<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Awareness with EntraID roles and policy enforcement in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238926#M46346</link>
    <description>&lt;P&gt;Have you created the relevant EXT_ID_ groups on the Check Point side?&lt;BR /&gt;For example, there should be EXT_ID_Internet_Access.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 17 Jan 2025 14:51:33 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2025-01-17T14:51:33Z</dc:date>
    <item>
      <title>Identity Awareness with EntraID roles and policy enforcement</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238865#M46333</link>
      <description>&lt;P&gt;I have a requirement to evaluate moving &lt;STRONG&gt;Identity Awareness (IA)&lt;/STRONG&gt; from a traditional on-premises &lt;STRONG&gt;Active Directory&lt;/STRONG&gt; implementation to an &lt;STRONG&gt;IdP setup using EntraID&lt;/STRONG&gt;. I’ve tested the IdP creation process and successfully configured the gateway to use EntraID SAML SSO for the Captive Portal. However, I’ve encountered an issue where any rules referencing roles based on EntraID groups fail to match.&lt;/P&gt;&lt;P&gt;It appears that the gateway is not retrieving EntraID group membership when a user authenticates. I’ve reviewed the Identity Awareness configuration guide multiple times, but something seems to be missing in the process to enforce policies based on IdP roles.&lt;/P&gt;&lt;H3&gt;Use Case Example:&lt;/H3&gt;&lt;UL&gt;&lt;LI&gt;&lt;STRONG&gt;Group Setup:&lt;/STRONG&gt; In EntraID, there is a group named &lt;STRONG&gt;Internet_Access&lt;/STRONG&gt;. Users in this group should have full Internet access, while users not in the group should be restricted to accessing white-listed sites.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Rule Setup:&lt;/STRONG&gt; I created a rule that uses a role based on the EntraID group &lt;STRONG&gt;Internet_Access&lt;/STRONG&gt;. However, users are not matching the rule.&lt;/LI&gt;&lt;LI&gt;&lt;STRONG&gt;Issue Observed:&lt;/STRONG&gt; In the log entries for &lt;STRONG&gt;Identity Awareness Successful Login&lt;/STRONG&gt;, the &lt;STRONG&gt;Source User Group&lt;/STRONG&gt; and &lt;STRONG&gt;Roles&lt;/STRONG&gt; fields do not show any entries for EntraID groups.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;It seems like simply following the &lt;STRONG&gt;"Using Azure AD for Authorization"&lt;/STRONG&gt; section in the IA admin guide does not achieve the desired outcome.&lt;/P&gt;&lt;H3&gt;Request for Guidance:&lt;/H3&gt;&lt;P&gt;Has anyone successfully configured policy enforcement using IdP-based roles with EntraID? Are there any additional steps, settings, or troubleshooting methods that might resolve this issue?&lt;/P&gt;&lt;P&gt;For reference, I’ve opened a TAC case to have the configuration reviewed, but I wanted to check here to see if anyone else has encountered and resolved a similar issue.&lt;/P&gt;&lt;P&gt;Thank you in advance for your assistance!&lt;/P&gt;</description>
      <pubDate>Thu, 16 Jan 2025 22:05:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238865#M46333</guid>
      <dc:creator>Ave_Joe</dc:creator>
      <dc:date>2025-01-16T22:05:30Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with EntraID roles and policy enforcement</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238926#M46346</link>
      <description>&lt;P&gt;Have you created the relevant EXT_ID_ groups on the Check Point side?&lt;BR /&gt;For example, there should be EXT_ID_Internet_Access.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 14:51:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238926#M46346</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-17T14:51:33Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with EntraID roles and policy enforcement</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238943#M46350</link>
      <description>&lt;P&gt;Hello PhoneBoy.&lt;/P&gt;&lt;P&gt;That must be the missing step in the process. Is there any documentation or a SecureKnowledge (SK) article that specifically covers this aspect from an &lt;STRONG&gt;Identity Awareness/Captive Portal&lt;/STRONG&gt; perspective? I haven’t been able to find anything relevant so far.&lt;/P&gt;&lt;P&gt;The &lt;STRONG&gt;Identity Awareness Administration Guide&lt;/STRONG&gt; provides details on how to create the IdP, but it doesn’t include sufficient information on how to use the IdP in policy enforcement. Perhaps this information is covered in a different document?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 15:50:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238943#M46350</guid>
      <dc:creator>Ave_Joe</dc:creator>
      <dc:date>2025-01-17T15:50:00Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with EntraID roles and policy enforcement</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238947#M46351</link>
      <description>&lt;P&gt;It would help to know what documentation you've followed so far and what you've configured to try and associate the Entra ID groups.&lt;BR /&gt;The need for EXT_ID_ groups are documented here (among other places):&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk177267" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk177267&lt;/A&gt;&amp;nbsp;&lt;BR /&gt;It says Remote Access, but it certainly won't hurt even if RA isn't involved.&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 16:02:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238947#M46351</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-17T16:02:53Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with EntraID roles and policy enforcement</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238964#M46357</link>
      <description>&lt;P&gt;I will take a look at that SK.&lt;/P&gt;&lt;P&gt;Here is the link to the Identity Awareness doc that I was following.&lt;/P&gt;&lt;P&gt;Using &lt;A title="Azure AD Auth" href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Using-Azure-AD-for-Authorization.htm?tocpath=Identity%20Awareness%20Environment%7C_____11" target="_self"&gt;&lt;SPAN class=""&gt;Azure AD&lt;/SPAN&gt; for Authorization&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Cheers!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Jan 2025 17:52:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/238964#M46357</guid>
      <dc:creator>Ave_Joe</dc:creator>
      <dc:date>2025-01-17T17:52:48Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with EntraID roles and policy enforcement</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/239071#M46388</link>
      <description>&lt;P&gt;&lt;SPAN class=""&gt;Over the weekend I went through the video "&lt;/SPAN&gt;&lt;A title="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Using-Azure-AD-for-Authorization.htm?TocPath=Identity%20Awareness%20Environment%7C_____11" href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Using-Azure-AD-for-Authorization.htm?TocPath=Identity%20Awareness%20Environment%7C_____11" target="_blank" rel="noopener noreferrer"&gt;&lt;SPAN class=""&gt;Using Azure AD for Authorization&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN class=""&gt;" again. I cleared out all that was done previously and started over.&amp;nbsp; The video does not mention anything about the process of using EXT_ID_.&amp;nbsp; It demonstrates that you simply choose the EntraID group in the picker as the Source and turn on the Captive Portal option in the Accept action column.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;After following the video m&lt;/SPAN&gt;&lt;SPAN class=""&gt;y test user can authenticate to the Captive Portal using the IdP but can not access the Internet.&amp;nbsp; The user does not match the rule that references the EntraID group.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;TABLE border="1" width="100%"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;src&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;dst&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;action&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD width="33.333333333333336%"&gt;Internet Access Group (EntraID object)&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;Internet&lt;/TD&gt;&lt;TD width="33.333333333333336%"&gt;Accept with Captive Portal option selected&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;When the test user authenticates to the Captive Portal I don't see any roles in the log entry that matches AzureAD groups.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Prior to redoing everything I did look at&amp;nbsp; SK177267 and ran some tests but that did not work either.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Hopefully working with the TAC will get it sorted. &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2025 14:24:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/239071#M46388</guid>
      <dc:creator>Ave_Joe</dc:creator>
      <dc:date>2025-01-20T14:24:36Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness with EntraID roles and policy enforcement</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/239089#M46390</link>
      <description>&lt;P&gt;I assume "&lt;SPAN&gt;Internet Access Group" is actually an Access Role object?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 20 Jan 2025 21:35:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-with-EntraID-roles-and-policy-enforcement/m-p/239089#M46390</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-01-20T21:35:44Z</dc:date>
    </item>
  </channel>
</rss>

