<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: AzureAD Identity Awareness on VSX - sk179788 in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230604#M44367</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;it is a symbolic link:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;lrwxrwxrwx 1 admin root 43 Aug 16 11:25 DataCenterServicesRealms.conf -&amp;gt; ../.. /../conf/DataCenterServicesRealms.conf&lt;/P&gt;
&lt;P&gt;So if yo want different configuration you will have to remove the symbolic link and create a new file for every VS,&lt;/P&gt;
&lt;P&gt;It's the same if you want to have different trac_client_1.ttm for different VS.&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;</description>
    <pubDate>Wed, 23 Oct 2024 14:32:13 GMT</pubDate>
    <dc:creator>Jan_Kleinhans</dc:creator>
    <dc:date>2024-10-23T14:32:13Z</dc:date>
    <item>
      <title>AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230400#M44336</link>
      <description>&lt;P&gt;Hi all,&lt;BR /&gt;&lt;BR /&gt;I wonder if anyone else has experienced this.&lt;BR /&gt;We have been setting up AzureAD for Access Roles in Identity Awareness, for Virtual Systems on VSX clusters.&lt;BR /&gt;&lt;BR /&gt;We have been following this SK with great success - &lt;SPAN&gt;sk179788&lt;/SPAN&gt;:&lt;BR /&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk179788" target="_blank" rel="noopener"&gt;Access Roles with groups/users from Azure AD object are not enforced when using Remote Access VPN with SAML&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;When we did this today, we managed to break another Virtual System's Identity Awareness.&lt;BR /&gt;We quickly found out that that when we modified the Realms file of one VS:&lt;BR /&gt;&lt;SPAN&gt;$CPDIR/conf/DataCenterServicesRealms.conf&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;This propagated to the realms file of ALL other Virtual Systems.&lt;BR /&gt;&lt;BR /&gt;Example:&lt;BR /&gt;1. We added a line to the realms file of VS ID 11:&lt;BR /&gt;&lt;SPAN&gt;/opt/CPshrd-R81.10/CTX/CTX00011/conf/DataCenterServicesRealms.conf&lt;/SPAN&gt;&lt;BR /&gt;2. This line is then also added to the realms file of VS ID 14:&lt;BR /&gt;&lt;SPAN&gt;/opt/CPshrd-R81.10/CTX/CTX00014/conf/DataCenterServicesRealms.conf&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;Anyone else ever seen this?&lt;BR /&gt;&lt;BR /&gt;From our experience files in $CPDIR and $FWDIR for each Virtual System context is unique to the specific VS.&lt;BR /&gt;&lt;BR /&gt;We run R81.10, with JHF 139 on GWs and JHF 156 on MDS.&lt;BR /&gt;GWs are OpenServer.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 11:57:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230400#M44336</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-10-22T11:57:40Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230448#M44340</link>
      <description>&lt;P&gt;Please validate you command history and then consult TAC regarding the process for VSX.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 13:39:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230448#M44340</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-10-22T13:39:34Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230469#M44344</link>
      <description>&lt;P&gt;Hello Chris,&lt;BR /&gt;&lt;BR /&gt;Thank you for the reply.&lt;BR /&gt;Command history is validated - we can reproduce this at will across several VSX clusters.&lt;BR /&gt;&lt;BR /&gt;We have some clusters where AzureAD is not configured for Identity Awareness for any VS, so we can test editing of the file without interrupting production - making it quite easy to reproduce the behaviour.&lt;BR /&gt;&lt;BR /&gt;Have created a case for TAC - currently awaiting their reply.&lt;BR /&gt;&lt;BR /&gt;I was just interested to hear if anyone else in the community had experienced this before.&lt;/P&gt;</description>
      <pubDate>Tue, 22 Oct 2024 14:40:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230469#M44344</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-10-22T14:40:43Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230604#M44367</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;it is a symbolic link:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;lrwxrwxrwx 1 admin root 43 Aug 16 11:25 DataCenterServicesRealms.conf -&amp;gt; ../.. /../conf/DataCenterServicesRealms.conf&lt;/P&gt;
&lt;P&gt;So if yo want different configuration you will have to remove the symbolic link and create a new file for every VS,&lt;/P&gt;
&lt;P&gt;It's the same if you want to have different trac_client_1.ttm for different VS.&lt;/P&gt;
&lt;P&gt;Jan&lt;/P&gt;</description>
      <pubDate>Wed, 23 Oct 2024 14:32:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230604#M44367</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-10-23T14:32:13Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230670#M44391</link>
      <description>&lt;P&gt;Hello Jan,&lt;BR /&gt;&lt;BR /&gt;Thank you for the clarification - it is much appreciated.&lt;BR /&gt;Then the product is really working as by-design.&lt;BR /&gt;&lt;BR /&gt;Is this the recommended way (from Check Point) to configure SAML realms with different names, for separate VS?&lt;BR /&gt;I mean - there must be a reason why the default configuration is a symbolic link on VSX GWs - right?&lt;BR /&gt;&lt;BR /&gt;Is the explanation simply that R&amp;amp;D has not accounted for this on VSX GWs?&lt;BR /&gt;&lt;BR /&gt;I am just spit-balling here, but what if you added multiple "&lt;SPAN&gt;vpn_&amp;lt;NAME OF SAML REALM&amp;gt;" lines to the&amp;nbsp;DataCenterServicesRealms.conf file?&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;Would PEP (or whatever engine checks the file) loop through all "vpn_" lines until it found a match, or would it settle for the first line of "vpn_" whether or not it is a match with the name of the Identity Provider configured in SmartConsole?&lt;BR /&gt;&lt;BR /&gt;I am just wondering, because it seems to be counter-intuitive, that it would be a symbolic link on VSX GWs.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 07:36:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230670#M44391</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-10-24T07:36:07Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230688#M44400</link>
      <description>&lt;P&gt;Hello Bernie,&lt;/P&gt;
&lt;P&gt;we are not using SAML at the moment, so I cannot help with this question. Maybe&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/3630"&gt;@Chris_Atkinson&lt;/a&gt;&amp;nbsp;can help.&lt;BR /&gt;My knowledge of the symbolic links was from the trac file. So I think it maybe the same with the&amp;nbsp;&lt;SPAN&gt;DataCenterServicesRealms.conf file.&lt;BR /&gt;I hope that in R82 the configuration of the VS will realy be independent from each other. Sometimes you think you changed something only for one VS but as it is only a link you change it for all VS. &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;My advisory is to look always for linking before changing a file.&lt;BR /&gt;I had these also some time ago with identity portal if I remember correctly.&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 10:04:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230688#M44400</guid>
      <dc:creator>Jan_Kleinhans</dc:creator>
      <dc:date>2024-10-24T10:04:01Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230700#M44408</link>
      <description>&lt;P&gt;Hello Jan,&lt;BR /&gt;&lt;BR /&gt;Message well received and understood.&lt;BR /&gt;Will keep out for the linking in the future.&lt;BR /&gt;&lt;BR /&gt;I have asked TAC what the recommended way to do this is - will just have to wait it out for their answer.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 11:39:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230700#M44408</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-10-24T11:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230701#M44409</link>
      <description>&lt;P&gt;As above please consult with TAC on the supported procedure and copy your SE as needed&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 11:46:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230701#M44409</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-10-24T11:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230706#M44412</link>
      <description>&lt;P&gt;Hello Chris,&lt;BR /&gt;&lt;BR /&gt;Thank you - I already did and am awaiting TAC.&lt;BR /&gt;I just find that it is often worth to post and share in the community as well, because often others have faced the same issues.&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 12:33:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230706#M44412</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-10-24T12:33:10Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230716#M44419</link>
      <description>&lt;P&gt;Absolutely I would likely do the same if I was in your position &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 24 Oct 2024 14:09:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/230716#M44419</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2024-10-24T14:09:32Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/231078#M44518</link>
      <description>&lt;P&gt;So - just spoke to TAC.&lt;BR /&gt;There is actually no internal documentation on the recommended way to do this in VSX - so no wonder I was unable to find anything.&lt;BR /&gt;&lt;BR /&gt;They theorize that adding more realms to the file will be the best solution, but they will clarify with R&amp;amp;D and revert.&lt;BR /&gt;Will let you all know once I know more.&lt;/P&gt;</description>
      <pubDate>Tue, 29 Oct 2024 07:48:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/231078#M44518</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-10-29T07:48:12Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/231946#M44736</link>
      <description>&lt;P&gt;So - R&amp;amp;D reverted, and they confirmed that adding more realms to the file is a viable solution.&lt;BR /&gt;I have asked them to clarify if this is the Check Point recommended way to configure it for VSX.&lt;/P&gt;</description>
      <pubDate>Thu, 07 Nov 2024 09:16:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/231946#M44736</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-11-07T09:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: AzureAD Identity Awareness on VSX - sk179788</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/233109#M45083</link>
      <description>&lt;P&gt;Final reply from R&amp;amp;D is that there is no Check Point recommended way to do this on VSX.&lt;BR /&gt;Both solutions of adding more SAML realms to the file, and deleting the symbolic link are reported as viable from R&amp;amp;D.&lt;BR /&gt;&lt;BR /&gt;I think we will try with adding more SAML realms to the file.&lt;BR /&gt;I fear that deletion of symbolic link and creation of static files may get overridden by JHFs, or at least in the event of a major upgrade.&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2024 13:01:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/AzureAD-Identity-Awareness-on-VSX-sk179788/m-p/233109#M45083</guid>
      <dc:creator>VSX_Bernie</dc:creator>
      <dc:date>2024-11-19T13:01:03Z</dc:date>
    </item>
  </channel>
</rss>

