<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AD User rights for LDAP Account Unit configuration used with Identity Collector in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111913#M25171</link>
    <description>&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;This is an old post but were you ale to find documented informations regarding this? I have almost the same question:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Moving from AD query (with an Account User with High privileges on the AD) to Identity Collector&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is fine that Idnetity Collector needs a read only user account, but we still require a user for the LDAP account unit used by the Gateways.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
    <pubDate>Fri, 26 Feb 2021 15:47:58 GMT</pubDate>
    <dc:creator>DR_74</dc:creator>
    <dc:date>2021-02-26T15:47:58Z</dc:date>
    <item>
      <title>AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48505#M25164</link>
      <description>&lt;P&gt;What are the AD user rights required for the LDAP Account Unit configuration when it is supposed to be used with Identity Collector?&lt;/P&gt;
&lt;P&gt;In the Identity Collector configuration guide, it states:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Identity collector provides information about users, machines and IP addresses to the Security Gateway. &lt;FONT color="#FF6600"&gt;LDAP Account Unit(s) should be configured to allow PDP gateways to perform group lookups on IDs that are provided from Identity Collector to match them to Access Roles.&amp;nbsp;&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;But all the references to the LDAP Account Unit configuration describe the account as having Admin rights on the domain.&lt;/P&gt;
&lt;P&gt;This contradicts the intended deployment model and I do not think it is necessary, if we are simply querying the AD group membership data.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 16:09:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48505#M25164</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-25T16:09:58Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48531#M25165</link>
      <description>&lt;P&gt;&amp;nbsp;I remember there was an sk article &amp;nbsp;with the needed rights, but I can‘t find them. Maybe one another will have more luck with the correct words to type in the search field.&lt;/P&gt;&lt;P&gt;We are running this with a user having only read rights in all OUs with groups and users.&lt;/P&gt;&lt;P&gt;Wolfgang&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 20:01:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48531#M25165</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2019-03-25T20:01:35Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48534#M25166</link>
      <description>&lt;P&gt;You just need the account to be a member of "Event Log Readers"&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 20:50:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48534#M25166</guid>
      <dc:creator>Aidan_Luby</dc:creator>
      <dc:date>2019-03-25T20:50:39Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48539#M25167</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8559"&gt;@Aidan_Luby&lt;/a&gt;&amp;nbsp;, there are two different accounts referenced: one, as you described it, with the "Event Log Readers" permission that is assigned to the IdentityCollector. The LDAP Account unit is an additional account necessary to determine group memberships in AD.&lt;/P&gt;
&lt;P&gt;Perhaps same rights would work for both, but it is not defined anywhere in documentation that I was able to find.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 21:54:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48539#M25167</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-25T21:54:41Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48591#M25168</link>
      <description>&lt;P&gt;For IDC usage you need a user with LDAP read in the LDAP AU and a user with LDAP read + Event Log Readers Group on IDC.&lt;BR /&gt;For sure the most implementations will use the same user on the AU, as on the IDC, because one user can serve both.&lt;BR /&gt;&lt;BR /&gt;If you also use the AU for Remote Access, then you might also need write on LDAP if the users shall be able to change their own passwords if they expire. But this is a different story&amp;nbsp;&lt;img id="smileywink" class="emoticon emoticon-smileywink" src="https://community.checkpoint.com/i/smilies/16x16_smiley-wink.png" alt="Smiley Wink" title="Smiley Wink" /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 07:59:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48591#M25168</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2019-03-26T07:59:01Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48656#M25169</link>
      <description>&lt;P&gt;Thank you&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1433"&gt;@Norbert_Bohusch&lt;/a&gt;&amp;nbsp;. It makes perfect sense, but I was looking for some pointer to the Check Point's official references to this data, as one of my clients has to justify the rights they grant to accounts and I've seen nothing but admin requirements for LDAP AU.&lt;/P&gt;
&lt;P&gt;If you happen to come across such a document, please let me know.&lt;/P&gt;
&lt;P&gt;BTW, I prefer to use separate accounts for these two functions to simplify differentiation in the tracking their actions in AD logs, but this is just me.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 26 Mar 2019 13:08:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/48656#M25169</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2019-03-26T13:08:02Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/99991#M25170</link>
      <description>Hi all , i beleive sk93938 is what you are looking for</description>
      <pubDate>Fri, 23 Oct 2020 18:44:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/99991#M25170</guid>
      <dc:creator>TOM_MORAN</dc:creator>
      <dc:date>2020-10-23T18:44:43Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111913#M25171</link>
      <description>&lt;P&gt;Hi Vladimir,&lt;/P&gt;&lt;P&gt;This is an old post but were you ale to find documented informations regarding this? I have almost the same question:&amp;nbsp;&lt;/P&gt;&lt;P&gt;Moving from AD query (with an Account User with High privileges on the AD) to Identity Collector&amp;nbsp;&lt;/P&gt;&lt;P&gt;That is fine that Idnetity Collector needs a read only user account, but we still require a user for the LDAP account unit used by the Gateways.&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 15:47:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111913#M25171</guid>
      <dc:creator>DR_74</dc:creator>
      <dc:date>2021-02-26T15:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111915#M25172</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/6975"&gt;@DR_74&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Unfortunately, the very limited guidelines we have on LDAP AU is limited to either making those full domain admin (which I reject as an exceptionally bad idea) or an account with slightly more limited rights described here in &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk93938" target="_self"&gt;sk93938&lt;/A&gt; "Using Identity Awareness AD Query without Active Directory Administrator privileges on Windows Server 2008 and higher."&lt;/P&gt;
&lt;P&gt;Even as described in sk93938, the account has too many rights for my taste. I cannot guarantee that, but I am pretty sure it would work if you create a Group Policy that will be applied to that account to strip from it RDP, logon locally and shutdown and reboot server capabilities.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 16:34:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111915#M25172</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2021-02-26T16:34:46Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111916#M25173</link>
      <description>&lt;P&gt;For the account unit user you need just read for the whole AD.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 16:41:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111916#M25173</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2021-02-26T16:41:30Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111932#M25174</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1433"&gt;@Norbert_Bohusch&lt;/a&gt; , when you create the AU with "AD read all" and then, during AD Query implementation, specifying same user account, are you not getting prompt that "the user is not a domain admin?"&lt;/P&gt;
&lt;P&gt;Do you happen to have a reference to the Check Point sk describing the use of "AD Read All" account for AUs? I would really like to see that.&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Vladimir&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 19:12:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111932#M25174</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2021-02-26T19:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111941#M25175</link>
      <description>&lt;P&gt;He said he is moving from AD Query to IDC and then you will not need more.&lt;/P&gt;
&lt;P&gt;For AD Query there is sk93938,&amp;nbsp;which outlines the needed rights for this user.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 22:20:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111941#M25175</guid>
      <dc:creator>Norbert_Bohusch</dc:creator>
      <dc:date>2021-02-26T22:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111942#M25176</link>
      <description>&lt;P&gt;True that, but I do not recall seeing CP document stating this AU requirement specifically for IDC configuration.&lt;/P&gt;
&lt;P&gt;If you can point me to it, I'd be much obliged.&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 22:23:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/111942#M25176</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2021-02-26T22:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/152086#M25177</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/11879"&gt;@Vladimir&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do you have an update for this question?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2022 03:45:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/152086#M25177</guid>
      <dc:creator>MtxMan</dc:creator>
      <dc:date>2022-06-30T03:45:14Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/152087#M25178</link>
      <description>&lt;P&gt;I do not, but it looks like I'll be implementing IDC for one of my clients within a month and may update this thread then.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Jun 2022 03:54:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/152087#M25178</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2022-06-30T03:54:43Z</dc:date>
    </item>
    <item>
      <title>Re: AD User rights for LDAP Account Unit configuration used with Identity Collector</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/152106#M25183</link>
      <description>&lt;P&gt;hey,&lt;/P&gt;
&lt;P&gt;This is the only thing I found when we started to look and implement IA with IC.&lt;/P&gt;
&lt;P&gt;Hope it helps...&lt;/P&gt;
&lt;P&gt;&lt;CITE style="margin: 0in; font-family: Calibri; font-size: 9.0pt; color: #595959;"&gt;"&lt;/CITE&gt;&lt;SPAN&gt;Working with&amp;nbsp;Active Directory&amp;nbsp;Domains&amp;nbsp;in the&amp;nbsp;Identity Collector&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="margin: 0in; font-family: 'Open Sans'; font-size: 10.5pt; color: #333333;"&gt;&lt;SPAN&gt;To add new&amp;nbsp;Active Directory&amp;nbsp;Domain&amp;nbsp;in the&amp;nbsp;Identity Collector:&lt;/SPAN&gt;&lt;/P&gt;
&lt;OL style="direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 10.5pt; font-weight: normal; font-style: normal;" type="1"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: #333333;" value="1"&gt;&lt;SPAN&gt;Open the&amp;nbsp;Identity Collector&amp;nbsp;application.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: #333333;"&gt;&lt;SPAN&gt;At the top, click&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Domains&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: #333333;"&gt;&lt;SPAN&gt;From the top toolbar, click&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;New&amp;nbsp;Domain&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;(&lt;/SPAN&gt;).&lt;/LI&gt;
&lt;/OL&gt;
&lt;OL style="direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in; font-family: Calibri; font-size: 10.5pt; font-weight: normal; font-style: normal;" type="1"&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: #333333;" value="4"&gt;&lt;SPAN&gt;Enter the&amp;nbsp;Domain&amp;nbsp;name to show in the&amp;nbsp;Identity Collector.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: #333333;"&gt;&lt;SPAN&gt;(Optional) Enter the comment.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI style="margin-top: 0; margin-bottom: 0; vertical-align: middle; color: #333333;"&gt;&lt;SPAN&gt;Enter the&amp;nbsp;Domain&amp;nbsp;account credentials -&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Username&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;and&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Password&lt;/SPAN&gt;&lt;SPAN&gt;.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;DIV style="direction: ltr;"&gt;
&lt;TABLE style="direction: ltr; border-collapse: collapse; margin-left: .3333in; border: 0pt solid #A3A3A3;" title="" border="0" summary="" cellspacing="0" cellpadding="0"&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="66.0469px" height="69px" style="border-width: 0pt; vertical-align: top; width: .6881in; padding: 4pt 4pt 4pt 4pt;"&gt;
&lt;DIV id="tinyMceEditor_de1872bc5f3b2cSorin_Gogean_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;/TD&gt;
&lt;TD width="419.594px" height="69px" style="border-width: 0pt; vertical-align: top; width: 4.3708in; padding: 4pt 4pt 4pt 4pt;"&gt;
&lt;P style="margin: 0in; font-family: 'Open Sans'; font-size: 10.5pt;"&gt;&lt;SPAN&gt;Note&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;- The account must be a member of the&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN&gt;Event Log Readers&lt;/SPAN&gt;&lt;SPAN&gt;&amp;nbsp;group.&lt;/SPAN&gt;&lt;/P&gt;
&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;SPAN&gt;"&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;DIV style="direction: ltr;"&gt;&lt;CITE style="margin: 0in; font-family: Calibri; font-size: 9.0pt; color: #595959;"&gt;&lt;A href="https://sc1.checkpoint.com/documents/R80.40/WebAdminGuides/EN/CP_R80.40_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Configuring-Identity-Collector-Working-with-Active-Directory-Domains.htm?tocpath=Configuring%20Identity%20Sources%7CConfiguring%20Identity%20Collector%7C_____7#Working_with_Active_Directory_Domains_in_the_Identity_Collector" target="_self"&gt;From here&lt;/A&gt;&lt;/CITE&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 30 Jun 2022 09:27:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AD-User-rights-for-LDAP-Account-Unit-configuration-used-with/m-p/152106#M25183</guid>
      <dc:creator>Sorin_Gogean</dc:creator>
      <dc:date>2022-06-30T09:27:16Z</dc:date>
    </item>
  </channel>
</rss>

