<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enabling 2FA on Remote Access VPN Gateway for Vendors in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-2FA-on-Remote-Access-VPN-Gateway-for-Vendors/m-p/274047#M104374</link>
    <description>&lt;P&gt;Hello Simon,&lt;/P&gt;&lt;P&gt;Thanks for responding. Yes, i have created a username and password + dynamicID authentication method under mobile access &amp;gt; authentication on the specific gateway. I am trying to enforce this, and not make it an option. WIll this change not make staff need a 2nd OTP from their email? as they already authenticate via a RADIUS Server + OTP.&lt;/P&gt;</description>
    <pubDate>Tue, 24 Mar 2026 07:39:50 GMT</pubDate>
    <dc:creator>chuka01</dc:creator>
    <dc:date>2026-03-24T07:39:50Z</dc:date>
    <item>
      <title>Enabling 2FA on Remote Access VPN Gateway for Vendors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-2FA-on-Remote-Access-VPN-Gateway-for-Vendors/m-p/274045#M104372</link>
      <description>&lt;P&gt;We have a customer who uses a gateway (it is in a cluster, but is the only cluster member) for remote access VPN, for both staff and vendors. Staff login with their domain credentials and their authentication method is a RADIUS server with 2FA enabled. Vendors authenticate with their checkpoint account password into a server where they have to input another set of domain credentials.&lt;/P&gt;&lt;P&gt;Now this customer wants to enable 2FA for those vendor accounts, and I suggested dynamicID with the OTP sent to the vendor's emails. I am thinking that enabling dynamicID on the gateway will also require their staff accounts for another 2FA code, which makes the workflow more inconvenient for staff. Can anyone help with a safe and secure way to enable 2FA just for vendor accounts? Thank you.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 07:07:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-2FA-on-Remote-Access-VPN-Gateway-for-Vendors/m-p/274045#M104372</guid>
      <dc:creator>chuka01</dc:creator>
      <dc:date>2026-03-24T07:07:59Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling 2FA on Remote Access VPN Gateway for Vendors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-2FA-on-Remote-Access-VPN-Gateway-for-Vendors/m-p/274046#M104373</link>
      <description>&lt;P&gt;Hello&lt;/P&gt;&lt;P&gt;did you evaluate to configure the multiple login option and create a specific authentication mode for thi vendors? When configured, they could change the authentication settings into their VPN client to use this new authentication mode.&lt;/P&gt;&lt;P&gt;Here are the steps from the admin guide:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_MobileAccess_AdminGuide/Content/Topics-MABG/Multiple-Login-Options.htm" target="_blank"&gt;https://sc1.checkpoint.com/documents/R82/WebAdminGuides/EN/CP_R82_MobileAccess_AdminGuide/Content/Topics-MABG/Multiple-Login-Options.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;(it R82 version, and specific for the Mobile Access, but it's the same also on previous versions, and multiple login option can be configured also under the VPN clients section).&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 07:31:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-2FA-on-Remote-Access-VPN-Gateway-for-Vendors/m-p/274046#M104373</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-03-24T07:31:54Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling 2FA on Remote Access VPN Gateway for Vendors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-2FA-on-Remote-Access-VPN-Gateway-for-Vendors/m-p/274047#M104374</link>
      <description>&lt;P&gt;Hello Simon,&lt;/P&gt;&lt;P&gt;Thanks for responding. Yes, i have created a username and password + dynamicID authentication method under mobile access &amp;gt; authentication on the specific gateway. I am trying to enforce this, and not make it an option. WIll this change not make staff need a 2nd OTP from their email? as they already authenticate via a RADIUS Server + OTP.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 07:39:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-2FA-on-Remote-Access-VPN-Gateway-for-Vendors/m-p/274047#M104374</guid>
      <dc:creator>chuka01</dc:creator>
      <dc:date>2026-03-24T07:39:50Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling 2FA on Remote Access VPN Gateway for Vendors</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-2FA-on-Remote-Access-VPN-Gateway-for-Vendors/m-p/274109#M104411</link>
      <description>&lt;P&gt;If you don't want it to apply to staff, you will need to add DynamicID as part of Multiple Login Options instead.&lt;/P&gt;</description>
      <pubDate>Tue, 24 Mar 2026 23:32:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-2FA-on-Remote-Access-VPN-Gateway-for-Vendors/m-p/274109#M104411</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-03-24T23:32:37Z</dc:date>
    </item>
  </channel>
</rss>

