<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Legacy authentication and Identity Awareness Difference in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92053#M10713</link>
    <description>&lt;P&gt;That could be a solution, but with client auth I could adjust the timeout per rule. That is very flexible. If we know from one partner that he has to do a bigger change, we raise that timeout for that partner to 8h while other partners still have a timeout of 4h. That can be done per rule and so we were able to raise the timeout for one partner only.&lt;/P&gt;&lt;P&gt;Is there a possibility with IA too? At the moment this is the only thing which holds us from changeing to IA for now.&lt;/P&gt;&lt;P&gt;Thank you for your help in advance.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sascha&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Jul 2020 11:51:40 GMT</pubDate>
    <dc:creator>Sascha_Hasenst1</dc:creator>
    <dc:date>2020-07-21T11:51:40Z</dc:date>
    <item>
      <title>Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91801#M10703</link>
      <description>&lt;P&gt;Hi Team,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are using Legacy Authentication ( Client Auth ) in our environment. We have been recommended by TAC to move to Identity Awareness&amp;nbsp; &amp;nbsp;as client auth is an old method.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I need to ask&amp;nbsp; if there is any real advantage of using identity awareness rather than client auth as its still supported in R80.30 ?&lt;/P&gt;&lt;P&gt;The only limitation is that t&lt;SPAN&gt;he Client Auth option is available for layers that only have the firewall blade enabled, so this means it cannot be used with the application control blade.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;What limitations of client auth&amp;nbsp;over identity&amp;nbsp;awareness&amp;nbsp;?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Regards,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Sijeel Malik&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2020 16:16:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91801#M10703</guid>
      <dc:creator>Malik1</dc:creator>
      <dc:date>2020-07-17T16:16:12Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91806#M10704</link>
      <description>&lt;P&gt;Client Auth only allows you to use legacy forms of authentication.&lt;BR /&gt;It does not support blades other than firewall or work in policy layers beyond the first layer or with blades other than firewall.&lt;BR /&gt;You cannot leverage the additional granularity you get from Access Roles or get pervasive knowledge of acquired identities even in contexts where identity isn’t strictly required.&lt;/P&gt;
&lt;P&gt;There may be other limitations present today, or added in the future should you continue to use Client Auth.&lt;BR /&gt;Best to migrate away from this legacy feature ASAP.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jul 2020 18:12:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91806#M10704</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-17T18:12:18Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91831#M10705</link>
      <description>&lt;P&gt;Client auth.&lt;/P&gt;&lt;P&gt;1. causes issues with acceleration (connection templates)&lt;/P&gt;&lt;P&gt;2. all authenticated sessions are blown away during a policy push*&lt;/P&gt;&lt;P&gt;3. all sessions are tied to rule number. Insert a rule above the authentication rule and now everyone's session break.&lt;/P&gt;&lt;P&gt;You can work around #2 with a table.def change however you can't for #3.&lt;/P&gt;&lt;P&gt;IA portal doesn't have any of those issues.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 11:26:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91831#M10705</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-07-18T11:26:41Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91832#M10706</link>
      <description>&lt;P&gt;Thanks ,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But are there any compatibility issues with using client auth in R80 ? As far as&amp;nbsp; I know there aren't any&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 11:58:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91832#M10706</guid>
      <dc:creator>Malik1</dc:creator>
      <dc:date>2020-07-18T11:58:02Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91846#M10708</link>
      <description>&lt;P&gt;It is incompatible with certain features as we already described in this thread.&lt;BR /&gt;There may be additional incompatibilities now or in future versions because, this being a legacy feature, it gets minimal testing in QA.&lt;BR /&gt;Identity Awareness has been available for several major versions now.&lt;/P&gt;
&lt;P&gt;My question to you: why the resistance to this change?&lt;BR /&gt;Is there something Identity Awareness doesn’t do that Client Auth does?&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 15:27:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91846#M10708</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-18T15:27:37Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91849#M10709</link>
      <description>&lt;P&gt;Its more of a political thing&amp;nbsp; where we need to explain our client&amp;nbsp; the benefits of migrating to IA&amp;nbsp; .&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 16:06:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91849#M10709</guid>
      <dc:creator>Malik1</dc:creator>
      <dc:date>2020-07-18T16:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91851#M10710</link>
      <description>&lt;P&gt;You could edit the legacy client auth html pages to link to the new IA portal and tell users to update urls. Could also do a count down with js that then redirects.&lt;/P&gt;</description>
      <pubDate>Sat, 18 Jul 2020 17:22:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/91851#M10710</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-07-18T17:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92005#M10711</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;yes there is one difference I can do with client-Auth but not with identity awareness (as I know). With IA it is not possible to limit the duration of a session.&lt;/P&gt;&lt;P&gt;We are using Client-Auth for maintenance-access for partners. With client auth I can limit the session length to, let's say, 4h. With IA I'm not aware&amp;nbsp;of that option.&lt;/P&gt;&lt;P&gt;Is there a option with IA to limit the session length?&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sascha&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 05:25:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92005#M10711</guid>
      <dc:creator>Sascha_Hasenst1</dc:creator>
      <dc:date>2020-07-21T05:25:40Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92050#M10712</link>
      <description>&lt;P&gt;You can set the timeout for captive portal authentication here, your users would connect to URL &lt;A href="https://198.51.100.7/connect" target="_blank" rel="noopener"&gt;https://198.51.100.7/connect&lt;/A&gt;&amp;nbsp;in this example, and you would also need to make the captive portal accessible from external interfaces under the Edit button for Access Settings...Accessibility:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="CP_timeout.jpg" style="width: 888px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7335iE78AEF25285FED19/image-size/large?v=v2&amp;amp;px=999" role="button" title="CP_timeout.jpg" alt="CP_timeout.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 11:45:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92050#M10712</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-07-21T11:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92053#M10713</link>
      <description>&lt;P&gt;That could be a solution, but with client auth I could adjust the timeout per rule. That is very flexible. If we know from one partner that he has to do a bigger change, we raise that timeout for that partner to 8h while other partners still have a timeout of 4h. That can be done per rule and so we were able to raise the timeout for one partner only.&lt;/P&gt;&lt;P&gt;Is there a possibility with IA too? At the moment this is the only thing which holds us from changeing to IA for now.&lt;/P&gt;&lt;P&gt;Thank you for your help in advance.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sascha&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 11:51:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92053#M10713</guid>
      <dc:creator>Sascha_Hasenst1</dc:creator>
      <dc:date>2020-07-21T11:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92069#M10714</link>
      <description>&lt;P&gt;Are you familiar with the use of time objects in the access policy?&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 13:32:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92069#M10714</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2020-07-21T13:32:57Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92074#M10715</link>
      <description>&lt;P&gt;I think so, but how can I configure a duration of 4h starting from login with time-objects? If it is possible, I don't know how. Could you please post a picture how that can be configured?&lt;/P&gt;&lt;P&gt;Thank you in advance.&lt;/P&gt;&lt;P&gt;Best regards&lt;/P&gt;&lt;P&gt;Sascha&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 14:00:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92074#M10715</guid>
      <dc:creator>Sascha_Hasenst1</dc:creator>
      <dc:date>2020-07-21T14:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92082#M10716</link>
      <description>&lt;P&gt;Time objects gives you a window to access, it doesn’t allow you to adjust the time between reauthentication.&lt;BR /&gt;Sounds like an RFE&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8232"&gt;@Royi_Priov&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 14:37:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92082#M10716</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-21T14:37:43Z</dc:date>
    </item>
    <item>
      <title>Re: Legacy authentication and Identity Awareness Difference</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92102#M10717</link>
      <description>&lt;P&gt;So you're right that you can't do per rule limits however there is another factor i forgot to bring up with IA that may just change how you agree to have client auth rules. Legacy client auth has no way to tell when the access is no longer needed unless someone logs in and hits the sign out button. I think the sun may burn out before that happens. With captive portal you can configure it so that the user needs to keep open a web page and once they close it their access shuts down. This means if someone starts a 8 hour window and finishes in 30 mins the access they had open goes away unlike client auth which would remain open for another 7 hours and 30 mins.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Jul 2020 19:59:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Legacy-authentication-and-Identity-Awareness-Difference/m-p/92102#M10717</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-07-21T19:59:19Z</dc:date>
    </item>
  </channel>
</rss>

