- Products
- Learn
- Local User Groups
- Partners
- More
Welcome to Maestro Masters!
Talk to Masters, Engage with Masters, Be a Maestro Master!
Join our TechTalk: Malware 2021 to Present Day
Building a Preventative Cyber Program
Be a CloudMate!
Check out our cloud security exclusive space!
Check Point's Cyber Park is Now Open
Let the Games Begin!
As YOU DESERVE THE BEST SECURITY
Upgrade to our latest GA Jumbo
CheckFlix!
All Videos In One Space
I have a query when RA VPN users log in to the system with AD credentials, they also should get connected to VPN automatically. The client should not ask them to put a username and password to connect to VPN same AD credentials should be used.
Is there a way to achieve this with AD username and passwords or is any other way which can work?
I tried enabling password caching and connect mode to always but that is also not working.
Secure Domain Login can bring up the VPN when the user logs in, but this requires credentials to be entered.
Certificates could be used for the VPN portion of the authentication in this case, particularly ones stored in the Windows Certificate Store (particularly one that cannot be exported).
@PhoneBoy could you please guide me on this?
Secure Domain Login can bring up the VPN when the user logs in, but this requires credentials to be entered.
Certificates could be used for the VPN portion of the authentication in this case, particularly ones stored in the Windows Certificate Store (particularly one that cannot be exported).
@PhoneBoy Thanks for the response, could you please clarify which certificate I can use, in order to achieve the requirement.
You can use any certs for this, including ones from the ICA.
@PhoneBoy Could you please confirm if we can go with CAPI certificate?
I don’t see why not.
I have client where this works perfectly fine. Just as a test, can you have them delete/re-create the site?
@the_rock I would like to know how it works perfectly fine. I tried to recreate the site but it's same.
I dont know what to tell you...we configured IA blade while ago, integrated with access roles and AD server and VPN works fine as auto connect/cashed creds.
is there a chance back in the day when you did it, you had to edit the trac to allow cached credentials in the VPN clients?
i even think it might be required to edit the trac file on the gateway to "allow it" and also edit it on the Endpoint client.
Yes, we did do that on both, correct.
@skandshus @the_rock What I have to edit? I don't see anything related to password caching trac.ttm file
If you send me the files, I can check, but its been some time, so cant remember now.
I think we may have changed default auth method to username-password.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY