<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SAML Support for Remote Access VPN in SASE and Remote Access</title>
    <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/159249#M8745</link>
    <description>&lt;P&gt;Hi PhoneBoy,&lt;/P&gt;
&lt;P&gt;We are planning to use SAML authentication for mobile access vpn. We are on R81.10 Take 66 and already using NPS server for authentication, switching from NPS to SAML. I am following sk172909, I have query regarding script. Do I need to run the script for this scenario because in the sk172909 it is not mentioned "mobile access" in product section.&lt;/P&gt;</description>
    <pubDate>Tue, 11 Oct 2022 13:21:44 GMT</pubDate>
    <dc:creator>Gaurav_Pandya</dc:creator>
    <dc:date>2022-10-11T13:21:44Z</dc:date>
    <item>
      <title>SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/117199#M8663</link>
      <description>&lt;P&gt;This question has come up a lot on the community.&lt;BR /&gt;We now have a formally supported solution that allows integration with ADFS and other SAML-based authentication.&lt;BR /&gt;This requires Check Point gateways running (at minimum) the following releases:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;R80.40 JHF 114 or above (not supported with Maestro)&lt;/LI&gt;
&lt;LI&gt;R81 JHF 42 or above&amp;nbsp;(not supported with Maestro)&lt;/LI&gt;
&lt;LI&gt;R81.10 JHF 9 or above&amp;nbsp;(not supported with Maestro)&lt;/LI&gt;
&lt;LI&gt;R81.20 (supported with Maestro) and above&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;The following VPN clients are supported (minimum versions listed):&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;E84.70 on Windows&lt;/LI&gt;
&lt;LI&gt;E85.30 on macOS&lt;/LI&gt;
&lt;LI&gt;Capsule VPN clients (see&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk181494" target="_self"&gt;sk181494&lt;/A&gt;), which requires the following gateway versions:
&lt;UL&gt;
&lt;LI&gt;R81.10 JHF 43 and above&lt;/LI&gt;
&lt;LI&gt;R81.20 JHF 113 and above&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;This solution is NOT currently supported with:&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;Capsule Workspace&lt;/LI&gt;
&lt;LI&gt;Embedded Gaia/SMB Gasteways&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;If such support is needed, please open an RFE with your local Check Point office.&lt;/P&gt;
&lt;P&gt;You can see the details in the R81.20 Remote Access VPN guide under &lt;A href="https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_RemoteAccessVPN_AdminGuide/Content/Topics-VPNRG/SAML-Support-for-Remote-Access-VPN.htm?tocpath=_____19" target="_self"&gt;SAML Support for Remote Access VPN&lt;/A&gt;&amp;nbsp;and/or &lt;A href="https://support.checkpoint.com/results/sk/sk172909" target="_blank"&gt;sk172909&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;See also this video by&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/177"&gt;@Peter_Elmer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;div class="video-embed-center video-embed"&gt;&lt;iframe class="embedly-embed" src="https://cdn.embedly.com/widgets/media.html?src=https%3A%2F%2Fwww.youtube.com%2Fembed%2FSkUG7ptf-sk%3Ffeature%3Doembed&amp;amp;display_name=YouTube&amp;amp;url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv%3DSkUG7ptf-sk&amp;amp;image=https%3A%2F%2Fi.ytimg.com%2Fvi%2FSkUG7ptf-sk%2Fhqdefault.jpg&amp;amp;type=text%2Fhtml&amp;amp;schema=youtube" width="200" height="112" scrolling="no" title="Check Point VPN Client SAML Authentication - Overview" frameborder="0" allow="autoplay; fullscreen; encrypted-media; picture-in-picture;" allowfullscreen="true"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/P&gt;
&lt;P&gt;(Last edited April 2024)&lt;/P&gt;</description>
      <pubDate>Fri, 19 Apr 2024 14:22:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/117199#M8663</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-04-19T14:22:21Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/117555#M8664</link>
      <description>&lt;P&gt;This is great news! I've been looking for a way to use Azure MFA, but the Windows NPS RADIUS had some caveats where each additional tunnel with secondary connect re-prompted for MFA.&lt;/P&gt;&lt;P&gt;I am curious how this will behave with secondary connect in my environment, where I have SMB firewalls that won't support the new SAML authentication method. The video says at the 5:20 mark that the identity awareness session can be shared with other gateways post-authentication, but does that apply to authentication itself?&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 13:25:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/117555#M8664</guid>
      <dc:creator>JustTesting</dc:creator>
      <dc:date>2021-05-03T13:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/117556#M8665</link>
      <description>&lt;P&gt;That’s a good question.&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/5692"&gt;@AndreiR&lt;/a&gt;&amp;nbsp;do you know?&lt;/P&gt;</description>
      <pubDate>Mon, 03 May 2021 13:51:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/117556#M8665</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-05-03T13:51:28Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/117657#M8666</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp; I don't know for sure. Better check with gateway team.&lt;/P&gt;</description>
      <pubDate>Tue, 04 May 2021 16:12:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/117657#M8666</guid>
      <dc:creator>AndreiR</dc:creator>
      <dc:date>2021-05-04T16:12:35Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/118647#M8667</link>
      <description>&lt;P&gt;We checked this and confirmed that this will only work where the gateway has exactly the same authentication factor/factors as the realm on the primary gateway.&lt;BR /&gt;This is by design.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 14:49:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/118647#M8667</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-05-18T14:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/118648#M8668</link>
      <description>&lt;P&gt;Understood, thank you for looking into it!&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 14:51:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/118648#M8668</guid>
      <dc:creator>JustTesting</dc:creator>
      <dc:date>2021-05-18T14:51:36Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/122322#M8669</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone managed to make this work? Although gateway is upgraded to R80.40 with JHF114 there is still no option on the gateway properties&amp;nbsp;&lt;STRONG&gt;VPN Clients &amp;gt; SAML Portal Settings&amp;nbsp;&lt;/STRONG&gt;as stated in the Release notes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also on R81, is it yet available?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 06:32:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/122322#M8669</guid>
      <dc:creator>lullejd</dc:creator>
      <dc:date>2021-06-28T06:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/122324#M8670</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;thanks for your question.&lt;/P&gt;
&lt;P&gt;To be able to configure SAML for VPN RA, you'll need to also upgrade your MGMT to the JHF.&lt;/P&gt;
&lt;P&gt;As for R81 - feature is planned to be available in next R81 JHF - currently scheduled for end of July.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 07:14:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/122324#M8670</guid>
      <dc:creator>Anat_Bar-Anan</dc:creator>
      <dc:date>2021-06-28T07:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/122325#M8671</link>
      <description>&lt;P&gt;I have management with R81 latest jumbo hotfix and Gateway R80.40 take 141. I think the management is the problem then. will have to wait for the new JHF of R81&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 07:20:54 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/122325#M8671</guid>
      <dc:creator>lullejd</dc:creator>
      <dc:date>2021-06-28T07:20:54Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/122340#M8672</link>
      <description>&lt;P&gt;updating that next R81 JHF scheduled to mid-end of August&lt;/P&gt;</description>
      <pubDate>Mon, 28 Jun 2021 09:14:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/122340#M8672</guid>
      <dc:creator>Anat_Bar-Anan</dc:creator>
      <dc:date>2021-06-28T09:14:06Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/123539#M8673</link>
      <description>&lt;P&gt;This is much nicer than using the Microsoft NPS AzureAD plugin for MFA!&lt;/P&gt;&lt;P&gt;With reference to the PDF in the SK (SAML for Remote Access VPN, 6 June 2021), using UPN rather than email for LDAP matching (pg 12, Multiple Logon Option) is likely to be more successful. Organisations often have external users requiring access, and the UPN for such users will be the required &lt;A href="mailto:firstname.surname@org.domain" target="_blank"&gt;firstname.surname@org.domain&lt;/A&gt; but their &lt;EM&gt;email&lt;/EM&gt; address in AD is more often an external domain. In such a scenario uses cannot logon unless the lookup type is set to UPN.&lt;/P&gt;</description>
      <pubDate>Sun, 11 Jul 2021 22:48:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/123539#M8673</guid>
      <dc:creator>Paul_Hagyard</dc:creator>
      <dc:date>2021-07-11T22:48:15Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/123540#M8674</link>
      <description>&lt;P&gt;I will review the client documentation and likely raise a SR, but is there any known way with Endpoint Security standalone to not perform a CRL check on the gateway VPN certificate?&lt;/P&gt;&lt;P&gt;At present we have got this working with the gateway using a default SmartCenter ICA issued VPN certificate. The SmartCenter CA certificate is loaded into the client trusted root certificate store. Everything works fine, but the client complains about being unable to reach the CRL. The SmartCenter uses an internal domain name, so the CA is not resolvable (and is not accessible from the Internet anyway).&lt;/P&gt;</description>
      <pubDate>Sun, 11 Jul 2021 22:53:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/123540#M8674</guid>
      <dc:creator>Paul_Hagyard</dc:creator>
      <dc:date>2021-07-11T22:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/123543#M8675</link>
      <description>&lt;P&gt;Without validating the CRL there is no way for the client to know if the remote certificate should be trusted as it could have been revoked.&lt;BR /&gt;Even if it is possible (don’t believe it is) it’s not recommended to disable this check.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jul 2021 00:25:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/123543#M8675</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-12T00:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/123547#M8676</link>
      <description>&lt;P&gt;Thanks, although it's only the new browser component for SAML doing the CRL check. For non-SAML VPN connections the Endpoint Security client does not complain about being unable to perform a CRL check on the same certificate (e.g. retrieving the site details/policy via HTTPS) - so presumably it is not checking beyond the certificate's CA trust.&lt;/P&gt;&lt;P&gt;Sounds like the easiest option is an external CA cert.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jul 2021 00:37:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/123547#M8676</guid>
      <dc:creator>Paul_Hagyard</dc:creator>
      <dc:date>2021-07-12T00:37:36Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/123549#M8677</link>
      <description>&lt;P&gt;That...could be a bug and might be worth a TAC case.&lt;/P&gt;</description>
      <pubDate>Mon, 12 Jul 2021 01:45:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/123549#M8677</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-12T01:45:49Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/124258#M8678</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;For anyone implementing this with Azure AD and retaining local AD group matching via LDAP for Identity Awareness role-based access, we found it was necessary to modify &lt;EM&gt;$FWDIR/conf/identity_awareness_custom_settings.C&lt;/EM&gt; on the SmartCenter server(see sk147417) and &lt;EM&gt;uncomment&lt;/EM&gt; the line:&lt;/P&gt;&lt;P&gt;#\,&lt;/P&gt;&lt;P&gt;to be simply&lt;/P&gt;&lt;P&gt;\,&lt;/P&gt;&lt;P&gt;Otherwise Identity Awareness fails to match AD user DNs in the format "DN=surname\,firstname@domain" and role-based access does not work. A policy install is required to push the behaviour change to the gateway.&lt;/P&gt;&lt;P&gt;Cheers,&lt;/P&gt;&lt;P&gt;Paul&lt;/P&gt;</description>
      <pubDate>Mon, 19 Jul 2021 02:45:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/124258#M8678</guid>
      <dc:creator>Paul_Hagyard</dc:creator>
      <dc:date>2021-07-19T02:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/125651#M8679</link>
      <description>&lt;P&gt;Currently as per&amp;nbsp;&lt;SPAN&gt;sk172909 for SAML Authentication Configuration you require the following:&amp;nbsp;&lt;/SPAN&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;Check Point Security Gateway running R80.40 Jumbo Hotfix Accumulator Take 114 or higher.&lt;/LI&gt;
&lt;LI&gt;Check Point Security Management running R80.40 Jumbo Hotfix Accumulator Take 114 or higher.&lt;/LI&gt;
&lt;LI&gt;Endpoint Security Client for Windows (starting from version E84.70 build 986102705), or&amp;nbsp; macOS Endpoint Security Client version that can be downloaded here: (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal/role/supportcenterUser/page/default.psml/media-type/html?action=portlets.DCFileAction&amp;amp;eventSubmit_doGetdcdetails=&amp;amp;fileid=114251" target="_blank" rel="noopener"&gt;Endpoint Security VPN&lt;/A&gt;).&lt;/LI&gt;
&lt;LI&gt;The latest Smartconsole Build for R80.40 Build 423 or higher. Without this the portal page won't be visible. Refer to&amp;nbsp;&lt;SPAN&gt;sk165473 for more details.&amp;nbsp;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;If your MGMT server is on R81 or R81.10 the Portal Page will not be visible. Both the Gateway and Mgmt Server need to be on R80.40. Integration seems to be only for R80.40 Gateways, Cluster's and VSX currently.&amp;nbsp;&lt;/LI&gt;
&lt;/OL&gt;</description>
      <pubDate>Wed, 04 Aug 2021 05:42:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/125651#M8679</guid>
      <dc:creator>meeruji</dc:creator>
      <dc:date>2021-08-04T05:42:22Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/127126#M8680</link>
      <description>&lt;P&gt;Any updates for this support in R81 (my lab is on R81 for testing purposes) and all the manual steps and specific version requirements make this very difficult for me to test on my production gateways.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Given that it’s been several months since this was first dropped, any updates on some of the limitations (specifically, Identity Sharing - I need to enforce Access Roles on gateways other than my VPN gateways).&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And the SK makes a note about SDL doesn’t support SAML, which I completely understand, but does that mean that we can’t use SDL without SAML and still use SAML for user triggered VPN connections?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Finally, what happens if the client isn’t at a version that supports SAML? &amp;nbsp;Do they fallback to another supported mechanism (RADIUS) or do they just completely fail to authenticate?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 18:59:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/127126#M8680</guid>
      <dc:creator>Heath_H</dc:creator>
      <dc:date>2021-08-16T18:59:20Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/127134#M8681</link>
      <description>&lt;P&gt;As far as I know, Remote Access SAML will be added to the R81/R81.10 JHF in the coming weeks.&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/8232"&gt;@Royi_Priov&lt;/a&gt;&amp;nbsp;can you speak to the Identity Sharing implications here as the release notes for this mention a planning session with pre-sales?&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 19:59:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/127134#M8681</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-08-16T19:59:58Z</dc:date>
    </item>
    <item>
      <title>Re: SAML Support for Remote Access VPN</title>
      <link>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/127138#M8682</link>
      <description>&lt;P&gt;In regards to role-based access, if you have on-prem AD DCs then just continue using traditional IA for roles (ADQ / Identity Collector). We're matching UPN format SAML logins against ADQ for role-based access, so the same AD roles can be used on any gateway.&lt;/P&gt;</description>
      <pubDate>Mon, 16 Aug 2021 20:28:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/SASE-and-Remote-Access/SAML-Support-for-Remote-Access-VPN/m-p/127138#M8682</guid>
      <dc:creator>Paul_Hagyard</dc:creator>
      <dc:date>2021-08-16T20:28:22Z</dc:date>
    </item>
  </channel>
</rss>

