M103969</guid>
      <dc:creator>WiliRGasparetto</dc:creator>
      <dc:date>2026-03-10T16:34:58Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Authentication to Azure Entra ID with Authorization - Complete guide</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/273019#M103970</link>
      <description>&lt;P&gt;Super useful &lt;span class="lia-unicode-emoji" title=":raising_hands:"&gt;🙌&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 16:48:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/273019#M103970</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-03-10T16:48:29Z</dc:date>
    </item>
  </channel>
</rss>

