<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Keycloak - Browser-Based authentication for VPN users in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/222075#M3658</link>
    <description>&lt;P&gt;After spending a couple of days on this, I'm still spinning my wheels.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/SAML-Support-for-Remote-Access-VPN.htm" target="_blank" rel="noopener"&gt;SAML Support for Remote Access VPN (checkpoint.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;RE: sslvpn web browser (not Endpoint client)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have mobile access running in unified mode configured now.&amp;nbsp; I login with the nice keycloak icon on the CP portal (on the keycloak server it says there is an active session), however I get re-directed back. to the check point portal Login page&amp;nbsp; and&amp;nbsp; get the message User is unauthorized.&amp;nbsp; I have a role set up that includes my EXT_ID_keycloak group.&amp;nbsp; It feels like I'm close but no cigar.&amp;nbsp; I'm going to re-read the tags and group attributes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RE:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/SAML-Support-for-Remote-Access-VPN.htm?Highlight=saml" target="_blank"&gt;SAML Support for Remote Access VPN (checkpoint.com)&lt;/A&gt;&amp;nbsp;in the section "if you use an on-premises Active Directory (LDAP)&lt;/P&gt;
&lt;P&gt;We have AD on prem, but we aren't using it with our Keycloak / SAML set up,&amp;nbsp; so when directions say to do A if you have AD and if you don't do B, I'm not sure which way to go.&lt;/P&gt;</description>
    <pubDate>Sun, 28 Jul 2024 18:59:53 GMT</pubDate>
    <dc:creator>Daniel_Kavan</dc:creator>
    <dc:date>2024-07-28T18:59:53Z</dc:date>
    <item>
      <title>Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/217960#M3649</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We currently want to enable MFA for our partners connected via IPsec tunnel.&lt;/P&gt;&lt;P&gt;To achieve this, we have an IAM (Keycloak) that we want to use to redirect partners, allowing them to access certain resources.&lt;/P&gt;&lt;P&gt;I found the following documentation on configuring Keycloak to authenticate user accounts for access to the SmartConsole: &lt;A href="https://community.checkpoint.com/t5/Management/Keycloak-SAML-Authentication-for-SmartConsole/td-p/183797" target="_new" rel="noreferrer"&gt;https://community.checkpoint.com/t5/Management/Keycloak-SAML-Authentication-for-SmartConsole/td-p/183797&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Keycloak is configured as described in the above documentation (custom client scope) and as an Identity Provider for Browser-Based Authentication (cf. attached screens CHKP_config1 and 2)&lt;/P&gt;&lt;P&gt;What we are looking for is the remaining configuration needed to enable MFA. Specifically:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;What do we have to do to redirect VPN partners to the Keycloak Portal?&lt;/LI&gt;&lt;LI&gt;Which source criteria in Security Policies (e.g., sources to target, Identity tags, Access Roles, User Groups) need to be set?&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;Additionally, are there any other configuration steps required ?&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Thibaut&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 14:05:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/217960#M3649</guid>
      <dc:creator>PCAILLE</dc:creator>
      <dc:date>2024-06-18T14:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/218019#M3650</link>
      <description>&lt;P&gt;If your intention is to use Keycloak to authenticate Remote Access users, you will have to create another SAML provider (i.e. you cannot reuse your existing one) and follow the relevant steps.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 22:37:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/218019#M3650</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-18T22:37:22Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/218021#M3651</link>
      <description>&lt;P&gt;Hey Thibaut,&lt;/P&gt;
&lt;P&gt;I agree with what Phoneboy said. Just follow below steps (youtube video by Peter Elmer is super helpful)&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://support.checkpoint.com/results/sk/sk172909" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk172909&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.youtube.com/playlist?list=PLBfjYlNj4w1vJJBCdwJCAta4kvxI0t0Fb" target="_blank"&gt;https://www.youtube.com/playlist?list=PLBfjYlNj4w1vJJBCdwJCAta4kvxI0t0Fb&lt;/A&gt;&amp;nbsp;(part 4)&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 23:33:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/218021#M3651</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-18T23:33:30Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/218041#M3652</link>
      <description>&lt;P&gt;Actually, the Keycloak provider is not currently used for any user authentication (we only followed the documentation part that focuses on the Keycloak configuration). We would like to set up authentication only for Remote Access users and not for SmartConsole access as described in the documentation.&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2024 06:22:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/218041#M3652</guid>
      <dc:creator>PCAILLE</dc:creator>
      <dc:date>2024-06-19T06:22:33Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/218057#M3653</link>
      <description>&lt;P&gt;Did you follow the links I sent?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 19 Jun 2024 10:14:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/218057#M3653</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-19T10:14:39Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/221586#M3654</link>
      <description>&lt;P&gt;Also, when we say Remote Access VPN users, that includes support for SSLVPN users too right?&amp;nbsp; &amp;nbsp;Not just the fat endpoint security client?&amp;nbsp; RE:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/SAML-Support-for-Remote-Access-VPN.htm?Highlight=saml" target="_blank"&gt;SAML Support for Remote Access VPN (checkpoint.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 14:56:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/221586#M3654</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2024-07-22T14:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/221599#M3655</link>
      <description>&lt;P&gt;I assume it will work if invoked via MAB portal, which supports SAML auth.&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 15:49:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/221599#M3655</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-22T15:49:46Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/221607#M3656</link>
      <description>&lt;P&gt;It doesn't look like it.&amp;nbsp; &amp;nbsp;In the known limitations section at the bottom of &lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/SAML-Support-for-Remote-Access-VPN.htm?Highlight=saml" target="_blank"&gt;SAML Support for Remote Access VPN (checkpoint.com)&lt;/A&gt;, it says&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;
&lt;P&gt;This feature supports only&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN class="mc-variable Vars_BladesFeatures.tp_ipsecvpn variable"&gt;&lt;A class="MCTextPopup MCTextPopupHotSpot MCTextPopupHotSpot_ #text MCTextPopup_Closed" role="button" href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/SAML-Support-for-Remote-Access-VPN.htm?Highlight=saml#" data-mc-state="closed" data-aria-describedby="df48a8a3-0b9c-4e2e-aa00-eb5a43906f33" target="_blank"&gt;IPsec VPN &lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;clients.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;</description>
      <pubDate>Mon, 22 Jul 2024 16:38:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/221607#M3656</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2024-07-22T16:38:41Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/221624#M3657</link>
      <description>&lt;P&gt;Appears to be supported in Unified Policy mode:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk170775" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk170775&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 22 Jul 2024 18:32:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/221624#M3657</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-22T18:32:19Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/222075#M3658</link>
      <description>&lt;P&gt;After spending a couple of days on this, I'm still spinning my wheels.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/SAML-Support-for-Remote-Access-VPN.htm" target="_blank" rel="noopener"&gt;SAML Support for Remote Access VPN (checkpoint.com)&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;RE: sslvpn web browser (not Endpoint client)&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I have mobile access running in unified mode configured now.&amp;nbsp; I login with the nice keycloak icon on the CP portal (on the keycloak server it says there is an active session), however I get re-directed back. to the check point portal Login page&amp;nbsp; and&amp;nbsp; get the message User is unauthorized.&amp;nbsp; I have a role set up that includes my EXT_ID_keycloak group.&amp;nbsp; It feels like I'm close but no cigar.&amp;nbsp; I'm going to re-read the tags and group attributes.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;RE:&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/SAML-Support-for-Remote-Access-VPN.htm?Highlight=saml" target="_blank"&gt;SAML Support for Remote Access VPN (checkpoint.com)&lt;/A&gt;&amp;nbsp;in the section "if you use an on-premises Active Directory (LDAP)&lt;/P&gt;
&lt;P&gt;We have AD on prem, but we aren't using it with our Keycloak / SAML set up,&amp;nbsp; so when directions say to do A if you have AD and if you don't do B, I'm not sure which way to go.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Jul 2024 18:59:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/222075#M3658</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2024-07-28T18:59:53Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/222124#M3659</link>
      <description>&lt;P&gt;If the SAML assertion contains the relevant groups and you've configured the EXT_ID_ groups, you shouldn't need LDAP.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 12:08:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/222124#M3659</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-29T12:08:47Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/222137#M3660</link>
      <description>&lt;P&gt;Thanks, yes I have the EXT_ID_Test set which matches the Test group on keycloak.&amp;nbsp; &amp;nbsp;I have a role_based rule in my unified policy with a newly created web application.&amp;nbsp; &amp;nbsp;However, after I login - I get User is unauthorized.&amp;nbsp; &amp;nbsp;I wonder if the username has to be unique to any internal users.&amp;nbsp; I'm going to try a unique username today.&amp;nbsp; &amp;nbsp;Update -&amp;nbsp; a unique username didn't help.&amp;nbsp; User is unathorized...&amp;nbsp; &amp;nbsp;I'm testing with sslvpn web apps, and not from&amp;nbsp; a fat client and not snx.&amp;nbsp; &amp;nbsp;I'm not even getting to the screen where I connect with SNX. &amp;nbsp;I haven't seen any documentation to convince me that mobile access portal can support SAML with no SNX or fat client.&amp;nbsp; &amp;nbsp;IOW, I'm trying to login with the edge browser to the portal.&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 13:19:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/222137#M3660</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2024-07-29T13:19:01Z</dc:date>
    </item>
    <item>
      <title>Re: Keycloak - Browser-Based authentication for VPN users</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/222148#M3661</link>
      <description>&lt;P&gt;The MAB portal should support SAML without using SNX.&lt;BR /&gt;My guess is you'll need TAC to help troubleshoot what's happening in the SAML Assertion.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Jul 2024 18:23:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Keycloak-Browser-Based-authentication-for-VPN-users/m-p/222148#M3661</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-07-29T18:23:03Z</dc:date>
    </item>
  </channel>
</rss>

