Method: Configure UPN Mapping in the Certificate
1. Ensure the certificate contains the UPN
The user certificate must include the UPN in the Subject Alternative Name (SAN) field.
Typical format:
Other Name: UPN=user@domain.com
If the certificate does not contain this, the gateway cannot map it.
2. Configure the Identity Source to Use UPN
In SmartConsole:
-
Go to
Gateway → Identity Awareness -
Under Authentication Methods, open the settings for Certificate (CAPI).
-
Configure User Name Extraction to use:
instead of:
3. Ensure AD Identity Source Supports UPN Lookup
Your Active Directory identity source must allow lookup by userPrincipalName.
This normally works automatically if the AD query account is configured.
4. Optional: Configure LDAP Mapping
If the gateway still attempts DN matching, verify the LDAP attribute mapping:
instead of:
How the Flow Works After the Change
-
User connects to the gateway.
-
Client presents certificate.
-
Gateway extracts:
-
Gateway queries AD:
-
Identity Awareness maps the user successfully.
Quick Verification
On the gateway CLI you can check identities with:
or
This will show whether the username is being mapped as UPN or DN.
💡 Important:
Many issues occur because the certificate contains the UPN in SAN but the gateway still reads the Subject DN, so confirming the SAN extraction setting is key.
✅ If you'd like, I can also show you:
-
the exact SmartConsole menu path and screenshots for this setting
-
the Check Point sk article references that explain the UPN certificate mapping (these are not very obvious in the documentation).


