- Products
- Learn
- Local User Groups
- Partners
- More
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Improve Your Security Posture with
Threat Prevention and Policy Insights
Overlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Dear community,
I'm trying to get EntraID Group Authorization working for Check Point Remote Access VPN. I've been struggling for quite a while now, but still it doesn't work.
Did I do something wrong, did I forget some steps?
I used several sources (not all of them seem to be complete, do not explain when to apply them, and sometimes they provide conflicting information):
This video explains how to setup browser-based Identity Awareness. It does not explain how to configure for Remote Access VPN, unfortunately.
What I did (primarily following the Admin Guide - "SAML Support for Remote Access VPN"):
RESULTS:
# pdp m a on
…
Users:
myuser@mydomain.nl {2d3c782f}
LogUsername: myuser@mydomain.nl
Groups: All Users
Roles: -
Client Type: Remote Access
…
It seems that my test group is not 'found', and I am assigned only to the 'All Users' group. My Access Role object doesn't match, and I cannot send traffic through my access rule. I would have expected: "Groups: All Users;RemoteWorkers" and "Roles: MyAccessRole".
# pdp m a on
…
Users:
myuser@mydomain.nl {2d3c782f}
LogUsername: myuser@mydomain.nl
Groups: All Users
Roles: RemoteUsers_ALL
Client Type: Remote Access
…
And I can send VPN traffic, if I use this Access Role object as source in an Access Rule.
Peter Elmer (video) also tells me to edit the Manifest (which seems to be identical to just add 'App Roles' to the EntraID application… So, I tried this as well. This didn't work either…
I'm at my wits end, thanks in advance for any suggestions,
-Frank
Would remove the filtering (Filter Group) for the first step.
Is the application mapped to your user group aa_cp..? As there is enabled "Groups assigned to application"
Also - nested groups are not supported, so your group would have to be mapped to the application and your user must be a direct member of the group.
we can have a short session tomorrow afternoon and have a look together, if you want to - just send me a private message
check the SAML attributes transferred.
can be done with browser plugins like saml-tracer / saml-tracker
i.e. https://addons.mozilla.org/de/firefox/addon/saml-tracer/
Start the extension, then logon to vpn again.
Then there should come up something like the first attached picture. click on the first line stating "SAML" and see on the other tab the SAML parameters.
I´d guess, there is something wrong with the attributes transfered.
Hi Nüüül,
Thanks for your suggestion. I switched from Android to Windows and used the SAML tracer. It seems indeed that the 'group_attr' attribute is missing in the last SAML conversations. At least, I'm assuming here that this attribute is used by the VPN gateway?
Yes, this will be used by the gateway.
EntraID "Check Point Remote Secure Access": Add the SAML claim 'group_attr' to 'user.assignedroles' (as explained in sk183250). Note that the Admin Guides says: "configure the Identity Provider to send the group names as values of the attribute "group attr"". But all other sources specify 'user.assignedroles'…
in Entra you can configure, what to send with the group attribute "group_attr". Especially when not using local ldap sources.
For an example see attachement
The group will have to be matched on Check Point side (group named EXT_ID_<groupname>, which then is member of an access role)
I configured the group_attr claim/attribute as described in your screen shot.
But in the SAML attributes we still do not see 'group_attr'. We also tried refreshing the XML meta data to the Identity Provider object, but this didn't help either. For some reason EntraID refuses to send the group_attr attribute...
This is what we configured on EntraID in the Enterprise App (see image).
Also note that we configured the Unique User Identifier (Name ID) as user.localuserprincipalname (as per the documentation).
Would remove the filtering (Filter Group) for the first step.
Is the application mapped to your user group aa_cp..? As there is enabled "Groups assigned to application"
Also - nested groups are not supported, so your group would have to be mapped to the application and your user must be a direct member of the group.
we can have a short session tomorrow afternoon and have a look together, if you want to - just send me a private message
YES!!! I've got it working. I disabled the filter and now we get a group_attr with the value:
<Attribute Name="group_attr">
<AttributeValue>aa_cp_vpn_test_frank</AttributeValue>
</Attribute>
Not sure why the filter blocked the group. Also: if there are no matching groups, the attribute is not sent from the IdP (I kind of expected an empty attribute...).
I'd like to thank you VERY MUCH for your help.
I would like to urge Check Point to update their documentation and give some more explanation to just: 'add the group_attr claim/attribute' :-).
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 39 | |
| 21 | |
| 9 | |
| 7 | |
| 7 | |
| 5 | |
| 5 | |
| 4 | |
| 4 | |
| 4 |
Wed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 03 Dec 2025 @ 10:00 AM (COT)
Última Sesión del Año – CheckMates LATAM: ERM & TEM con ExpertosThu 04 Dec 2025 @ 12:30 PM (SGT)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - APACThu 04 Dec 2025 @ 03:00 PM (CET)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - EMEAThu 04 Dec 2025 @ 02:00 PM (EST)
End-of-Year Event: Securing AI Transformation in a Hyperconnected World - AmericasWed 26 Nov 2025 @ 12:00 PM (COT)
Panama City: Risk Management a la Parrilla: ERM, TEM & Meat LunchAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY