<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote Access VPN with SAML Auth and MEP - Identity Provider Configuration in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/201186#M4256</link>
    <description>&lt;P&gt;I've looked further into this and it is not MEP, but the RA secondary connect, which happens automatically for all gateways that are part of the RemoteAccess community (and is needed in the current setup due to the different EncDoms from different sites).&lt;/P&gt;&lt;P&gt;If this is the design, I guess using multiple gateways for Remote Access and trying to use Identity Provider is kind of scuffed, if there is no option to consolidate that login, if I have to bind one Provider to a single Gateway/Cluster?&lt;/P&gt;&lt;P&gt;If I have to log in to 6-8 different Identity Providers each time I wanna use Client VPN, that's gonna be rather unfeasible after 2 days.&lt;/P&gt;&lt;P&gt;Should I open a case for this? I don't seem to find any real documentation for this usecase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 20 Dec 2023 13:24:42 GMT</pubDate>
    <dc:creator>Jonas_Meineke</dc:creator>
    <dc:date>2023-12-20T13:24:42Z</dc:date>
    <item>
      <title>Remote Access VPN with SAML Auth and MEP - Identity Provider Configuration</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/201033#M4254</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;there's 2 questions for this matter:&lt;/P&gt;&lt;P&gt;a) Is MEP with Identity Provider seamless? Will I only have to login once, or do I have to login to every single gateway again?&lt;/P&gt;&lt;P&gt;b) Is a bit more technical:&lt;/P&gt;&lt;P&gt;We have an environment, where we have a working MEP Configuration for Username/Password.&lt;/P&gt;&lt;P&gt;We're trying to change to Azure AD Auth with SAML / Identity Provider.&lt;/P&gt;&lt;P&gt;I've gone through the AdminGuide for SAML Support&lt;/P&gt;&lt;P&gt;(&lt;A href="https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/SAML-Support-for-Remote-Access-VPN.htm" target="_blank" rel="noopener"&gt;https://sc1.checkpoint.com/documents/R81.10/WebAdminGuides/EN/CP_R81.10_RemoteAccessVPN_AdminGuide/Topics-VPNRG/SAML-Support-for-Remote-Access-VPN.htm&lt;/A&gt;)&lt;/P&gt;&lt;P&gt;and configured my Identity Provider, added a second Login Option for Identity Provider Usage and gone through the GuiDBedit part.&lt;/P&gt;&lt;P&gt;For MEP, there is only one remark under "Step 4: Configure the Identity Provider as an Authentication Method":&lt;/P&gt;&lt;P&gt;&lt;SPAN class=""&gt;Note&lt;/SPAN&gt; - For Remote Access &lt;SPAN class=""&gt;Multiple Entry Point&lt;/SPAN&gt; (MEP), you must configure the same &lt;SPAN class=""&gt;Login Option&lt;/SPAN&gt; on all &lt;SPAN class=""&gt;Security Gateways&lt;/SPAN&gt; that participate in MEP. Make sure to add all the &lt;SPAN class=""&gt;Identity Provider&lt;/SPAN&gt; objects (one per &lt;SPAN class=""&gt;Security Gateway&lt;/SPAN&gt;) to a dedicated &lt;SPAN class=""&gt;Login Option&lt;/SPAN&gt;.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Does this implicitely mean, that we have to create an Identity Provider Object for every single gateway that takes part in the Remote Access community and therefore gets added to the MEP configuration?&lt;BR /&gt;&lt;BR /&gt;And secondary, "add all&amp;nbsp; &lt;SPAN class=""&gt;IDP &lt;/SPAN&gt;objects (one per &lt;SPAN class=""&gt;Security Gateway&lt;/SPAN&gt;) to a dedicated &lt;SPAN class=""&gt;Login Option&lt;/SPAN&gt;", does this mean, that I need one addtional login option with all configured Identity Providers, or do I need a separate one for each Identity Provider, given that I might indeed have to create an IDP for each participating gateway?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The Setup is that everyone connects to the main site (That one got the Identity Provider configured above), and then uses MEP to get to other sites afterwards.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Question is, can other MEP Gateways simply use the already established user verification somehow and I missed that point, or do we have to login to every gateway indeed?&lt;/P&gt;&lt;P&gt;In the current config: After the initial successful SAML login to the main site, the next site comes up and gives us another Identity Provider login which then fails.&lt;/P&gt;&lt;P&gt;Best Regards,&lt;BR /&gt;Jonas&lt;/P&gt;</description>
      <pubDate>Tue, 19 Dec 2023 11:20:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/201033#M4254</guid>
      <dc:creator>Jonas_Meineke</dc:creator>
      <dc:date>2023-12-19T11:20:05Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with SAML Auth and MEP - Identity Provider Configuration</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/201153#M4255</link>
      <description>&lt;P&gt;Pretty sure MEP does not reuse the existing authentication, even when SAML is not used.&lt;BR /&gt;Not sure if you can reuse the Identity Provider for all gateways/clusters unless the redirection URL will terminate on the relevant gateway.&lt;BR /&gt;I don't see how this can work for external users.&lt;BR /&gt;Which means:&amp;nbsp;you will need to create a new Identity Provider object for each gateway/cluster.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2023 00:39:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/201153#M4255</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-12-20T00:39:57Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with SAML Auth and MEP - Identity Provider Configuration</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/201186#M4256</link>
      <description>&lt;P&gt;I've looked further into this and it is not MEP, but the RA secondary connect, which happens automatically for all gateways that are part of the RemoteAccess community (and is needed in the current setup due to the different EncDoms from different sites).&lt;/P&gt;&lt;P&gt;If this is the design, I guess using multiple gateways for Remote Access and trying to use Identity Provider is kind of scuffed, if there is no option to consolidate that login, if I have to bind one Provider to a single Gateway/Cluster?&lt;/P&gt;&lt;P&gt;If I have to log in to 6-8 different Identity Providers each time I wanna use Client VPN, that's gonna be rather unfeasible after 2 days.&lt;/P&gt;&lt;P&gt;Should I open a case for this? I don't seem to find any real documentation for this usecase.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2023 13:24:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/201186#M4256</guid>
      <dc:creator>Jonas_Meineke</dc:creator>
      <dc:date>2023-12-20T13:24:42Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with SAML Auth and MEP - Identity Provider Configuration</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/201202#M4257</link>
      <description>&lt;P&gt;What you need to do (I believe) is create multiple objects for the same SAML provider with a similar configuration (the Identifier and Reply URL&amp;nbsp;is specific to the gateway terminating the connection).&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="image.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23736i7B4219F2F6B954CF/image-size/large?v=v2&amp;amp;px=999" role="button" title="image.png" alt="image.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Even within the same gateway, you currently have to create multiple objects if you are using SAML with, say, Mobile Access Blade and Identity Awareness.&lt;BR /&gt;This is a known limitation at present.&lt;/P&gt;
&lt;P&gt;In R82, Quantum Gateways will be able to use Identity Providers defined in the Check Point Infinity Portal, allowing customers to centrally manage identities across multiple Check Point products.&lt;BR /&gt;This should eliminate this issue.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Dec 2023 15:17:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/201202#M4257</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-12-20T15:17:42Z</dc:date>
    </item>
    <item>
      <title>Re: Remote Access VPN with SAML Auth and MEP - Identity Provider Configuration</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/202409#M4258</link>
      <description>&lt;P&gt;hey Jonas,&lt;/P&gt;
&lt;P&gt;any news on this?&lt;/P&gt;</description>
      <pubDate>Sun, 07 Jan 2024 18:30:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-Access-VPN-with-SAML-Auth-and-MEP-Identity-Provider/m-p/202409#M4258</guid>
      <dc:creator>CheckPointerXL</dc:creator>
      <dc:date>2024-01-07T18:30:00Z</dc:date>
    </item>
  </channel>
</rss>

