<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Identity Awareness - AD User Session in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-User-Session/m-p/183144#M33629</link>
    <description>&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I'm facing a difficulty regarding Identity Awareness. We have configured the environment to display the captive portal when a machine outside the domain opens the browser and tries to access a website.&lt;/P&gt;
&lt;P&gt;However, we have also configured it so that when a machine within the domain with an authenticated AD user opens the browser, Check Point should recognize this authentication and allow browsing.&lt;/P&gt;
&lt;P&gt;The problem is that the same machine, on the first test, was within the domain and had an authenticated user, so browsing was automatically allowed as expected. But when testing the same machine by removing it from the domain and logging in with a local user, it still had the same permissions as in the previous test, as if the AD user session was stuck on the Check Point.&lt;/P&gt;
&lt;P&gt;How can we make Check Point recognize that the user has logged out from a particular machine and when the local user tries to browse, display the captive portal for them?&lt;/P&gt;
&lt;P&gt;Is there any configuration that associates the initially authenticated user with the machine?&lt;/P&gt;</description>
    <pubDate>Sat, 03 Jun 2023 15:44:02 GMT</pubDate>
    <dc:creator>Bernardes</dc:creator>
    <dc:date>2023-06-03T15:44:02Z</dc:date>
    <item>
      <title>Identity Awareness - AD User Session</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-User-Session/m-p/183144#M33629</link>
      <description>&lt;P&gt;Dear all,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;I'm facing a difficulty regarding Identity Awareness. We have configured the environment to display the captive portal when a machine outside the domain opens the browser and tries to access a website.&lt;/P&gt;
&lt;P&gt;However, we have also configured it so that when a machine within the domain with an authenticated AD user opens the browser, Check Point should recognize this authentication and allow browsing.&lt;/P&gt;
&lt;P&gt;The problem is that the same machine, on the first test, was within the domain and had an authenticated user, so browsing was automatically allowed as expected. But when testing the same machine by removing it from the domain and logging in with a local user, it still had the same permissions as in the previous test, as if the AD user session was stuck on the Check Point.&lt;/P&gt;
&lt;P&gt;How can we make Check Point recognize that the user has logged out from a particular machine and when the local user tries to browse, display the captive portal for them?&lt;/P&gt;
&lt;P&gt;Is there any configuration that associates the initially authenticated user with the machine?&lt;/P&gt;</description>
      <pubDate>Sat, 03 Jun 2023 15:44:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-User-Session/m-p/183144#M33629</guid>
      <dc:creator>Bernardes</dc:creator>
      <dc:date>2023-06-03T15:44:02Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD User Session</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-User-Session/m-p/183164#M33637</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/82249"&gt;@Bernardes&lt;/a&gt;&amp;nbsp;only login events are logged in Active Directory, There is a default timeout with identity awareness how long a user to IP association will be active. If a new user does login on the &amp;nbsp;same host a new user to IP association will be created. But if this is not a domainuser no one get the information who is logging in, because this is no domain event.&lt;/P&gt;
&lt;P&gt;The solution to identify local and domain users is the Identity Agent. But be aware, if you use local user „myuser01“ on host A and local user „myuser01“ on host B, they have the same name but they are not the same.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 04 Jun 2023 20:03:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-User-Session/m-p/183164#M33637</guid>
      <dc:creator>Wolfgang</dc:creator>
      <dc:date>2023-06-04T20:03:56Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness - AD User Session</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-User-Session/m-p/183232#M33657</link>
      <description>&lt;P&gt;Only way to do that is by deploying one of the &lt;A href="https://support.checkpoint.com/results/sk/sk134312" target="_blank"&gt;Identity Agents&lt;/A&gt;.&lt;/P&gt;</description>
      <pubDate>Mon, 05 Jun 2023 15:49:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-AD-User-Session/m-p/183232#M33657</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-05T15:49:06Z</dc:date>
    </item>
  </channel>
</rss>

