Dear community,
I'm trying to get EntraID Group Authorization working for Check Point Remote Access VPN. I've been struggling for quite a while now, but still it doesn't work.
Did I do something wrong, did I forget some steps?
I used several sources (not all of them seem to be complete, do not explain when to apply them, and sometimes they provide conflicting information):
- Source: "R81.20 Identity Awareness Administration Guide": the 'Admin Guide'.
- Source: A video in the Admin Guide:
https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_IdentityAwareness_AdminGuide...
This video explains how to setup browser-based Identity Awareness. It does not explain how to configure for Remote Access VPN, unfortunately.
What I did (primarily following the Admin Guide - "SAML Support for Remote Access VPN"):
- Requirements are okay: gateway and SMS are running R81.20 JHF 89; latest (March 2025) Android Capsule VPN app.
- Configure Remote Access VPN: enable the 'IPSec VPN' blade.
- Configure Remote Access VPN: add the gateway to the RemoteAccess VPN Community.
- Configure Remote Access VPN: enable Office Mode.
- Configure Remote Access VPN: configure SAML Portal Settings ("https://myvpn.mydomain.nl/saml-vpn"); This FQDN resolves to my public gateway IP address.
- Configure Remote Access VPN: enabled some clients (to test, I enabled all VPN client types).
- Configure Remote Access VPN: enabled Visitor Mode (already enabled by default).
- Configure Remote Access VPN: created a 'Match all Users' External User Profile (generic*) in SmartDashboard.
- I also moved the Gaia portal out of the way (Platform Portal: https://192.168.100.240:1433/). Verified and tested.
- I enabled the 'Identity Awareness' blade, skipped the wizard, and enabled 'Remote Access' as an Identity Source
- SmartConsole: Create the Identity Provider object.
- EntraID: Create Enterprise App : "Check Point Remote Secure Access" from the gallery.
- EntraID "Check Point Remote Secure Access": Single sign-on. Copy/past the 'Identifier (Entity ID)', 'Reply URL' from the SmartConsole Identity Provider object into the SAML settings. Also entered the 'Sign on URL'.
- EntraID "Check Point Remote Secure Access": Modified the SAML claim 'Unique User Identifier (Name ID)' to 'user.localuserprincipalname' (as explained in sk183250).
- EntraID "Check Point Remote Secure Access": Add the SAML claim 'group_attr' to 'user.assignedroles' (as explained in sk183250). Note that the Admin Guides says: "configure the Identity Provider to send the group names as values of the attribute "group attr"". But all other sources specify 'user.assignedroles'…
- EntraID "Check Point Remote Secure Access": export the 'Federation Metadata XML' and import in the SmartConsole Identity Provider object .
- EntraID "Check Point Remote Secure Access": add a test group (without spaces) to the Enterprise Application: 'RemoteWorkers'. Add 'myuser@mydomain.nl' to this group as a member.
- SmartConsole: configure 'Client VPN authentication' on the gateway object according to the Admin Guide, using the Identity Provider object. Specifically configured 'User Directories' to "Manual configuration" and "External User profiles" (as we do not use an on-premise Active Directory (LDAP)). Note that sk179788 disagrees on this point…. (did not implement sk179778 at this point). I tried sk179778 at a later time, but that did not help either...
- SmartConsole/GuiDBEdit: as explained in the Admin Guide:

- SmartConsole: Create an Internal User Group, matching the name of the group in EntraID exactly (case sensitive): 'EXT_ID_RemoteWorkers'. Note that the Admin Guide tells me to prepend the group name with "EXT_ID_", but the video from Peter Elmer does not mention this… I followed the Admin Guide.
- SmartConsole: create an Access Role, adding the Internal User Group as 'Specific users/group' under 'Users'. Create an Access Rule using this Access Role object as source.
RESULTS:
- I can successfully setup a Remote Access (client) VPN using the Android Capsule app.
- I can successfully login, using my EntraID credentials (myuser@mydomain.nl). So, SAML authentication works!
- Matched or dropped traffic from my VPN is tagged with 'Source User Name = myuser@mydomain.nl' in the logs.
- The log viewer 'Log In' event (Mobile Access), says: User Groups: "This user doesn't belong to any group". Not sure if this is to be expected…
- On the gateway:
# pdp m a on
…
Users:
myuser@mydomain.nl {2d3c782f}
LogUsername: myuser@mydomain.nl
Groups: All Users
Roles: -
Client Type: Remote Access
…
It seems that my test group is not 'found', and I am assigned only to the 'All Users' group. My Access Role object doesn't match, and I cannot send traffic through my access rule. I would have expected: "Groups: All Users;RemoteWorkers" and "Roles: MyAccessRole".
- If I create an Access Role object with 'Users' set to 'Any users' (RemoteUsers_ALL), then I get this:
# pdp m a on
…
Users:
myuser@mydomain.nl {2d3c782f}
LogUsername: myuser@mydomain.nl
Groups: All Users
Roles: RemoteUsers_ALL
Client Type: Remote Access
…
And I can send VPN traffic, if I use this Access Role object as source in an Access Rule.
- If I add the Internal User Group to the RemoteAccess VPN Community, authentication fails as well (unable to login using Capsule).
Peter Elmer (video) also tells me to edit the Manifest (which seems to be identical to just add 'App Roles' to the EntraID application… So, I tried this as well. This didn't work either…
I'm at my wits end, thanks in advance for any suggestions,
-Frank