<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Remote SAML VPN doesn't work with returned groups when using external profiles in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162221#M5992</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;Hi &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Any luck with anything so far ? thanks again&lt;/P&gt;&lt;P&gt;- Dawoud&lt;/P&gt;</description>
    <pubDate>Wed, 16 Nov 2022 12:58:42 GMT</pubDate>
    <dc:creator>sdragon92</dc:creator>
    <dc:date>2022-11-16T12:58:42Z</dc:date>
    <item>
      <title>Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/161966#M5981</link>
      <description>&lt;P&gt;Hello All,&lt;/P&gt;&lt;P&gt;We are using remote access vpn using SAML SSO and it is working however when we return back memberof groups to checkpoint, the access roles doesn't work, the moment we filter using generic* groups. When we switch to filtering using LDAP groups it works perfectly. My question what attribute name does checkpoint waits in the SAML assertion to provide filtering after authentication in the access roles? Thanks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;An update, I used the attribute name&amp;nbsp;&lt;STRONG&gt;group_attr&amp;nbsp;&lt;/STRONG&gt;to be returned to the checkpoint and its value is the memberof value mapped from the AD, so it returns multiple values in the assertion. and it still unable to use the access roles. My question is , are the IdP returning the attributes correctly but the identity awareness blade doesn't work on that ? is it must be LDAP profile instead of generic/external ?&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Dawoud&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 03:35:47 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/161966#M5981</guid>
      <dc:creator>sdragon92</dc:creator>
      <dc:date>2022-11-14T03:35:47Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162029#M5982</link>
      <description>&lt;P&gt;For AzureAD, I'm pretty sure this is done through the Graph API (starting from R81).&lt;BR /&gt;In R80.40 (which doesn't support Graph API), you have to manually create Identity Tags for the groups you wish to use.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 14:58:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162029#M5982</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-14T14:58:45Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162037#M5983</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;Thanks for getting back to us I appreciate it very much. No we are not using Azure AD for this customer, I supposed if the customer has Azure AD we can link checkpoint to it using API calls and it will identify the groups in the identity awareness in the policies but this case is different. This is using normal on prem AD, when I use external profile of generic* users it works but access roles of LDAP groups doesn't work (this is on client VPN). On Mobile access when we send this&amp;nbsp;&lt;STRONG&gt;group_attr&lt;/STRONG&gt; it doesnt work at all it says user is unauthorized. Workaround I found is to remove external users (generic) from VPN user directories and depend on LDAP. So is that a normal behavior ? Also can I create a local group on Checkpoint to match what we receive from IdP in SAML assertion "&lt;STRONG&gt;group_attr"&lt;/STRONG&gt; in case of using on prem AD (I saw a video from checkpoint stating this workaround until graph API is available to Azure) so since we are not using Azure, is that a valid workaround? Kindly let me know your thoughts. I appreciate your time.&lt;/P&gt;&lt;P&gt;- Dawoud&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 15:40:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162037#M5983</guid>
      <dc:creator>sdragon92</dc:creator>
      <dc:date>2022-11-14T15:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162045#M5984</link>
      <description>&lt;P&gt;Seems reasonable to try and create an Identity Tag that matches the capitalization of what you have in your on-prem AD to see if that works.&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8232"&gt;@Royi_Priov&lt;/a&gt;&amp;nbsp;and team can confirm.&lt;BR /&gt;Otherwise, you have to do this with LDAP.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 15:48:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162045#M5984</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-14T15:48:05Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162048#M5985</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;thanks for your reply. I tried the identity tag but I am not much experienced with it. I created one with a dummy name and sent that dummy name from IdP as&amp;nbsp;&lt;STRONG&gt;group_attr&lt;/STRONG&gt; then created an access role with that identity tag ,not sure if that is correct or not. It still don't work, the only option I haven't tried is the local group creation on checkpoint. The steps I did for identity tag I am not sure are complete or not, the other problem with the identity tag is we cannot automate it from IdPfor everyone unless we create a tag for every needed group to be matched. One thing that came in mind, when I was analyzing the SAML traces, the&amp;nbsp;&lt;STRONG&gt;group_attr&amp;nbsp;&lt;/STRONG&gt;sends multiple values of the virtual_group attribute from AD, so it sends the groups that the user is part of, does checkpoint checks every entry there or the first entry or the first match only? how does that work?&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me know your feedback, I appreciate it&lt;/P&gt;&lt;P&gt;- Dawoud&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 15:56:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162048#M5985</guid>
      <dc:creator>sdragon92</dc:creator>
      <dc:date>2022-11-14T15:56:15Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162061#M5986</link>
      <description>&lt;P&gt;You've added the relevant Identity Tags (capitalized exactly as defined in AD) to the appropriate Access Roles, correct?&lt;BR /&gt;Only the groups (or identity tags) defined as part of an Access Role will be matched (and multiple can be matched).&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 17:45:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162061#M5986</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-14T17:45:09Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162073#M5987</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;I will try it now and let you now the results (screenshot of SAML assertion/smartconsole config ... Thanks again.&lt;/P&gt;&lt;P&gt;-Dawoud&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 18:12:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162073#M5987</guid>
      <dc:creator>sdragon92</dc:creator>
      <dc:date>2022-11-14T18:12:06Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162081#M5988</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;Here is the output of my testing:&lt;/P&gt;&lt;P&gt;1- I did create a local group, added to it the LDAP group with the same name and external (generic*) inside and then added that local group to the access role and that failed.&lt;/P&gt;&lt;P&gt;2- Made the local group alone with no inside groups and still no difference (if checkpoint match by name only), I put only LDAP group inside and in access roles still no luck.&lt;/P&gt;&lt;P&gt;3- Created identity tag with same name , I validated the name from SAML assertions correct. So right now the access role have 3 entries, one for local group with same name with no inside groups, one identity tag with same name and one LDAP group with same name and still fails.&lt;/P&gt;&lt;P&gt;4- When I tested this in mobile access I added 3 separate rules, 2 each for specific groups (including local and LDAP) and third for external (generic*) each having a unique website to identify which matched which after authentication and I can tell you, the external is the only one that worked. Please find screenshots of the configuration I have in my test lab.&lt;/P&gt;&lt;P&gt;Not sure what else to test , or I might be doing something wrong in between. So as far as I am experienced with checkpoint I know every feature needs a trigger to work. in Fortinet for example, I need to create a match for the SAML assertion group name one by one if I want to, in Checkpoint is there such a feature to enable it to match with what it gets in&amp;nbsp;&lt;STRONG&gt;group_attr&amp;nbsp;&lt;/STRONG&gt;&amp;nbsp; ?&amp;nbsp; maybe thats the trick ? I appreciate your feedback in advance !&lt;/P&gt;&lt;P&gt;-- Dawoud&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 20:49:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162081#M5988</guid>
      <dc:creator>sdragon92</dc:creator>
      <dc:date>2022-11-14T20:49:45Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162086#M5989</link>
      <description>&lt;P&gt;We may not be reading the groups at all from the SAML assertion...and that may be by design.&lt;BR /&gt;However, I don't know for sure and will need some confirmation from R&amp;amp;D.&lt;BR /&gt;Recommend a TAC case in parallel if you don't have one already.&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 21:32:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162086#M5989</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-14T21:32:45Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162088#M5990</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;weird thing is from pdp monitor , it knows that the user is part of the correct access roles:&lt;/P&gt;&lt;P&gt;[Expert@fapaccp01:0]# pdp monitor user vicd&lt;/P&gt;&lt;P&gt;Session: e058185b&lt;BR /&gt;Session UUID: {7728F8D2-3FE9-17BE-9792-556D9F5D7301}&lt;BR /&gt;Ip: 10.55.55.58&lt;BR /&gt;Users:&lt;BR /&gt;vicd@dawoud.com {993645f2}&lt;BR /&gt;LogUsername: Vic DeHurwst (vicd)&lt;BR /&gt;Groups: All Users;LDAP_ONLY_AD;ad_group_LDAP_ONLY&lt;BR /&gt;Roles: LDAP_ONLY_AR&lt;BR /&gt;Client Type: AD Query&lt;BR /&gt;Authentication Method: Trust&lt;BR /&gt;Distinguished Name: CN=Vic DeHurwst,OU=SOC_CONSULTANT,OU=OPERATIONS,DC=dawoud,DC=com&lt;BR /&gt;Connect Time: Tue Nov 15 00:12:41 2022&lt;BR /&gt;Next Reauthentication: Tue Nov 15 12:13:11 2022&lt;BR /&gt;Next Connectivity Check: Tue Nov 15 12:13:11 2022&lt;BR /&gt;Next Ldap Fetch: Tue Nov 15 01:10:11 2022&lt;/P&gt;&lt;P&gt;Packet Tagging Status: Not Active&lt;BR /&gt;Published Gateways: Local&lt;/P&gt;&lt;P&gt;I think once the authentication is set to external profiles, this pdp monitor result doesn't matter somehow (correct me if I am wrong), unfortunately this is a test environment used for evaluating integrations at the time being. the customer side doesn't have a problem with the LDAP solution so no TAC needed there. but for myself this is an issue for me, so a question what if we configure Azure AD to be connected to Checkpoint and we send the user roles defined in Azure in the SAML Assertion, does that qualify as a workaround ? Let me know your thoughts. Also I checked the DB and generic_fetch was set to false, I changed it to true but same issue.&lt;/P&gt;&lt;P&gt;- Dawoud&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 22:45:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162088#M5990</guid>
      <dc:creator>sdragon92</dc:creator>
      <dc:date>2022-11-14T22:45:28Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162089#M5991</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;I saw the documentation video from Checkpoint officially stating to return groups in&amp;nbsp;&lt;STRONG&gt;group_attr&amp;nbsp;&lt;/STRONG&gt;while creating internal groups in parallel. I did that and also did the identity tag to match with what we get exactly from IdP, not sure where the trick is. I have a feeling there is something that need to be done to allow checkpoint read the groups, maybe there is a trigger somewhere.. The reason why I think this why also is because when I send &lt;STRONG&gt;group_attr1&amp;nbsp;&lt;/STRONG&gt;for example, it doesn't change anything and break anything which proves Checkpoint is indeed understanding&amp;nbsp;&lt;STRONG&gt;group_attr&amp;nbsp;&lt;/STRONG&gt; but likely not what's inside it for some reason. Also if you know some good commands for SAML assertion and what did checkpoint do after getting it and identifying the user ? What is your thoughts?&lt;/P&gt;&lt;P&gt;- Dawoud&lt;/P&gt;</description>
      <pubDate>Mon, 14 Nov 2022 23:47:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162089#M5991</guid>
      <dc:creator>sdragon92</dc:creator>
      <dc:date>2022-11-14T23:47:20Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162221#M5992</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;Hi &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; Any luck with anything so far ? thanks again&lt;/P&gt;&lt;P&gt;- Dawoud&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 12:58:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162221#M5992</guid>
      <dc:creator>sdragon92</dc:creator>
      <dc:date>2022-11-16T12:58:42Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162249#M5993</link>
      <description>&lt;P&gt;Unless&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8232"&gt;@Royi_Priov&lt;/a&gt;&amp;nbsp;or someone on his team has further suggestions, I recommend a TAC case.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Nov 2022 15:20:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162249#M5993</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-16T15:20:42Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162681#M5994</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;I figured it out ! Checkpoint adds &lt;STRONG&gt;EXT_ID_groupname&lt;/STRONG&gt;&amp;nbsp;, therefore I created identity tag with value &lt;STRONG&gt;EXT_ID_LDAP_ONLY&lt;/STRONG&gt; or local group&amp;nbsp;&lt;STRONG&gt;EXT_ID_LDAP_ONLY&lt;/STRONG&gt;&amp;nbsp;and it worked finally !&amp;nbsp;&lt;/P&gt;&lt;P&gt;Dawoud&lt;/P&gt;</description>
      <pubDate>Mon, 21 Nov 2022 18:32:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162681#M5994</guid>
      <dc:creator>sdragon92</dc:creator>
      <dc:date>2022-11-21T18:32:25Z</dc:date>
    </item>
    <item>
      <title>Re: Remote SAML VPN doesn't work with returned groups when using external profiles</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162863#M5995</link>
      <description>&lt;P&gt;Turns out this is in an SK:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk177267&amp;amp;partition=Advanced&amp;amp;product=Mobile" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk177267&amp;amp;partition=Advanced&amp;amp;product=Mobile&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 22 Nov 2022 22:25:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/Remote-SAML-VPN-doesn-t-work-with-returned-groups-when-using/m-p/162863#M5995</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-11-22T22:25:17Z</dc:date>
    </item>
  </channel>
</rss>

