<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Session Expiration-Captive Portal-Identity Awareness in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/183999#M33762</link>
    <description>&lt;P&gt;As far as I know, authenticated users shouldn't disappear on a policy installation.&lt;BR /&gt;As an example, see:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk79060" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk79060&lt;/A&gt;&lt;BR /&gt;As such, I recommend a TAC case: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the more general subject of Linux users with Identity Awareness, they can be authenticated with Active Directory like Windows machines.&lt;BR /&gt;Which means you should be able to use Identity Collector or Kerberos to acquire the identities.&lt;BR /&gt;That assumes the Linux machines are tied into Active Directory, of curse.&lt;/P&gt;
&lt;P&gt;To the best of my knowledge there are no plans to implement a native VPN client or Identity Awareness client for Linux.&lt;BR /&gt;Requests for these items should be discussed with your local Check Point office.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 14 Jun 2023 18:20:48 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-06-14T18:20:48Z</dc:date>
    <item>
      <title>Session Expiration-Captive Portal-Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/183931#M33754</link>
      <description>&lt;P&gt;Hello,&lt;BR /&gt;I have two 23500 R81.10 firewalls running in cluster mode. When I install a policy, the authentications of people who have verified themselves in Captive Portal drop. They have to login again.&lt;BR /&gt;&lt;BR /&gt;In addition, even though the session timeout period that I set on the gateway for Linux users who have to use Captive Portal does not expire, session times expire at irregular time intervals.&lt;BR /&gt;&lt;BR /&gt;It is unfortunate that Linux distributions do not have Identity Agent and VPN Client.&lt;BR /&gt;&lt;BR /&gt;Best wishes&lt;BR /&gt;Sukru Ozdemir&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 06:05:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/183931#M33754</guid>
      <dc:creator>sukruozdemir</dc:creator>
      <dc:date>2023-06-14T06:05:09Z</dc:date>
    </item>
    <item>
      <title>Re: Session Expiration-Captive Portal-Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/183999#M33762</link>
      <description>&lt;P&gt;As far as I know, authenticated users shouldn't disappear on a policy installation.&lt;BR /&gt;As an example, see:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk79060" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk79060&lt;/A&gt;&lt;BR /&gt;As such, I recommend a TAC case: &lt;A href="https://help.checkpoint.com" target="_blank"&gt;https://help.checkpoint.com&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;On the more general subject of Linux users with Identity Awareness, they can be authenticated with Active Directory like Windows machines.&lt;BR /&gt;Which means you should be able to use Identity Collector or Kerberos to acquire the identities.&lt;BR /&gt;That assumes the Linux machines are tied into Active Directory, of curse.&lt;/P&gt;
&lt;P&gt;To the best of my knowledge there are no plans to implement a native VPN client or Identity Awareness client for Linux.&lt;BR /&gt;Requests for these items should be discussed with your local Check Point office.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jun 2023 18:20:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/183999#M33762</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-06-14T18:20:48Z</dc:date>
    </item>
    <item>
      <title>Re: Session Expiration-Captive Portal-Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/184041#M33769</link>
      <description>&lt;P&gt;I was thinking that I can solve it without opening a case so that users do not fall in policy installation, but it turns out that I will have to open a case.&lt;BR /&gt;Collecting from AD with collector is not always a good solution for Linux users. We are using Exchange Server in our local, when the person using the computer logs in to a different e-mail address other than his own via /owa, the information he receives from collector AD changes and I begin to see it as if the common mail account is using that computer.&lt;BR /&gt;Installing an agent on the client is the most guaranteed solution for me, but unfortunately there is no agent even though there are many users on the linux side.&lt;BR /&gt;&lt;BR /&gt;Thank you for your response&lt;BR /&gt;Best wishes&amp;nbsp;&lt;BR /&gt;Sukru&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 07:45:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/184041#M33769</guid>
      <dc:creator>sukruozdemir</dc:creator>
      <dc:date>2023-06-15T07:45:51Z</dc:date>
    </item>
    <item>
      <title>Re: Session Expiration-Captive Portal-Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/184048#M33770</link>
      <description>&lt;P&gt;Hi Sukru,&lt;/P&gt;
&lt;P&gt;A workaround might be to schedule a cron job that enumerates the Netlogon share on a DC for example.&amp;nbsp; Anything that will cause a login event to be created, really.&amp;nbsp; You'd have to be mindful of password expiry and account lockouts though.&lt;/P&gt;
&lt;P&gt;Thanks,&lt;BR /&gt;Ruan&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jun 2023 08:44:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/184048#M33770</guid>
      <dc:creator>Ruan_Kotze</dc:creator>
      <dc:date>2023-06-15T08:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: Session Expiration-Captive Portal-Identity Awareness</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/184170#M33822</link>
      <description>&lt;P&gt;Hello Ruan,&lt;BR /&gt;Thank you for the information.&lt;BR /&gt;Kind regards&lt;BR /&gt;Sukru&lt;/P&gt;</description>
      <pubDate>Fri, 16 Jun 2023 06:35:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Session-Expiration-Captive-Portal-Identity-Awareness/m-p/184170#M33822</guid>
      <dc:creator>sukruozdemir</dc:creator>
      <dc:date>2023-06-16T06:35:50Z</dc:date>
    </item>
  </channel>
</rss>

