- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hello everyone,
we are using AD users for remote access VPN. We have defined some Access Roles for serveral AD Groups, but, we have observed every AD user can log in via VPN client (end point sercurity), regardless the user has a security policy associated or not. If the user is not included in a security policy, of course, they are not able to access to some where, but, they still can do the log in successfully on the VPN client.
So, somehow, we would like to allow the AD authentication for remote access VPN just for those users belonging to the Access Roles or for some specific AD Groups.
How could we do this configuration?
Thanks for your help.
you're right, thanks for clarification 😀
With this configuration anyone can login via VPN client, regardless the configured access rules.
With this configuration the login via vpn client is failing if the user is not member of the shown group. This is to restrict the generally access to the remote access vpn.
Thanks Wolfgang.
I have a doubt about this solution. In case an user is included in two LDAP or Users Local Groups, shoud I define the two LDAP Groups as Participant User Groups?
BR,
Fzahinos.
Hello
but in case you use access role on rules than you need to create ldap group to filter on the remote access community, bit annoying
Fabio
yes you are right, it's little bit confusing.
But you can add only local or ldap groups to the remote access community, it would be better with a normal access role but that's how it works. Maybe one day Check Point will allow access roles with all configurations, but at the moment some things can be done only with ldap-groups
We added there only one ldap-group named "remote_access_allow_general". This is configured in two minutes and then you can forget about ldap-groups 😉
Wolfgang
what do you mean exaclty with "remote_access_allow_general"? anyway if you have different access role group you will need the matching one the remote access community, if not any user anyway will log in (even after without have access to resources)
you're right, thanks for clarification 😀
With this configuration anyone can login via VPN client, regardless the configured access rules.
With this configuration the login via vpn client is failing if the user is not member of the shown group. This is to restrict the generally access to the remote access vpn.
Ok got it what you mean!
Thank you
Fabio
Not sure, you have to try.
Following Mobile Access and Endpoint clients LDAP nested groups are not enforced correctly
it's not supported. But I think this article is meaning the access rules itself and not the group for the remote access community.
Wolfgang
Hi,
I'm unable to either add custom ldap group or delete the default All Users group user Participant Users Group. Am i missing something?
Thanks
Raj
me too
You also need to create a new LDAP Group in the objects. Not a User Access Group.
Hi,
just updating the thread that the issue raised by @PointOfChecking , solved.
In order for VPN to work as an identity source you must enable "Remote Access" checkbox under Identity Awareness properties.
it is also documented in Identity Awareness Admin Guide.
Thanks,
Ilya
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 4 | |
| 4 | |
| 3 | |
| 3 | |
| 3 | |
| 2 | |
| 2 | |
| 1 | |
| 1 | |
| 1 |
Tue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 21 Apr 2026 @ 05:00 PM (IDT)
AI Security Masters E7: How CPR Broke ChatGPT's Isolation and What It Means for YouTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY