<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity collectors and captive portal in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83534#M16896</link>
    <description>&lt;P&gt;If MFA is mandated and identity collectors are desired so that AD groups can be used, is it possible to use both captive portal (MFA) and identity collectors (AD groups query)?&lt;/P&gt;</description>
    <pubDate>Tue, 28 Apr 2020 19:16:55 GMT</pubDate>
    <dc:creator>C_M</dc:creator>
    <dc:date>2020-04-28T19:16:55Z</dc:date>
    <item>
      <title>Identity collectors and captive portal</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83513#M16890</link>
      <description>&lt;P&gt;Is it possible to use captive portal mfa with identity collectors?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 17:00:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83513#M16890</guid>
      <dc:creator>C_M</dc:creator>
      <dc:date>2020-04-28T17:00:10Z</dc:date>
    </item>
    <item>
      <title>Re: Identity collectors and captive portal</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83533#M16895</link>
      <description>Identity Collector will pull information from Active Directory and doesn't use MFA.&lt;BR /&gt;If you want some users to authenticate with Captive Portal and MFA from a non-AD identity source, you can do that too.</description>
      <pubDate>Tue, 28 Apr 2020 19:14:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83533#M16895</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-28T19:14:05Z</dc:date>
    </item>
    <item>
      <title>Re: Identity collectors and captive portal</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83534#M16896</link>
      <description>&lt;P&gt;If MFA is mandated and identity collectors are desired so that AD groups can be used, is it possible to use both captive portal (MFA) and identity collectors (AD groups query)?&lt;/P&gt;</description>
      <pubDate>Tue, 28 Apr 2020 19:16:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83534#M16896</guid>
      <dc:creator>C_M</dc:creator>
      <dc:date>2020-04-28T19:16:55Z</dc:date>
    </item>
    <item>
      <title>Re: Identity collectors and captive portal</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83549#M16903</link>
      <description>Identity Collector is a specific tool that runs on a Windows machine that relays people who have already authenticated with Active Directory to a Check Point gateway.&lt;BR /&gt;Active Directory is performing the authentication of the user in this case, thus we do not get involved with MFA here.&lt;BR /&gt;Based on information gathered from Active Directory, Identity Collector communicates which user authenticated at which IP address to the configured Check Point gateway.&lt;BR /&gt;&lt;BR /&gt;Captive Portal is another way to acquire identities.&lt;BR /&gt;Depending on the authentication mechanism used, Captive Portal can require MFA.&lt;BR /&gt;&lt;BR /&gt;Can both methods be used to gather identities? Yes.&lt;BR /&gt;Regardless of how the identity is gathered, the gateway looks up the users in LDAP to determine what Access Roles (and rules) apply.&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Apr 2020 22:54:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83549#M16903</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-04-28T22:54:12Z</dc:date>
    </item>
    <item>
      <title>Re: Identity collectors and captive portal</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83657#M16930</link>
      <description>&lt;P&gt;&lt;SPAN&gt;"Regardless of how the identity is gathered, the gateway looks up the users in LDAP to determine what Access Roles (and rules) apply."&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;True if f the Users in the Access Role is set to AD domain (or other LDAP source). You can also select Internal User Groups, which would then not look up users in LDAP to determine Access Role&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Dave&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;(Been doing a lot of testing with Access Roles and authentication methods the last few days)&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2020 19:01:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Identity-collectors-and-captive-portal/m-p/83657#M16930</guid>
      <dc:creator>David_C1</dc:creator>
      <dc:date>2020-04-29T19:01:02Z</dc:date>
    </item>
  </channel>
</rss>

