- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Hello,
I am facing an issue after implementing 2MFA with IDP in RA VPN on Windows with SDL enabled.
Before implementing the second authentication factor, login with SDL worked perfectly, however after implementing 2MFA it is not possible to connect to the VPN because the client makes a redirect to open a kind of plugin and start the IDP screen, that's where it happens the error, for some reason it does not open 2mfa directly on the client screen, it has to consult this plugin first and in my opinion the error occurs because it is not possible to consult the plugin because it is not yet logged into Windows.
If I log on to the machine and try to connect to the VPN, the operation occurs successfully and the 2nd factor opens the screen in the client itself without any problem, however this is the perception that I would like to have in SDL before logging into Windows and I am not having it .
I tried to use the SK https://support.checkpoint.com/results/sk/sk180395 to make some adjustments to the client, but without success, IDP_BROWSER was already enabled as embedded in the client itself, but I think there is some validation operation that it confirms with a third party for it to work, outside the client.
Is it possible for SDL to work with 2MFA with IDPs like Azure, Cisco DUO and others?
Hello,
I am facing an issue after implementing 2MFA with IDP in RA VPN on Windows with SDL enabled.
Before implementing the second authentication factor, login with SDL worked perfectly, however after implementing 2MFA it is not possible to connect to the VPN because the client makes a redirect to open a kind of plugin and start the IDP screen, that's where it happens the error, for some reason it does not open 2mfa directly on the client screen, it has to consult this plugin first and in my opinion the error occurs because it is not possible to consult the plugin because it is not yet logged into Windows.
If I log on to the machine and try to connect to the VPN, the operation occurs successfully and the 2nd factor opens the screen in the client itself without any problem, however this is the perception that I would like to have in SDL before logging into Windows and I am not having it .
I tried to use the SK https://support.checkpoint.com/results/sk/sk180395 to make some adjustments to the client, but without success, IDP_BROWSER was already enabled as embedded in the client itself, but I think there is some validation operation that it confirms with a third party for it to work, outside the client.
Is it possible for SDL to work with 2MFA with IDPs like Azure, Cisco DUO and others?
Hello,
I am facing an issue after implementing 2MFA with IDP in RA VPN on Windows with SDL enabled.
Before implementing the second authentication factor, login with SDL worked perfectly, however after implementing 2MFA it is not possible to connect to the VPN because the client makes a redirect to open a kind of plugin and start the IDP screen, that's where it happens the error, for some reason it does not open 2mfa directly on the client screen, it has to consult this plugin first and in my opinion the error occurs because it is not possible to consult the plugin because it is not yet logged into Windows.
If I log on to the machine and try to connect to the VPN, the operation occurs successfully and the 2nd factor opens the screen in the client itself without any problem, however this is the perception that I would like to have in SDL before logging into Windows and I am not having it .
I tried to use the SK https://support.checkpoint.com/results/sk/sk180395 to make some adjustments to the client, but without success, IDP_BROWSER was already enabled as embedded in the client itself, but I think there is some validation operation that it confirms with a third party for it to work, outside the client.
Is it possible for SDL to work with 2MFA with IDPs like Azure, Cisco DUO and others?
I cant open all the attachments, just the 1st one...is the only error negotiation with site failed? Did you try do zdebug on the firewall to see if anything is dropped when this happens?
Andy
I cant open all the attachments, just the 1st one...is the only error negotiation with site failed? Did you try do zdebug on the firewall to see if anything is dropped when this happens?
Andy
Hello the_rock,
These are the images I imported.
I ran zdebug but didn't see any traffic blocks.
Hello the_rock,
These are the images I imported.
I ran zdebug but didn't see any traffic blocks.
If its urgent, I would contact TAC. Otherwise, would run basic vpn debugs.
Andy
If its urgent, I would contact TAC. Otherwise, would run basic vpn debugs.
Andy
Forgot to mention vpn debug steps.
Andy
*****************
vpn debug trunc
vpn debug ikeon
-do the test
vpn debug ikeoff
Look for iked and vpnd files in $FWDIR/log directory
Forgot to mention vpn debug steps.
Andy
*****************
vpn debug trunc
vpn debug ikeon
-do the test
vpn debug ikeoff
Look for iked and vpnd files in $FWDIR/log directory
Secure Domain Logon (SDL) with Identity Provider is not supported.
Secure Domain Logon (SDL) with Identity Provider is not supported.