<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Checkpoint R81.10 VPN MFA with OKTA radius in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197828#M4403</link>
    <description>&lt;P&gt;I think the way it was done is the issue, in my opinion. Whenever I did this with the customers, I would add auth methods as SEPARATE entities (if you will), meaning say if radius is preferred auth method, then you set it as first in the list, or even set it as global auth method and then have it as only method in the list. Do you require anyone to log in as user/pass? If you do, then simply enable it on the user settings locally in the dashboard and have user/pass method as separate auth method in the list (radius first, user/pass second).&lt;/P&gt;
&lt;P&gt;Makes sense?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Mon, 13 Nov 2023 14:19:20 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2023-11-13T14:19:20Z</dc:date>
    <item>
      <title>Checkpoint R81.10 VPN MFA with OKTA radius</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197766#M4398</link>
      <description>&lt;P&gt;I am trying to setup MFA on my Checkpoint VPN via OKTA radius agent. I'm utilizing the steps provided by Checkpoint which point to OKTA. We went through every step with the exception of the last couple that involve Mobile section at the tail end as we are not utilizing that. We are running R81.10 and some of the items are in different places from the documentation we were provided by Checkpoint. Everything is configured and then on the Client itself, we changed from Username/Password auth to STANDARD. After doing that, we are able to hit the connect button on the client, it prompts you to enter in your username, but the password field is greyed out. You press continue and then it pops up a box that says Response, but I'm not receiving any pushes from OKTA verify, Cell texts or anything for which to enter in a response in the Checkpoint client. Spent 3 hours on the phone with OKTA and Checkpoint support together this morning and ended up just submitting VPN Debug logs and no Checkpoint VPN w/MFA. Anyone else get this to working? Mind sharing your process?&lt;/P&gt;&lt;P&gt;Any help is greatly appreciated.&lt;/P&gt;&lt;P&gt;&lt;A href="https://help.okta.com/en-us/content/topics/integrations/check-point-radius-intg.htm" target="_blank"&gt;https://help.okta.com/en-us/content/topics/integrations/check-point-radius-intg.htm&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Nov 2023 21:29:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197766#M4398</guid>
      <dc:creator>seanmc12</dc:creator>
      <dc:date>2023-11-12T21:29:06Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint R81.10 VPN MFA with OKTA radius</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197773#M4399</link>
      <description>&lt;P&gt;Personally, I think running vpn debugs here is not useful, just my opinion, as you are not having issue with site to site vpn tunnel traffic.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Having read all you indicated, I am fairly confident its something missing in the config. Are you able to share some screenshots of how you configured this? My colleague and I got this working in the lab before and we actually followed document I attached, along with the script on the mgmt server,&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 03:27:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197773#M4399</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-11-13T03:27:47Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint R81.10 VPN MFA with OKTA radius</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197811#M4400</link>
      <description>&lt;P&gt;Attached a screen shots of our config and the Checkpoint provided link to the process. &lt;A href="https://help.okta.com/oie/en-us/content/topics/integrations/check-point-radius-intg-conf-gateway.htm" target="_blank"&gt;https://help.okta.com/oie/en-us/content/topics/integrations/check-point-radius-intg-conf-gateway.htm&lt;/A&gt; On the Client side, we changed the Authentication from Username/PW to Standard. There are some steps regarding enabling Mobile Access at the bottom of the instructions. "&lt;STRONG&gt;Configure browser access to the Check Point Mobile Access SSL VPN portal&lt;/STRONG&gt;"&lt;/P&gt;&lt;P&gt;Does that need to be done?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 13:30:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197811#M4400</guid>
      <dc:creator>seanmc12</dc:creator>
      <dc:date>2023-11-13T13:30:10Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint R81.10 VPN MFA with OKTA radius</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197820#M4401</link>
      <description>&lt;P&gt;This is what Im interested in. Are you able to send that please? And blur out any sensitive info.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot_1.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/23204iE61BA1F14DCB713D/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screenshot_1.png" alt="Screenshot_1.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt; &lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 13:46:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197820#M4401</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-11-13T13:46:20Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint R81.10 VPN MFA with OKTA radius</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197824#M4402</link>
      <description>&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;Here you go&lt;/P&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 14:02:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197824#M4402</guid>
      <dc:creator>seanmc12</dc:creator>
      <dc:date>2023-11-13T14:02:08Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint R81.10 VPN MFA with OKTA radius</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197828#M4403</link>
      <description>&lt;P&gt;I think the way it was done is the issue, in my opinion. Whenever I did this with the customers, I would add auth methods as SEPARATE entities (if you will), meaning say if radius is preferred auth method, then you set it as first in the list, or even set it as global auth method and then have it as only method in the list. Do you require anyone to log in as user/pass? If you do, then simply enable it on the user settings locally in the dashboard and have user/pass method as separate auth method in the list (radius first, user/pass second).&lt;/P&gt;
&lt;P&gt;Makes sense?&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 14:19:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197828#M4403</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-11-13T14:19:20Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint R81.10 VPN MFA with OKTA radius</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197845#M4404</link>
      <description>&lt;P&gt;I agree. I deployed Okta w/ RADIUS with a dedicated authentication realm and it worked.&lt;/P&gt;&lt;P&gt;It's been a while but ensure you use samaccountname + domain name as login factor and check that Okta performs primary authentication and your users and groups are provisioned within the Okta directory.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 17:38:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197845#M4404</guid>
      <dc:creator>Alex-</dc:creator>
      <dc:date>2023-11-13T17:38:50Z</dc:date>
    </item>
    <item>
      <title>Re: Checkpoint R81.10 VPN MFA with OKTA radius</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197847#M4405</link>
      <description>&lt;P&gt;Exactly. I had done it that way 3 times and worked fine.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Mon, 13 Nov 2023 17:40:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Checkpoint-R81-10-VPN-MFA-with-OKTA-radius/m-p/197847#M4405</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-11-13T17:40:24Z</dc:date>
    </item>
  </channel>
</rss>

