Hello @fjulianom , @PhoneBoy ,
It's hard making recommendations without seeing all the configuration of remote access SNX. There are options using 'legacy' objects in the Access Control Policy instead of the recommended Access Role Objects. It is my current recall, that for SNX remote access, no ID Awareness sessions are getting created. Authentication is performed based on the legacy settings, referencing the LDAP Account Unit object. Note, there is a Client Template setting in the 4th tab of the object. It's kind of impossible to say more by writing, as the complexity requires a remote session review.
When you are using Access Role Objects to represent users, the setting in Gateway > ID Awareness is taken into account. It's been years I haven't configured SNX and don't have a lab running now to check quickly. My lab is using Harmony SASE for Remote Access and have Quantum Gateways configured using dynamic route-based VPNs with Harmony SASE. In this way all Harmony SASE supported clients can connect via the SASE backbone to my 'data center' resources. On Harmony SASE and on Quantum I configured Microsoft Entra ID as authentication instance. In this video, you can see the user experience documented. You may want to explore such options with your local Check Point Sales Engineering contacts.
I documented how ID Collector and AD Query impact the creation of Identity Sessions in sk179544. Here you can find as well information about the UserID (a regular domain user - not an administrative account) that you configure in the LDAP Account Unit Object.
I am sorry, that I can't provide a 100% proven answer here, but in respect of the complexity and your production environment, I recommend either a lab exercise matching your production environment, or to engage Professional Services.
Best regards
Pelmer