<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: User Directory vs. Identity Awareness in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/88454#M22706</link>
    <description>&lt;P&gt;Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 13 Jun 2020 23:24:00 GMT</pubDate>
    <dc:creator>efraim</dc:creator>
    <dc:date>2020-06-13T23:24:00Z</dc:date>
    <item>
      <title>User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/21862#M22700</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, community!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;One of our customers is asking for clarification regarding these two blades and honestly we’re kinda having a hard time giving it to them, since the information in course material and admins guides isn't clear enough for them.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I know - and please correct me if I'm wrong or not entirely right - UD is a management blade that will allow us to communicate with an LDAP server and manage users on that server directly from our Check Point infrastructure, as well as define authentication schemes for them; whereas IA will use the identities retrieved from, let's say, an AD, and maps them to their IPs and machine names so we can use that information in rules through access roles.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We've tried that "management vs enforcement" point of view, but they get confused because according to them, some parts of the material state you can have IA without UD, but then the guide says IA &lt;EM&gt;uses &lt;/EM&gt;UD. So, and I quote them, &lt;EM&gt;"which one is it?" &lt;IMG src="https://community.checkpoint.com/legacyfs/online/checkpoint/emoticons/laugh.png" /&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance for your comments!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;EDIT: they're running R80/R80.10.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 07 May 2018 22:54:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/21862#M22700</guid>
      <dc:creator>Carlos_Machado1</dc:creator>
      <dc:date>2018-05-07T22:54:31Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/21863#M22701</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Identity awareness just get identity from a source of authentication that can be used for things like access role and rule based on identity and can't be used for things like changing ad user password from blade like mobile access or endpoint client that require&amp;nbsp; user directory license.&lt;/P&gt;&lt;P&gt;At least this is what I understand &lt;img id="smileyhappy" class="emoticon emoticon-smileyhappy" src="https://community.checkpoint.com/i/smilies/16x16_smiley-happy.png" alt="Smiley Happy" title="Smiley Happy" /&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2018 07:14:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/21863#M22701</guid>
      <dc:creator>Marco_Valenti</dc:creator>
      <dc:date>2018-05-08T07:14:46Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/21864#M22702</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I get this question all the time in CCSA classes.&amp;nbsp; The TL;DR version of the answer is that as long as you have a firewall running at least R75 and a (free) CPSB-IA license, there is no need to enable UserDirectory or obtain a license for it UNLESS:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;1) You want the ability to manage LDAP users in a read/write situation; in the real world this generally happens over the still-quivering dead body of your LDAP server administrator (i.e. practically never!).&amp;nbsp; This will allow Remote Access VPN users to potentially change an expired password via the Check Point Remote Access VPN software as &lt;A href="https://community.checkpoint.com/migrated-users/42777"&gt;Marco Valenti&lt;/A&gt;‌ observed, and also allow changes to LDAP user passwords/groups directly via the Check Point SmartDashboard (which also requires an extension of the LDAP user schema).&amp;nbsp; This feature's checkbox is called "User Management" on the LDAP Account Unit object.&amp;nbsp; (see screenshot below)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;2) You want the ability to retrieve CRLs via LDAP instead of the more-typical HTTP or OCSP (not common).&amp;nbsp; This feature's checkbox is labelled "CRL retrieval" on the LDAP Account Unit object.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;3) You need to do an integration to an LDAP server that is not based on Microsoft Active Directory (i.e. Novell eDirectory, Netscape, Lotus Domino, etc).&amp;nbsp; I've never done an LDAP integration to a server that was not AD in over twenty years of Check Point experience, so that should give you an idea of how common it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The "Use UserDirectory for Security Gateways (license required)" checkbox on the Global Properties screen for UserDirectory/SmartDirectory does NOT need to be set for IA to operate, which runs counter to some of Check Point's documentation and the CCSA R80.10 courseware.&amp;nbsp;&amp;nbsp; When IA's AD Query feature is first set up the wizard automatically creates the needed Account Unit object through the underpinnings of UserDirectory which is where a lot of the confusion comes in.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG __jive_id="65433" alt="" class="image-1 jive-image j-img-original" src="https://community.checkpoint.com/legacyfs/online/checkpoint/65433_ua_ia.png" /&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;--&lt;BR /&gt;Second Edition of my "Max Power" Firewall Book&lt;BR /&gt;&lt;SPAN&gt;Now Available at &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="http://www.maxpowerfirewalls.com" rel="nofollow"&gt;http://www.maxpowerfirewalls.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 08 May 2018 16:53:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/21864#M22702</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2018-05-08T16:53:50Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/21865#M22703</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi there,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Apparently you also need to have a license and active User Directory if you want to use AD groups and users in the Include/Exclude settings of Threat Extraction. It's a bit surprising that such a basic feature requires this license while AD Query should be sufficient.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="link-titled" href="https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/120088.htm" title="https://sc1.checkpoint.com/documents/R77/CP_R77_ThreatPrevention_WebAdmin/120088.htm"&gt;Getting Started with the Threat Extraction Blade&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 12px;"&gt;n the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;STRONG class="" style="color: #000000; background-color: #ffffff; font-weight: bold; font-size: 12px; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Exclude/Include Users&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN style="color: #000000; background-color: #ffffff; font-size: 12px;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;page, configure these settings:&lt;/SPAN&gt;&lt;/P&gt;&lt;UL class="" style="color: #000000; background-color: #ffffff; font-size: 12px; margin-top: 3pt; margin-bottom: 0pt;"&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Scan all mail&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Exceptions&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to not include specified users, groups, recipients or senders.&lt;/P&gt;&lt;/LI&gt;&lt;LI class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 3pt 0pt 0pt; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Scan mail only for specific users or groups&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;Click&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Configure&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;to select specified User Groups, Recipients or Senders.&lt;/P&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Note&lt;/STRONG&gt;&lt;/STRONG&gt;:&lt;/P&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;A&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;user&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is an object that can contain an email address with other details.&lt;/P&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;A&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;group&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is an AD group or LDAP group of users&lt;/P&gt;&lt;P class="" style="color: #000000; background-color: inherit; font-weight: normal; text-decoration: none; text-indent: 0cm; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;A&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM class="" style="color: inherit; background-color: inherit; padding: 0pt;"&gt;recipient&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;is an email address only.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P class="" style="color: #000000; background-color: #ffffff; text-decoration: none; font-size: 12px; margin: 6pt 0cm; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Important&lt;/STRONG&gt;&lt;/STRONG&gt;: In&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;Global Properties &amp;gt; User Directory&lt;/STRONG&gt;&lt;/STRONG&gt;, make sure that you have selected the&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;STRONG class="" style="color: inherit; background-color: inherit; font-weight: bold; padding: 0pt;"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;Use User Directory for Security Gateways&lt;/STRONG&gt;&lt;/STRONG&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;option.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 13 Nov 2018 09:42:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/21865#M22703</guid>
      <dc:creator>Willem_Goethals</dc:creator>
      <dc:date>2018-11-13T09:42:35Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/85451#M22704</link>
      <description>Thank you Timothy.&lt;BR /&gt;&lt;BR /&gt;Only if I enable user management, I am able to see the select the domain when I enable Identity awareness. Do you know why? I got confused a bit.</description>
      <pubDate>Sat, 16 May 2020 00:36:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/85451#M22704</guid>
      <dc:creator>efraim</dc:creator>
      <dc:date>2020-05-16T00:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/85564#M22705</link>
      <description>&lt;P&gt;Yes the "User Management" checkbox on the AU object itself must be set for IA to work, although this checkbox was mentioned in my post in the context of User Directory.&amp;nbsp; What does not necessarily need to be set (subject to the conditions mentioned above) is the &lt;SPAN&gt;"Use UserDirectory for Security Gateways (license required)"&lt;/SPAN&gt; checkbox in the Global Properties.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 17 May 2020 14:32:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/85564#M22705</guid>
      <dc:creator>Timothy_Hall</dc:creator>
      <dc:date>2020-05-17T14:32:02Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/88454#M22706</link>
      <description>&lt;P&gt;Thank you &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 13 Jun 2020 23:24:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/88454#M22706</guid>
      <dc:creator>efraim</dc:creator>
      <dc:date>2020-06-13T23:24:00Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/99937#M22707</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a question regarding User Directory and Identity Management. Can I use only User Active Directory on Management Server, without Identity Management on Gateways ?&lt;/P&gt;&lt;P&gt;I want to integrate a Checkpoint Infrastructure with 1 Mgmt and 2 GWs with AD, then to create some policies for remote VPN by using Groups of AD.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know that using IA, you cannot retrieve info from AD Groups, you need UD to do this or Am I wrong ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 23 Oct 2020 10:09:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/99937#M22707</guid>
      <dc:creator>armandxhafa</dc:creator>
      <dc:date>2020-10-23T10:09:02Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/100107#M22708</link>
      <description>&lt;P&gt;You can create Access Roles for Remote Access with more granularity using Identity Awareness, which can be restricted to Remote Access.&lt;BR /&gt;This would be the preferred approach versus using legacy groups/objects.&lt;/P&gt;</description>
      <pubDate>Mon, 26 Oct 2020 04:21:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/100107#M22708</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-10-26T04:21:13Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/104090#M22709</link>
      <description>&lt;P&gt;Finally! The answer I have been looking for;&lt;/P&gt;&lt;P&gt;&amp;gt;I have always been confused and conflicted with CP's documentation. CP's LDAP Best practice guide (under SK31841) recommends that it should be enabled, but as per our testing it just works even if disabled (and has been working for all of our clients deployed with CP's Firewall)&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2020 03:49:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/104090#M22709</guid>
      <dc:creator>FriedBacon</dc:creator>
      <dc:date>2020-12-03T03:49:07Z</dc:date>
    </item>
    <item>
      <title>Re: User Directory vs. Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/147346#M23514</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I am currently working on configuring Machine certificate. But I have a question. How can I integrate my FW with my Microsoft AD in order to find the users and computers that belong to said AD? I need to do this to be able to create the Access roles&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Thu, 28 Apr 2022 14:17:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/User-Directory-vs-Identity-Awareness/m-p/147346#M23514</guid>
      <dc:creator>yunier88</dc:creator>
      <dc:date>2022-04-28T14:17:42Z</dc:date>
    </item>
  </channel>
</rss>

