Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Jakub132620
Explorer
Jump to solution

Remote Access VPN and SAML with Entra ID

Dear Community,

 

I have security gateway 9000 series with 81.20 version. Our users authenticating to remote access VPN via SAML (Entra ID).

Auth works fine, but we facing problem with Access Roles and policies. I can see source user in logs but traffic didin't match to rule with access role where user account is present.

We have policies with Access Role and in this object are user form Entra ID.

In Entra we have two applications, first from gallery "Checkpoint Remote Secure Access VPN" for SAML auth, second custom APP used as Azure AD object in SMS.

Main problem is situation where we have rule with access role and this access role have user account form Azure AD, but traffic from user didin't hit expected rule and goes to clean up rule.

To integrate Remote Access VPN and Entra ID throught SAML we followed this video https://www.youtube.com/watch?v=yZVB3sJ3fZ8

We done almost everything form this post https://community.checkpoint.com/t5/General-Topics/Remote-Access-VPN-and-EntraID-Group-Authorization...

In one access role we have one user, but in feature we will be adding groups. In logs i can see source user in format name@domain

 

Does anyone know what the potential problem could be ?

 

0 Kudos
1 Solution

Accepted Solutions
PhoneBoy
Admin
Admin

Access Roles are calculated based on groups the user is a part of.
For on-premise AD, they are fetched via LDAP.
For EntraID, they are passed as part of the SAML assertion and the gateway must be configured to recognize them.
If there are no groups, then the role is calculated as "All Users."

Which means you cannot allow access to only a single user UNLESS they are a member of a group that only contains them as a member.

View solution in original post

27 Replies
the_rock
MVP Platinum
MVP Platinum

Are you able to attach a screenshot of the rule? Please blur out any sensitive data.

Best,
Andy
0 Kudos
Jakub132620
Explorer

Hi,

screenshots od rule and acces role is below

Rule.png

Access_Role.png

0 Kudos
the_rock
MVP Platinum
MVP Platinum

Are there any hits on that rule at all?

Best,
Andy
0 Kudos
Jakub132620
Explorer

Not now, hits was when i don't have access role with user form AD in source. This is main problem. I successfuly auth to VPN via SAML, but traffic don't hit my rule.

0 Kudos
the_rock
MVP Platinum
MVP Platinum

Do you see anything when you run pdp monitor user and then that username? If not, then thats your issue. However, if you do see results, maybe try disable rule, install policy-re-enable, install again, test.

Best,
Andy
0 Kudos
Jakub132620
Explorer

Below output drom pdp command executed on firewall

pdp.png

I tried your suggestion but without effect. In my opinion user in access role is not mapping to user from VPN authentication. But i don't know why.

0 Kudos
the_rock
MVP Platinum
MVP Platinum

I think I know why. I saw somewhere name has to start with ext and that is a requirement. let me see if I can find it.

Best,
Andy
0 Kudos
the_rock
MVP Platinum
MVP Platinum

@Jakub132620 Sorry my bad, name does not have to start with that, but it seems it should match with what you have on Azure side, so can you give it same name that starts with aad?

Best,
Andy
0 Kudos
Jakub132620
Explorer

How can i check this ?

In Entra i can see the same user.principalname as in on-prem AD

0 Kudos
ishuyell
Participant
Participant

In SmartConsole, create an internal User Group object with this name (case-sensitive, spaces not supported):

EXT_ID_<Name_of_Role>

For example, for a role in the Identity Provider's interface with the name my_group, create an internal User Group object in SmartConsole with the name EXT_ID_my_group.

0 Kudos
the_rock
MVP Platinum
MVP Platinum

Right, I recall seeing that, but cant find official documentation where it states to do so...

Best,
Andy
0 Kudos
the_rock
MVP Platinum
MVP Platinum

Just spoke with a colleague and he said thats how he did it for a customer and it did work, was not in any doc nesessarily.

Best,
Andy
0 Kudos
PhoneBoy
Admin
Admin

What is the Access Role referring to here, a specific user?

0 Kudos
Jakub132620
Explorer

Yes, currently in Access Role i want add signle user form Entra. Is it possible ?

0 Kudos
PhoneBoy
Admin
Admin

Access Roles are calculated based on groups the user is a part of.
For on-premise AD, they are fetched via LDAP.
For EntraID, they are passed as part of the SAML assertion and the gateway must be configured to recognize them.
If there are no groups, then the role is calculated as "All Users."

Which means you cannot allow access to only a single user UNLESS they are a member of a group that only contains them as a member.

the_rock
MVP Platinum
MVP Platinum

Thats it, you got it! I actually went through my notes I had about it and saw my colleague wrote a doc indicating the same, even if its single user.

Best,
Andy
0 Kudos
Ruan_Kotze
MVP Gold
MVP Gold

Are you utilising on-prem AD as well or pure Entra?

0 Kudos
Jakub132620
Explorer

Hi we using on-perm AD and Entra ID

0 Kudos
the_rock
MVP Platinum
MVP Platinum
0 Kudos
Jakub132620
Explorer

I read the article you linked to. However, there's one point I don't understand. In the "Configuration in Microsoft Azure Portal" section, we create a custom application for downloading users.

My application was created according to point 1. However, I'm having trouble with point 2.

When I go to the Single Sign-ON tab in my application and select SAML, I can't select specific claims because the first step in the application requires configuring the Basic SAML configuration section. I configured the Basic SAML configuration section in the Checkpoint Remote Secure Access VPN application from the gallery, which is used for VPN authentication via SAML.

0 Kudos
the_rock
MVP Platinum
MVP Platinum

Mind pasting part you are referring to?

Best,
Andy
0 Kudos
Jakub132620
Explorer

Jakub132620_0-1765286598817.gif

 

Configuring SAML as a Single Sign-On for your Azure application

  1. Click on Home and select Azure Active Directory from the menu.

  2. Click on Enterprise applications and go to All applications.

  3. Select your application.

    The application Overview window opens.

  4. Click Single Sign-On.

  5. Select SAML as the Single Sign-On method.

  6. In the Set up Sign-On with SAML window, go to the User Attributes & Claims section and click the pencil icon to edit the claims.

    The User Attributes & Claims window opens.

  7. In the Required claim section, click Unique User Identifier (Name ID).

  8. In the Manage claim window:

    • Attribute option - Select.

    • Source Attribute drop-down menu - Select user.localuserprincipalname.

  9. Click Save to save the user claims, then close the window.

  10. Back on the SAML Signing Certificate page, go to the Federation Metadata XML file and click Download.

    The Federation Metadata XML is downloaded.

I can't set the appropriate claim because, as I wrote above, the first step in the application requires configuring the Basic SAML configuration section. I configured the Basic SAML configuration section in the Checkpoint Remote Secure Access VPN application from the gallery, which is used for VPN authentication via SAML.

0 Kudos
the_rock
MVP Platinum
MVP Platinum

I see. That link is what we always give to customers if there is an issue, though we help them with the setup. Might be worth opening TAC case then.

Best,
Andy
0 Kudos
NiladriSarkar
Contributor

cluster object > vpn client > authentication > Multiple Auth client settings > Edit the IDP object > User Directories > can you confirm the settings there ?

is External user profiles enabled ? 

Also, under Identity awareness is Remote Access checked in ?

0 Kudos
Jakub132620
Explorer

1 ) Claim config in Checkpoint VPN application

claim.png

2) Options in authentication

Zrzut ekranu 2025-12-10 104459.png

3) Identity Options

Zrzut ekranu 2025-12-10 104727.png

0 Kudos
NiladriSarkar
Contributor

are you able to enable LDAP users, all gateway or specific and Ldap lookup type to User-principal-Name/UPN (UserPrincipalName)

0 Kudos
Jakub132620
Explorer
 

obraz (1).png

 We changed our settings. But it didn't help

0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events