Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
ShadowNif
Collaborator

Identity Agent vs Identitiy Collector -- AD Query

Hello, 

I was trying to find out what is exactly how does the Identity agent send the info to the ID Awareness Server. 
Could not find exactly an SK that tell me directly what happened on the Agent side. 

I already installed and configured the ID Agent on the Gateway (Identity source). I see that the Identity source when users connect with the identity Agent .. Although, in how does the Gateway learn the AD Groups that user in? 
Does the Agent collect this information from the user and send it to the PDP ? In this case, any changes in the AD should be followed with gpupdate on the client side, so the agent learns those changes ? 

And in this scale of 3000 users, is it ok to keep the Agent or recommended moving to Collector? 
Which one is better for AD traffic ? I don't want to send many request to AD. Although the Agent gets them from user PC which already make the connection to the AD. But the collector is up-to-date. 

I could not find much info regarding this subject on the Checkpoint site... 

 

 

 
 

 

0 Kudos
15 Replies
AkosBakos
MVP Silver
MVP Silver

Hi @ShadowNif 

Frist have a look at on the best practices: https://support.checkpoint.com/results/sk/sk88520

I have exprience with  2000 user and they use Identity Agent. No problem, works fine.

I would push you to the IA Collector way in a large environment. Easier to keep up to date the version, no need to change/update agents  on the endpoints (where a lot of agent have already installed on the machines).

It would be enough to handle the Terminal server agent on the jumphosts etc.

What is under the hood in IA? The answer:  ATRG: Identity Awareness

Akos

ps.: i will search for detailed explanation of the IA agent.

update i: https://sc1.checkpoint.com/documents/Identity_Awareness_Clients_Admin_Guide/Content/Topics/Identity-...

 

----------------
\m/_(>_<)_\m/
ShadowNif
Collaborator

Ya ive gone through those article before i posted my question. but non of them says exactly what or how does the agent works. 
If i updated something in AD, should i do gpupdate on the client side so that the Agent knows the new changes, Or it connects to the AD and take the info and give it to the PDP. Although the agent System does not even know that there changes ... how does it exactly work!!? 

0 Kudos
the_rock
MVP Platinum
MVP Platinum

Have a look at this discussion, I believe it will help you lots.

Andy

https://community.checkpoint.com/t5/Security-Gateways/New-IA-Implementation/m-p/185851#M34184

Best,
Andy
0 Kudos
ShadowNif
Collaborator

Still does not explain how does the Agent optain the infos about user groups !

0 Kudos
AkosBakos
MVP Silver
MVP Silver

Hi @ShadowNif 

Just open a TAC case, and ask them to give a resolution of IA working.

They 100% have a detailed description of IA flow.

Akos

----------------
\m/_(>_<)_\m/
0 Kudos
the_rock
MVP Platinum
MVP Platinum

0 Kudos
the_rock
MVP Platinum
MVP Platinum

Also, see below what TAC sent me while back when I worked with client that mostly had MAC os in their company.

Andy

*********************

The MacOS identity agent would offer an alternative to AD Query, since the domain controller is not providing the proper events we need to do AD Query for the MacOS hosts. The agent would authenticate with the gateway, which would in turn authenticate against the AD. This should allow the gateway to enforce user-based identities for MacOS clients.

The captive portal may also be another option should they not wish to install the Identity Agent on the MacOS hosts but, unlike the Agent, has difficulty distinguishing between multiple users behind the same IP address.

******************************

Best,
Andy
0 Kudos
Lesley
MVP Gold
MVP Gold

On the gateway object i would recommend idc. 2 servers would be the best. It is not a ‘cluster’ then but it helps if something happens on one server. You don’t need to run a separate server special for idc it can share the server with other stuff 😃

Most customers do not want idc on their dc tho. Also do not enable adquery on gateway object only idc. Just make a ldap account unit in SmartConsole 

-------
Please press "Accept as Solution" if my post solved it 🙂
0 Kudos
Vanness_Chen
Explorer

Hi experts,

Sorry for replying to this older thread, but I’m really in need of some ideas to help resolve an ongoing issue.

The customer is running an R81.20 VSX environment. There are 5 VS instances with Identity Awareness (IC) enabled, and each VS is associated with two IDC Servers for redundancy. Each IDC Server, in turn, is connected to more than 40 Domain Controllers.

On the Security Gateway, running pep show pdp all shows that the number of users exceeds 40,000.

Image_2026-01-22_16-51-07.png

 

The customer relies heavily on Access Roles to control Internet access, so the stability of Identity Awareness is critical. However, they frequently report that during morning peak hours, a small number of users—who should already be authorized by Access Roles—are unable to access the Internet.

When checking the logs, we found that for the affected users, there is often a delay of more than 30 minutes between the time their PCs connect to the network after booting and the time their Identity login is successfully completed.

Over the past two years, we have opened countless support cases, but we still cannot guarantee stable behavior.
Are there any other approaches or best practices that could help improve this situation?

0 Kudos
Vincent_Bacher

We worked with same amount of IA sessions as well, up to 50k simultaneous sessions. Reading your post there are several points coming into my mind. For exampe if ALL collected sessions are relevant for your use case internet access or do you see any options to filter out sessions. Reduced amount of sessions will reduce amount of load on the PEP. I speak from painful experience.

In addition it would be helpful if you could share details of your IA configuration to better understand what is going on. 

First idea:

We only do IDC with an ISE and not with AD controllers, but we have experience with many sessions.
I would therefore recommend reducing the load on the PEPS, i.e. the VSX firewalls, when there are so many sessions.
I would therefore not connect the IDC directly to the PEP, but would set up an upstream PDP instance. The IDCs are then connected to these PDP devices. The sessions are then passed on to the VS via identity sharing. This should take a lot of load off the VS.

and now to something completely different - CCVS, CCAS, CCTE, CCCS, CCSM elite
0 Kudos
PhoneBoy
Admin
Admin

Worth noting that in the R82.10 release, we've made several improvements to resilience and scalability in Identity Awareness.

0 Kudos
PhoneBoy
Admin
Admin

The most accurate way to obtain identity is via the agent as it is closest to the user.
All identity methods (except SAML ones) get groups via an LDAP Query via the relevant Active Directory server.

ShadowNif
Collaborator

who makes the Query in case of the Identity Agent setup ? The ID agent ? Does the gateway need to connect the AD after that ?  

0 Kudos
ShadowNif
Collaborator

Thnx for the answers, 
Although this still does not answer my question, how does the Gateway learn the AD Groups that the user has in the Identity Agent setup? 
Does the ID agent connect to AD, take the info and forward it to the Gateway/PDP ?

 

 

  

0 Kudos
PhoneBoy
Admin
Admin

The gateway (the PDP specifically) makes the LDAP query based on the configured LDAP Account Unit(s). 

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events