<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Remote Access VPN and EntraID Group Authorization in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245325#M40919</link>
    <description>&lt;P&gt;Dear community,&lt;/P&gt;&lt;P&gt;I'm trying to get EntraID Group Authorization working for Check Point Remote Access VPN. I've been struggling for quite a while now, but still it doesn't work.&lt;/P&gt;&lt;P&gt;Did I do something wrong, did I forget some steps?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used several sources (not all of them seem to be complete, do not explain when to apply them, and sometimes they provide conflicting information):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Source: "R81.20 Identity Awareness Administration Guide": the 'Admin Guide'.&lt;/LI&gt;&lt;LI&gt;Source: A video in the Admin Guide:&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Azure-AD-Video.htm?tocpath=Identity%20Awareness%20Environment%7C_____12" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Azure-AD-Video.htm?tocpath=Identity%20Awareness%20Environment%7C_____12&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This video explains how to setup browser-based Identity Awareness. It does not explain how to configure for Remote Access VPN, unfortunately.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Source: A video from Peter Elmer (Check Point): &lt;A href="https://www.youtube.com/watch?v=172xGxqQvhI" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=172xGxqQvhI&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Source: A video from Chris Martel: &lt;A href="https://www.youtube.com/watch?v=yZVB3sJ3fZ8" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=yZVB3sJ3fZ8&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Source: &lt;A href="https://support.checkpoint.com/results/sk/sk179788" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk179788&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Source: &lt;A href="https://support.checkpoint.com/results/sk/sk172909" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk172909&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;What I did (primarily following the Admin Guide - "SAML Support for Remote Access VPN"):&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Requirements are okay: gateway and SMS are running R81.20 JHF 89; latest (March 2025) Android Capsule VPN app.&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: enable the 'IPSec VPN' blade.&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: add the gateway to the RemoteAccess VPN Community.&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: enable Office Mode.&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: configure SAML Portal Settings ("&lt;A href="https://myvpn.mydomain.nl/saml-vpn" target="_blank" rel="noopener"&gt;https://myvpn.mydomain.nl/saml-vpn&lt;/A&gt;"); This FQDN resolves to my public gateway IP address.&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: enabled some clients (to test, I enabled all VPN client types).&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: enabled Visitor Mode (already enabled by default).&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: created a 'Match all Users' External User Profile (&lt;FONT face="courier new,courier"&gt;generic*&lt;/FONT&gt;) in SmartDashboard.&lt;/LI&gt;&lt;LI&gt;I also moved the Gaia portal out of the way (Platform Portal: &lt;FONT face="courier new,courier"&gt;&lt;A href="https://192.168.100.240:1433/" target="_blank" rel="noopener"&gt;https://192.168.100.240:1433/&lt;/A&gt;&lt;/FONT&gt;). Verified and tested.&lt;/LI&gt;&lt;LI&gt;I enabled the 'Identity Awareness' blade, skipped the wizard, and enabled 'Remote Access' as an Identity Source&lt;/LI&gt;&lt;LI&gt;SmartConsole: Create the Identity Provider object.&lt;/LI&gt;&lt;LI&gt;EntraID: Create Enterprise App : "Check Point Remote Secure Access" from the gallery.&lt;/LI&gt;&lt;LI&gt;EntraID "Check Point Remote Secure Access": Single sign-on. Copy/past the 'Identifier (Entity ID)', 'Reply URL' from the SmartConsole Identity Provider object into the SAML settings. Also entered the 'Sign on URL'.&lt;/LI&gt;&lt;LI&gt;EntraID "Check Point Remote Secure Access": Modified the SAML claim 'Unique User Identifier (Name ID)' to 'user.localuserprincipalname' (as explained in sk183250).&lt;/LI&gt;&lt;LI&gt;EntraID "Check Point Remote Secure Access": Add the SAML claim '&lt;FONT face="courier new,courier"&gt;group_attr&lt;/FONT&gt;' to '&lt;FONT face="courier new,courier"&gt;user.assignedroles&lt;/FONT&gt;' (as explained in sk183250). Note that the Admin Guides says: "&lt;EM&gt;configure the Identity Provider to send the &lt;STRONG&gt;group names&lt;/STRONG&gt; as values of the attribute "&lt;FONT face="courier new,courier"&gt;group attr&lt;/FONT&gt;"&lt;/EM&gt;". But all other sources specify '&lt;FONT face="courier new,courier"&gt;user.assigned&lt;FONT size="4"&gt;&lt;STRONG&gt;roles&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;'…&lt;/LI&gt;&lt;LI&gt;EntraID "Check Point Remote Secure Access": export the 'Federation Metadata XML' and import in the SmartConsole Identity Provider object .&lt;/LI&gt;&lt;LI&gt;EntraID "Check Point Remote Secure Access": add a test group (without spaces) to the Enterprise Application: '&lt;FONT face="courier new,courier"&gt;RemoteWorkers&lt;/FONT&gt;'. Add '&lt;FONT face="courier new,courier"&gt;myuser@mydomain.nl&lt;/FONT&gt;' to this group as a member.&lt;/LI&gt;&lt;LI&gt;SmartConsole: configure 'Client VPN authentication' on the gateway object according to the Admin Guide, using the Identity Provider object. Specifically configured 'User Directories' to "Manual configuration" and "External User profiles" (as we do not use an on-premise Active Directory (LDAP)). Note that sk179788 disagrees on this point…. (did not implement sk179778 at this point). I tried sk179778 at a later time, but that did not help either...&lt;/LI&gt;&lt;LI&gt;SmartConsole/GuiDBEdit: as explained in the Admin Guide:&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="GuiDBEdit.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30091iC905B78DC8DAAC0E/image-size/large?v=v2&amp;amp;px=999" role="button" title="GuiDBEdit.png" alt="GuiDBEdit.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;SmartConsole: Create an Internal User Group, matching the name of the group in EntraID exactly (case sensitive): '&lt;FONT face="courier new,courier"&gt;EXT_ID_RemoteWorkers&lt;/FONT&gt;'. Note that the Admin Guide tells me to prepend the group name with "&lt;FONT face="courier new,courier"&gt;EXT_ID_&lt;/FONT&gt;", but the video from Peter Elmer does not mention this… I followed the Admin Guide.&lt;/LI&gt;&lt;LI&gt;SmartConsole: create an Access Role, adding the Internal User Group as 'Specific users/group' under 'Users'. Create an Access Rule using this Access Role object as source.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;RESULTS:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I can successfully setup a Remote Access (client) VPN using the Android Capsule app.&lt;/LI&gt;&lt;LI&gt;I can successfully login, using my EntraID credentials (&lt;FONT face="courier new,courier"&gt;myuser@mydomain.nl&lt;/FONT&gt;). So, SAML authentication works!&lt;/LI&gt;&lt;LI&gt;Matched or dropped traffic from my VPN is tagged with '&lt;FONT face="courier new,courier"&gt;Source User Name = myuser@mydomain.nl&lt;/FONT&gt;' in the logs.&lt;/LI&gt;&lt;LI&gt;The log viewer 'Log In' event (Mobile Access), says: User Groups: "&lt;EM&gt;This user doesn't belong to any group&lt;/EM&gt;". Not sure if this is to be expected…&lt;/LI&gt;&lt;LI&gt;On the gateway:&lt;/LI&gt;&lt;/UL&gt;&lt;PRE&gt;# &lt;STRONG&gt;pdp m a on&lt;/STRONG&gt;&lt;BR /&gt;…&lt;BR /&gt;Users:&lt;BR /&gt;&amp;nbsp;myuser@mydomain.nl {2d3c782f}&lt;BR /&gt;&amp;nbsp;&amp;nbsp; LogUsername: myuser@mydomain.nl&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Groups: &lt;STRONG&gt;All Users&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Roles: &lt;STRONG&gt;-&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Client Type: Remote Access&lt;BR /&gt;…&lt;/PRE&gt;&lt;P&gt;It seems that my test group is not 'found', and I am assigned only to the 'All Users' group. My Access Role object doesn't match, and I cannot send traffic through my access rule. I would have expected: "&lt;FONT face="courier new,courier"&gt;Groups: All Users;&lt;STRONG&gt;RemoteWorkers&lt;/STRONG&gt;&lt;/FONT&gt;" and "&lt;FONT face="courier new,courier"&gt;Roles: &lt;STRONG&gt;MyAccessRole&lt;/STRONG&gt;&lt;/FONT&gt;".&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If I create an Access Role object with 'Users' set to 'Any users' (&lt;FONT face="courier new,courier"&gt;RemoteUsers_ALL&lt;/FONT&gt;), then I get this:&lt;/LI&gt;&lt;/UL&gt;&lt;PRE&gt;# &lt;STRONG&gt;pdp m a on&lt;/STRONG&gt;&lt;BR /&gt;…&lt;BR /&gt;Users:&lt;BR /&gt; myuser@mydomain.nl {2d3c782f}&lt;BR /&gt;&amp;nbsp;&amp;nbsp; LogUsername: myuser@mydomain.nl&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Groups: All Users&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Roles: &lt;STRONG&gt;RemoteUsers_ALL&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Client Type: Remote Access&lt;BR /&gt;…&lt;/PRE&gt;&lt;P&gt;And I can send VPN traffic, if I use this Access Role object as source in an Access Rule.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If I add the Internal User Group to the RemoteAccess VPN Community, authentication fails as well (unable to login using Capsule).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Peter Elmer (video) also tells me to edit the Manifest (which seems to be identical to just add 'App Roles' to the EntraID application… So, I tried this as well. This didn't work either…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm at my wits end, thanks in advance for any suggestions,&lt;/P&gt;&lt;P&gt;-Frank&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 01 Apr 2025 08:52:10 GMT</pubDate>
    <dc:creator>FtW64</dc:creator>
    <dc:date>2025-04-01T08:52:10Z</dc:date>
    <item>
      <title>Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245325#M40919</link>
      <description>&lt;P&gt;Dear community,&lt;/P&gt;&lt;P&gt;I'm trying to get EntraID Group Authorization working for Check Point Remote Access VPN. I've been struggling for quite a while now, but still it doesn't work.&lt;/P&gt;&lt;P&gt;Did I do something wrong, did I forget some steps?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I used several sources (not all of them seem to be complete, do not explain when to apply them, and sometimes they provide conflicting information):&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Source: "R81.20 Identity Awareness Administration Guide": the 'Admin Guide'.&lt;/LI&gt;&lt;LI&gt;Source: A video in the Admin Guide:&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Azure-AD-Video.htm?tocpath=Identity%20Awareness%20Environment%7C_____12" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_IdentityAwareness_AdminGuide/Content/Topics-IDAG/Azure-AD-Video.htm?tocpath=Identity%20Awareness%20Environment%7C_____12&lt;/A&gt;&lt;/P&gt;&lt;P&gt;This video explains how to setup browser-based Identity Awareness. It does not explain how to configure for Remote Access VPN, unfortunately.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Source: A video from Peter Elmer (Check Point): &lt;A href="https://www.youtube.com/watch?v=172xGxqQvhI" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=172xGxqQvhI&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Source: A video from Chris Martel: &lt;A href="https://www.youtube.com/watch?v=yZVB3sJ3fZ8" target="_blank" rel="noopener"&gt;https://www.youtube.com/watch?v=yZVB3sJ3fZ8&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Source: &lt;A href="https://support.checkpoint.com/results/sk/sk179788" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk179788&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;Source: &lt;A href="https://support.checkpoint.com/results/sk/sk172909" target="_blank" rel="noopener"&gt;https://support.checkpoint.com/results/sk/sk172909&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;What I did (primarily following the Admin Guide - "SAML Support for Remote Access VPN"):&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;Requirements are okay: gateway and SMS are running R81.20 JHF 89; latest (March 2025) Android Capsule VPN app.&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: enable the 'IPSec VPN' blade.&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: add the gateway to the RemoteAccess VPN Community.&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: enable Office Mode.&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: configure SAML Portal Settings ("&lt;A href="https://myvpn.mydomain.nl/saml-vpn" target="_blank" rel="noopener"&gt;https://myvpn.mydomain.nl/saml-vpn&lt;/A&gt;"); This FQDN resolves to my public gateway IP address.&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: enabled some clients (to test, I enabled all VPN client types).&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: enabled Visitor Mode (already enabled by default).&lt;/LI&gt;&lt;LI&gt;Configure Remote Access VPN: created a 'Match all Users' External User Profile (&lt;FONT face="courier new,courier"&gt;generic*&lt;/FONT&gt;) in SmartDashboard.&lt;/LI&gt;&lt;LI&gt;I also moved the Gaia portal out of the way (Platform Portal: &lt;FONT face="courier new,courier"&gt;&lt;A href="https://192.168.100.240:1433/" target="_blank" rel="noopener"&gt;https://192.168.100.240:1433/&lt;/A&gt;&lt;/FONT&gt;). Verified and tested.&lt;/LI&gt;&lt;LI&gt;I enabled the 'Identity Awareness' blade, skipped the wizard, and enabled 'Remote Access' as an Identity Source&lt;/LI&gt;&lt;LI&gt;SmartConsole: Create the Identity Provider object.&lt;/LI&gt;&lt;LI&gt;EntraID: Create Enterprise App : "Check Point Remote Secure Access" from the gallery.&lt;/LI&gt;&lt;LI&gt;EntraID "Check Point Remote Secure Access": Single sign-on. Copy/past the 'Identifier (Entity ID)', 'Reply URL' from the SmartConsole Identity Provider object into the SAML settings. Also entered the 'Sign on URL'.&lt;/LI&gt;&lt;LI&gt;EntraID "Check Point Remote Secure Access": Modified the SAML claim 'Unique User Identifier (Name ID)' to 'user.localuserprincipalname' (as explained in sk183250).&lt;/LI&gt;&lt;LI&gt;EntraID "Check Point Remote Secure Access": Add the SAML claim '&lt;FONT face="courier new,courier"&gt;group_attr&lt;/FONT&gt;' to '&lt;FONT face="courier new,courier"&gt;user.assignedroles&lt;/FONT&gt;' (as explained in sk183250). Note that the Admin Guides says: "&lt;EM&gt;configure the Identity Provider to send the &lt;STRONG&gt;group names&lt;/STRONG&gt; as values of the attribute "&lt;FONT face="courier new,courier"&gt;group attr&lt;/FONT&gt;"&lt;/EM&gt;". But all other sources specify '&lt;FONT face="courier new,courier"&gt;user.assigned&lt;FONT size="4"&gt;&lt;STRONG&gt;roles&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/FONT&gt;'…&lt;/LI&gt;&lt;LI&gt;EntraID "Check Point Remote Secure Access": export the 'Federation Metadata XML' and import in the SmartConsole Identity Provider object .&lt;/LI&gt;&lt;LI&gt;EntraID "Check Point Remote Secure Access": add a test group (without spaces) to the Enterprise Application: '&lt;FONT face="courier new,courier"&gt;RemoteWorkers&lt;/FONT&gt;'. Add '&lt;FONT face="courier new,courier"&gt;myuser@mydomain.nl&lt;/FONT&gt;' to this group as a member.&lt;/LI&gt;&lt;LI&gt;SmartConsole: configure 'Client VPN authentication' on the gateway object according to the Admin Guide, using the Identity Provider object. Specifically configured 'User Directories' to "Manual configuration" and "External User profiles" (as we do not use an on-premise Active Directory (LDAP)). Note that sk179788 disagrees on this point…. (did not implement sk179778 at this point). I tried sk179778 at a later time, but that did not help either...&lt;/LI&gt;&lt;LI&gt;SmartConsole/GuiDBEdit: as explained in the Admin Guide:&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="GuiDBEdit.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30091iC905B78DC8DAAC0E/image-size/large?v=v2&amp;amp;px=999" role="button" title="GuiDBEdit.png" alt="GuiDBEdit.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;SmartConsole: Create an Internal User Group, matching the name of the group in EntraID exactly (case sensitive): '&lt;FONT face="courier new,courier"&gt;EXT_ID_RemoteWorkers&lt;/FONT&gt;'. Note that the Admin Guide tells me to prepend the group name with "&lt;FONT face="courier new,courier"&gt;EXT_ID_&lt;/FONT&gt;", but the video from Peter Elmer does not mention this… I followed the Admin Guide.&lt;/LI&gt;&lt;LI&gt;SmartConsole: create an Access Role, adding the Internal User Group as 'Specific users/group' under 'Users'. Create an Access Rule using this Access Role object as source.&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;RESULTS:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;I can successfully setup a Remote Access (client) VPN using the Android Capsule app.&lt;/LI&gt;&lt;LI&gt;I can successfully login, using my EntraID credentials (&lt;FONT face="courier new,courier"&gt;myuser@mydomain.nl&lt;/FONT&gt;). So, SAML authentication works!&lt;/LI&gt;&lt;LI&gt;Matched or dropped traffic from my VPN is tagged with '&lt;FONT face="courier new,courier"&gt;Source User Name = myuser@mydomain.nl&lt;/FONT&gt;' in the logs.&lt;/LI&gt;&lt;LI&gt;The log viewer 'Log In' event (Mobile Access), says: User Groups: "&lt;EM&gt;This user doesn't belong to any group&lt;/EM&gt;". Not sure if this is to be expected…&lt;/LI&gt;&lt;LI&gt;On the gateway:&lt;/LI&gt;&lt;/UL&gt;&lt;PRE&gt;# &lt;STRONG&gt;pdp m a on&lt;/STRONG&gt;&lt;BR /&gt;…&lt;BR /&gt;Users:&lt;BR /&gt;&amp;nbsp;myuser@mydomain.nl {2d3c782f}&lt;BR /&gt;&amp;nbsp;&amp;nbsp; LogUsername: myuser@mydomain.nl&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Groups: &lt;STRONG&gt;All Users&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Roles: &lt;STRONG&gt;-&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Client Type: Remote Access&lt;BR /&gt;…&lt;/PRE&gt;&lt;P&gt;It seems that my test group is not 'found', and I am assigned only to the 'All Users' group. My Access Role object doesn't match, and I cannot send traffic through my access rule. I would have expected: "&lt;FONT face="courier new,courier"&gt;Groups: All Users;&lt;STRONG&gt;RemoteWorkers&lt;/STRONG&gt;&lt;/FONT&gt;" and "&lt;FONT face="courier new,courier"&gt;Roles: &lt;STRONG&gt;MyAccessRole&lt;/STRONG&gt;&lt;/FONT&gt;".&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If I create an Access Role object with 'Users' set to 'Any users' (&lt;FONT face="courier new,courier"&gt;RemoteUsers_ALL&lt;/FONT&gt;), then I get this:&lt;/LI&gt;&lt;/UL&gt;&lt;PRE&gt;# &lt;STRONG&gt;pdp m a on&lt;/STRONG&gt;&lt;BR /&gt;…&lt;BR /&gt;Users:&lt;BR /&gt; myuser@mydomain.nl {2d3c782f}&lt;BR /&gt;&amp;nbsp;&amp;nbsp; LogUsername: myuser@mydomain.nl&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Groups: All Users&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Roles: &lt;STRONG&gt;RemoteUsers_ALL&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;&amp;nbsp; Client Type: Remote Access&lt;BR /&gt;…&lt;/PRE&gt;&lt;P&gt;And I can send VPN traffic, if I use this Access Role object as source in an Access Rule.&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;If I add the Internal User Group to the RemoteAccess VPN Community, authentication fails as well (unable to login using Capsule).&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Peter Elmer (video) also tells me to edit the Manifest (which seems to be identical to just add 'App Roles' to the EntraID application… So, I tried this as well. This didn't work either…&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm at my wits end, thanks in advance for any suggestions,&lt;/P&gt;&lt;P&gt;-Frank&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 08:52:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245325#M40919</guid>
      <dc:creator>FtW64</dc:creator>
      <dc:date>2025-04-01T08:52:10Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245346#M40926</link>
      <description>&lt;P&gt;check the SAML attributes transferred.&lt;/P&gt;&lt;P&gt;can be done with browser plugins like saml-tracer / saml-tracker&lt;/P&gt;&lt;P&gt;i.e.&amp;nbsp;&lt;A href="https://addons.mozilla.org/de/firefox/addon/saml-tracer/" target="_blank" rel="noopener"&gt;https://addons.mozilla.org/de/firefox/addon/saml-tracer/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Start the extension, then logon to vpn again.&lt;/P&gt;&lt;P&gt;Then there should come up something like the first attached picture. click on the first line stating "SAML" and see on the other tab the SAML parameters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I´d guess, there is something wrong with the attributes transfered.&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 11:21:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245346#M40926</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2025-04-01T11:21:04Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245362#M40932</link>
      <description>&lt;P&gt;Hi &lt;SPAN class=""&gt;&lt;A class="" href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1663" target="_self"&gt;&lt;SPAN class=""&gt;Nüüül&lt;/SPAN&gt;&lt;/A&gt;&lt;/SPAN&gt;,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for your suggestion. I switched from Android to Windows and used the SAML tracer. It seems indeed that the 'group_attr' attribute is missing in the last SAML conversations. At least, I'm assuming here that this attribute is used by the VPN gateway?&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="2025-04-01 14_45_37-Extension_ (SAML-tracer) - SAML-tracer — Mozilla Firefox.jpg" style="width: 993px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/30095i24D23C09448FA0DD/image-size/large?v=v2&amp;amp;px=999" role="button" title="2025-04-01 14_45_37-Extension_ (SAML-tracer) - SAML-tracer — Mozilla Firefox.jpg" alt="2025-04-01 14_45_37-Extension_ (SAML-tracer) - SAML-tracer — Mozilla Firefox.jpg" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 12:51:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245362#M40932</guid>
      <dc:creator>FtW64</dc:creator>
      <dc:date>2025-04-01T12:51:51Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245363#M40933</link>
      <description>&lt;P&gt;Yes, this will be used by the gateway.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;EntraID "Check Point Remote Secure Access": Add the SAML claim 'group_attr' to 'user.assignedroles' (as explained in sk183250). Note that the Admin Guides says: "configure the Identity Provider to send the group names as values of the attribute "group attr"". But all other sources specify 'user.assignedroles'…&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;in Entra you can configure, what to send with the group attribute "group_attr". Especially when not using local ldap sources.&lt;/P&gt;&lt;P&gt;For an example see attachement&lt;/P&gt;&lt;P&gt;The group will have to be matched on Check Point side (group named EXT_ID_&amp;lt;groupname&amp;gt;, which then is member of an access role)&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 13:01:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245363#M40933</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2025-04-01T13:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245372#M40938</link>
      <description>&lt;P&gt;I configured the group_attr claim/attribute as described in your screen shot.&lt;/P&gt;&lt;P&gt;But in the SAML attributes we still do not see 'group_attr'. We also tried refreshing the XML meta data to the Identity Provider object, but this didn't help either. For some reason EntraID refuses to send the group_attr attribute...&lt;/P&gt;&lt;P&gt;This is what we configured on EntraID in the Enterprise App (see image).&lt;/P&gt;&lt;P&gt;Also note that we configured the Unique User Identifier (Name ID) as user.&lt;STRONG&gt;local&lt;/STRONG&gt;userprincipalname (as per the documentation).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 14:20:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245372#M40938</guid>
      <dc:creator>FtW64</dc:creator>
      <dc:date>2025-04-01T14:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245375#M40939</link>
      <description>&lt;P&gt;Would remove the filtering (Filter Group) for the first step.&lt;/P&gt;&lt;P&gt;Is the application mapped to your user group aa_cp..? As there is enabled "Groups assigned to application"&lt;/P&gt;&lt;P&gt;Also - nested groups are not supported, so your group would have to be mapped to the application and your user must be a direct member of the group.&lt;/P&gt;&lt;P&gt;we can have a short session tomorrow afternoon and have a look together, if you want to - just send me a private message&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 14:26:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245375#M40939</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2025-04-01T14:26:11Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245380#M40940</link>
      <description>&lt;P&gt;YES!!! I've got it working. I disabled the filter and now we get a &lt;FONT face="courier new,courier"&gt;group_attr&lt;/FONT&gt; with the &lt;FONT face="trebuchet ms,geneva"&gt;value&lt;/FONT&gt;:&lt;/P&gt;&lt;PRE&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;&amp;lt;&lt;SPAN class=""&gt;Attribute&lt;/SPAN&gt; &lt;SPAN class=""&gt;Name&lt;/SPAN&gt;=&lt;SPAN class=""&gt;"group_attr"&lt;/SPAN&gt;&amp;gt;&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;&amp;nbsp; &amp;lt;&lt;SPAN class=""&gt;AttributeValue&lt;/SPAN&gt;&amp;gt;&lt;/SPAN&gt;aa_cp_vpn_test_frank&lt;SPAN class=""&gt;&amp;lt;/&lt;SPAN class=""&gt;AttributeValue&lt;/SPAN&gt;&amp;gt;&lt;/SPAN&gt; &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class=""&gt;&amp;lt;/&lt;SPAN class=""&gt;Attribute&lt;/SPAN&gt;&amp;gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/PRE&gt;&lt;P&gt;&lt;FONT face="trebuchet ms,geneva"&gt;&lt;SPAN class=""&gt;Not sure why the filter blocked the group. Also: if there are no matching groups, the attribute is not sent from the IdP (I kind of expected an empty attribute...).&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="trebuchet ms,geneva"&gt;&lt;SPAN class=""&gt;I'd like to thank you VERY MUCH for your help.&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="trebuchet ms,geneva"&gt;&lt;SPAN class=""&gt;I would like to urge Check Point to update their documentation and give some more explanation to just: 'add the group_attr claim/attribute' :-).&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 01 Apr 2025 14:56:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/245380#M40940</guid>
      <dc:creator>FtW64</dc:creator>
      <dc:date>2025-04-01T14:56:33Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/271653#M45532</link>
      <description>&lt;P&gt;Great to hear... I've one question. How to change the setting with guidbedit if you have Smart-1 Cloud. I can't validate to with guidbedit to the cloud instance.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Jaco Wevers&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2026 08:13:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/271653#M45532</guid>
      <dc:creator>JacWev</dc:creator>
      <dc:date>2026-02-23T08:13:25Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/271775#M45540</link>
      <description>&lt;P&gt;TAC might have to do it for you.&lt;/P&gt;</description>
      <pubDate>Mon, 23 Feb 2026 20:21:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/271775#M45540</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-02-23T20:21:35Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/272714#M45718</link>
      <description>&lt;P&gt;Yes PhoneBoy,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've contacted TAC they changed the settings&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 06 Mar 2026 16:24:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/272714#M45718</guid>
      <dc:creator>JacWev</dc:creator>
      <dc:date>2026-03-06T16:24:43Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/272867#M45738</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;I'm in a similar scenario. I'm a bit confused about how the authorization part is supposed to work:&lt;/P&gt;&lt;P&gt;I've the SAML authentication working, my EntraID group "ENTRA-RAVPN-USERS" assigned to my Entreprise App is sent via SAML assertion&amp;nbsp; using group claims (using&amp;nbsp; "group_attr" and cloud only display name (I don't have an hybrid env, Azure only).&amp;nbsp; In SmartConsole, I created a checkpoint&amp;nbsp; local user group EXT_ID_ENTRA-RAVPN-USERS and i can authenticate just fine. That's the authentication part done.&amp;nbsp;&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 673px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33640i45A7CAF8A52BE835/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Now i'm trying to use the EntraID server object&amp;nbsp; to retrieve group memberships.&lt;/P&gt;&lt;P&gt;The only group membership info&amp;nbsp; i have received are those assigned to the Entreprise App (the 2&amp;nbsp; EXT_ID roles in the above screenshot). but those are the group memberships sent by SAML assertion during sign in.&amp;nbsp;&lt;/P&gt;&lt;P&gt;My understanding is that my&amp;nbsp; EntraID server object can read the entire Entra ID directory&amp;nbsp; (and it can as I can create access roles with Azure groups) .&amp;nbsp; But my user traffic is never matching any of those access roles. Upon receiving traffic that is a potential match for a rule with an access role, the gateway&amp;nbsp; should query Entra to see if my authenticated user is a member of that group. But this is not happening.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 13:21:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/272867#M45738</guid>
      <dc:creator>Kurpeus</dc:creator>
      <dc:date>2026-03-09T13:21:16Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/272880#M45745</link>
      <description>&lt;P&gt;Not sure, if this is intended to work, but did you set the Entra ID Object as User Directory (somewhere in VPN Configurations; User Directories) and is the matching attribute correct?&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 15:40:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/272880#M45745</guid>
      <dc:creator>Nüüül</dc:creator>
      <dc:date>2026-03-09T15:40:55Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/272892#M45751</link>
      <description>&lt;P&gt;If you want the groups to be seen on our side, they must be sent as part of the SAML Assertion.&lt;/P&gt;</description>
      <pubDate>Mon, 09 Mar 2026 18:38:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/272892#M45751</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2026-03-09T18:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN and EntraID Group Authorization</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/272987#M45758</link>
      <description>&lt;P&gt;I had the group membership sent as part of SAML assertion (that is for groups assigned to the entreprise application), but not for the in policy authorization. As it turns out, you don't have to.&amp;nbsp; I've got it fully working . I've created a complete guide.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://community.checkpoint.com/t5/General-Topics/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/272983/highlight/true#M45757" target="_blank" rel="noopener"&gt;https://community.checkpoint.com/t5/General-Topics/SAML-Authentication-to-Azure-Entra-ID-with-Authorization/m-p/272983/highlight/true#M45757&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 10 Mar 2026 12:33:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization/m-p/272987#M45758</guid>
      <dc:creator>Kurpeus</dc:creator>
      <dc:date>2026-03-10T12:33:59Z</dc:date>
    </item>
  </channel>
</rss>

