<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Captive portal transparent SSO authentication and switch user (logout/login) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226795#M43593</link>
    <description>&lt;P&gt;As far as I know, this is by design.&lt;/P&gt;
&lt;P&gt;Please correct me, if I'm wrong.&lt;/P&gt;
&lt;P&gt;When you use Identity Awareness Browser-Based Authentictation with transparent SSO (autoauth), there is no browser tab with captive portal site which will or can stay open for the full user user session, so you cannot use the portal setting "Log out users when they close the portal browser", right?&lt;/P&gt;
&lt;P&gt;And without that, the pdp just gets no notification, that user1 logs out of the machine and user2 logs in. PDP still uses that session entry entry for the ip address and does not reinitate authentication flow over captive portal.&lt;/P&gt;
&lt;P&gt;If you need to resolve that, you would have to use Identity Agents or Identity Collector. With using Identity Collector, you get an update in pdp side during login of user2. This will logout user1 IA session because of an implicit "assume one user per ip address setting".&lt;/P&gt;
&lt;P&gt;When you are concerned that someone malicous could re-use user1s ip address in your network before your configured IA session timer expires, you have to use Identity Agents (with a short agent session timeout), because in doing that, user1 session gets logged out when user1 logs out from the machine (while connected to network) or after the agent session timeout which can be much shorter that the session timeout for Captive Portal or Identity Collector due to Agent keepalive.&lt;/P&gt;</description>
    <pubDate>Mon, 16 Sep 2024 13:40:58 GMT</pubDate>
    <dc:creator>Tobias_Moritz</dc:creator>
    <dc:date>2024-09-16T13:40:58Z</dc:date>
    <item>
      <title>Captive portal transparent SSO authentication and switch user (logout/login)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226757#M43577</link>
      <description>&lt;P&gt;Hello!&lt;/P&gt;&lt;P&gt;I was configure transparent SSO (browser based authentication) and it work.&lt;/P&gt;&lt;P&gt;I login in my test VM and open browser, try to open blocked URL I get notification with my username (Testuser1).&lt;/P&gt;&lt;P&gt;I logout and login as Testuser2 and do it again and get notification but user is Testuser1.&lt;/P&gt;&lt;P&gt;If i execute pdp control revoke_ip &amp;lt;my vm ip&amp;gt; it work as expected.&lt;/P&gt;&lt;P&gt;What Ican I resilve this issue?&lt;/P&gt;&lt;P&gt;Thank You!&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 11:47:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226757#M43577</guid>
      <dc:creator>OlegPowerC</dc:creator>
      <dc:date>2024-09-16T11:47:30Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal transparent SSO authentication and switch user (logout/login)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226795#M43593</link>
      <description>&lt;P&gt;As far as I know, this is by design.&lt;/P&gt;
&lt;P&gt;Please correct me, if I'm wrong.&lt;/P&gt;
&lt;P&gt;When you use Identity Awareness Browser-Based Authentictation with transparent SSO (autoauth), there is no browser tab with captive portal site which will or can stay open for the full user user session, so you cannot use the portal setting "Log out users when they close the portal browser", right?&lt;/P&gt;
&lt;P&gt;And without that, the pdp just gets no notification, that user1 logs out of the machine and user2 logs in. PDP still uses that session entry entry for the ip address and does not reinitate authentication flow over captive portal.&lt;/P&gt;
&lt;P&gt;If you need to resolve that, you would have to use Identity Agents or Identity Collector. With using Identity Collector, you get an update in pdp side during login of user2. This will logout user1 IA session because of an implicit "assume one user per ip address setting".&lt;/P&gt;
&lt;P&gt;When you are concerned that someone malicous could re-use user1s ip address in your network before your configured IA session timer expires, you have to use Identity Agents (with a short agent session timeout), because in doing that, user1 session gets logged out when user1 logs out from the machine (while connected to network) or after the agent session timeout which can be much shorter that the session timeout for Captive Portal or Identity Collector due to Agent keepalive.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 13:40:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226795#M43593</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2024-09-16T13:40:58Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal transparent SSO authentication and switch user (logout/login)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226805#M43594</link>
      <description>&lt;P&gt;Thank You.&lt;/P&gt;&lt;P&gt;I will use AD Query and agent instead captive portal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 14:29:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226805#M43594</guid>
      <dc:creator>OlegPowerC</dc:creator>
      <dc:date>2024-09-16T14:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal transparent SSO authentication and switch user (logout/login)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226806#M43595</link>
      <description>&lt;P&gt;ADQuery is deprecated, I suggest using IdentityCollector instead.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 14:39:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226806#M43595</guid>
      <dc:creator>Tobias_Moritz</dc:creator>
      <dc:date>2024-09-16T14:39:05Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal transparent SSO authentication and switch user (logout/login)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226824#M43602</link>
      <description>&lt;P&gt;But it is the same method (both read the event log&amp;nbsp; in AD)&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 16:15:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226824#M43602</guid>
      <dc:creator>OlegPowerC</dc:creator>
      <dc:date>2024-09-16T16:15:40Z</dc:date>
    </item>
    <item>
      <title>Re: Captive portal transparent SSO authentication and switch user (logout/login)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226846#M43606</link>
      <description>&lt;P&gt;ADQuery actually uses WMI that is pushed from Active Directory versus Identity Collector, which reads the Event logs directly.&lt;BR /&gt;In neither case does it read Logout events.&lt;BR /&gt;I believe the only way to get an actual log out event is using an Identity Agent.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Sep 2024 20:04:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Captive-portal-transparent-SSO-authentication-and-switch-user/m-p/226846#M43606</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-09-16T20:04:53Z</dc:date>
    </item>
  </channel>
</rss>

