<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Using ldap for user authentication on vpn checkpoint in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Using-ldap-for-user-authentication-on-vpn-checkpoint/m-p/58516#M11793</link>
    <description>&lt;P&gt;Hello everyone!&lt;BR /&gt;Please Helllp!!&lt;BR /&gt;At this moment I´m using&amp;nbsp; Checkpoint local users to connect to Client-to-site VPN.&amp;nbsp;&lt;BR /&gt;But I want to improve this and change all the method of VPN authentication to LDAP.&lt;BR /&gt;For tests purposes, I´ve already a group on AD where we use shared with Checkpoint then we are able to do that and it realy works.&lt;BR /&gt;By now, I don´t want to ask AD admin to create AD groups everytime we are asked to provide an VPN access.&lt;BR /&gt;Is there a way to add AD users to a VPN rule without using a AD group?&lt;BR /&gt;Let me explain better: we are a big organization, so we have diferents kinds of users with different needs, so we need to create differents kinds of access groups. Since I know that VPN rules only accept legacy users on groups, I´d like to know if theres a way to designate some AD users directly on firewall rules, or a way to do this without to contact AD admin to create the groups.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;BR /&gt;&lt;BR /&gt;Checkpoint r77.30&lt;/P&gt;</description>
    <pubDate>Thu, 18 Jul 2019 20:14:57 GMT</pubDate>
    <dc:creator>Rick_Rodrix</dc:creator>
    <dc:date>2019-07-18T20:14:57Z</dc:date>
    <item>
      <title>Using ldap for user authentication on vpn checkpoint</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Using-ldap-for-user-authentication-on-vpn-checkpoint/m-p/58516#M11793</link>
      <description>&lt;P&gt;Hello everyone!&lt;BR /&gt;Please Helllp!!&lt;BR /&gt;At this moment I´m using&amp;nbsp; Checkpoint local users to connect to Client-to-site VPN.&amp;nbsp;&lt;BR /&gt;But I want to improve this and change all the method of VPN authentication to LDAP.&lt;BR /&gt;For tests purposes, I´ve already a group on AD where we use shared with Checkpoint then we are able to do that and it realy works.&lt;BR /&gt;By now, I don´t want to ask AD admin to create AD groups everytime we are asked to provide an VPN access.&lt;BR /&gt;Is there a way to add AD users to a VPN rule without using a AD group?&lt;BR /&gt;Let me explain better: we are a big organization, so we have diferents kinds of users with different needs, so we need to create differents kinds of access groups. Since I know that VPN rules only accept legacy users on groups, I´d like to know if theres a way to designate some AD users directly on firewall rules, or a way to do this without to contact AD admin to create the groups.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;BR /&gt;&lt;BR /&gt;Checkpoint r77.30&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 20:14:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Using-ldap-for-user-authentication-on-vpn-checkpoint/m-p/58516#M11793</guid>
      <dc:creator>Rick_Rodrix</dc:creator>
      <dc:date>2019-07-18T20:14:57Z</dc:date>
    </item>
    <item>
      <title>Re: Using ldap for user authentication on vpn checkpoint</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Using-ldap-for-user-authentication-on-vpn-checkpoint/m-p/58520#M11796</link>
      <description>When you have Identity Awareness setup and connected to your AD, you can create access roles, within those roles you can add individual users and/or groups and/or machines to allow certain traffic, so in other words yes this is possible.</description>
      <pubDate>Thu, 18 Jul 2019 20:50:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Using-ldap-for-user-authentication-on-vpn-checkpoint/m-p/58520#M11796</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2019-07-18T20:50:11Z</dc:date>
    </item>
    <item>
      <title>Re: Using ldap for user authentication on vpn checkpoint</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Using-ldap-for-user-authentication-on-vpn-checkpoint/m-p/58522#M11797</link>
      <description>&lt;P&gt;Well, I do know that. I´m getting some success on this research. At this time, I discovered that for the first step, I need to allow AD users to connect in Remote Access, so I made this work adding the AD group "Domain Users" in Remote Access. But right now, every single account is able to login on Remote Access. I did a individual account role access and added to a rule and it is working now, I was abble to access my host. But I was wondering if to enable all the AD group "Domain Users" to allow connect to Endpoint Security is a good idea for security issues.&amp;nbsp;&lt;BR /&gt;Is it a best practice to put this kind of rule at the top of the rule table?&lt;BR /&gt;&lt;BR /&gt;I just wondering why no one had this question before, I didn´t find any message about this.&lt;/P&gt;</description>
      <pubDate>Thu, 18 Jul 2019 21:40:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Using-ldap-for-user-authentication-on-vpn-checkpoint/m-p/58522#M11797</guid>
      <dc:creator>Rick_Rodrix</dc:creator>
      <dc:date>2019-07-18T21:40:07Z</dc:date>
    </item>
  </channel>
</rss>

