<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Using MS Active Directory  for remote access VPN in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/73336#M13232</link>
    <description>2 factor authentication works fine when you do not use secondary connect. When you do use it the client will prompt you for each gateway your client connects to, to authenticate again for each gateway.</description>
    <pubDate>Fri, 24 Jan 2020 18:26:47 GMT</pubDate>
    <dc:creator>Maarten_Sjouw</dc:creator>
    <dc:date>2020-01-24T18:26:47Z</dc:date>
    <item>
      <title>Using MS Active Directory  for remote access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/25098#M13230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Hi everyone,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;I totally lost in number of somewhat conflicting documentation and community topics and would be&amp;nbsp;grateful if you can help me.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;1. We are on R80.10 version SMS and gateways&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;3.&amp;nbsp;IP Sec VPN,&amp;nbsp; Mobile access and Identity awareness blades are enabled&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&amp;nbsp;2. We are using Check Point Mobile for Windows client and presently users are created locally.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&amp;nbsp;3. Local users are also assigned to users groups and user groups assigned to users roles that used in access rules to&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;distinguish what users can and cannot access&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&amp;nbsp;4. I&amp;nbsp;need to move to authenticate users against Microsoft AD and also to use AD user group user belongs to in MS AD in access rules for remote access VPN - i.e. some sort of authorization.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;5. Do I need user directory license if I just want to enable remote VPN authentication against AD? There is no any MS AD management from Check Point side, just querying AD for user presence and if password is valid.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;6. What about using MS AD user group user belongs to in access rules?&amp;nbsp;During initial setup for Mobile access I said that I don't want to use AD integration.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;7. To make things more complicated, I need then to move to Radius authentication with soft RSA token and still be able to query MS AD for a user group connecting user belongs to to be able to use AD group in access rules.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #333333; background-color: #ffffff;"&gt;Your help is really appreciated!&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 06 Sep 2018 21:00:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/25098#M13230</guid>
      <dc:creator>Dmitriy_Tiper</dc:creator>
      <dc:date>2018-09-06T21:00:51Z</dc:date>
    </item>
    <item>
      <title>Re: Using MS Active Directory  for remote access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/73335#M13231</link>
      <description>Point 7 ... is relevant for me. How do you proceed to implement this configuration ?&lt;BR /&gt;&lt;BR /&gt;Simon</description>
      <pubDate>Fri, 24 Jan 2020 17:48:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/73335#M13231</guid>
      <dc:creator>Simon_Drapeau</dc:creator>
      <dc:date>2020-01-24T17:48:43Z</dc:date>
    </item>
    <item>
      <title>Re: Using MS Active Directory  for remote access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/73336#M13232</link>
      <description>2 factor authentication works fine when you do not use secondary connect. When you do use it the client will prompt you for each gateway your client connects to, to authenticate again for each gateway.</description>
      <pubDate>Fri, 24 Jan 2020 18:26:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/73336#M13232</guid>
      <dc:creator>Maarten_Sjouw</dc:creator>
      <dc:date>2020-01-24T18:26:47Z</dc:date>
    </item>
    <item>
      <title>Re: Using MS Active Directory  for remote access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/73340#M13233</link>
      <description>Thanks for your reply. I agree your point about the secondary connect. My questioning is more about the feasibility of our new configuration.&lt;BR /&gt;&lt;BR /&gt;What I'm expecting :&lt;BR /&gt;1- Authenticate RA user (Radius gemalto) with full UPN (xxx@xxx.xxx) - Working at this time ... secondly using this RA user newly authenticated in ...&lt;BR /&gt;2- Many Access role based on group membership (IA - AD query) to permit access to specific internal resources.&lt;BR /&gt;&lt;BR /&gt;At this time, it seems that the AccessRole rule doesn't trap the user because group membership has not retrieved successfully. I tried to find how to do that. Maybe sk147417. Just a little bit confused. At this point, any hints will be helpful ? that's why point 7 could be relevant for me.&lt;BR /&gt;&lt;BR /&gt;Regards, Simon</description>
      <pubDate>Fri, 24 Jan 2020 19:19:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/73340#M13233</guid>
      <dc:creator>Simon_Drapeau</dc:creator>
      <dc:date>2020-01-24T19:19:18Z</dc:date>
    </item>
    <item>
      <title>Re: Using MS Active Directory  for remote access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/73349#M13234</link>
      <description>Worked now .. no need to response.&lt;BR /&gt;I have one more tricky thing to do is to configure different IP pool for each AD_Group (ipassignment.conf) .. planned at the beginning of next week.&lt;BR /&gt;&lt;BR /&gt;Simon</description>
      <pubDate>Fri, 24 Jan 2020 21:45:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Using-MS-Active-Directory-for-remote-access-VPN/m-p/73349#M13234</guid>
      <dc:creator>Simon_Drapeau</dc:creator>
      <dc:date>2020-01-24T21:45:57Z</dc:date>
    </item>
  </channel>
</rss>

