- CheckMates
- :
- Products
- :
- Quantum
- :
- Remote Access VPN
- :
- Re: SAML Azure AD - Remote access Access Role poli...
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
SAML Azure AD - Remote access Access Role policy
Hi,
We are having a problem now on implementation when using SAML Azure AD authentication. Everything is working - authentication etc. Users can login properly - connectivity is ok.
My problem is that when we use the access role and choose a specific user / group - the access role is not working and traffic goes thru Clean up rule. Access role works when it is set to "Any Authenticated" but this would not be helpful when there are multiple user with different access. Any help is appreciated - is there a special config or is this a limitation. We are running R81 + JHF 56 (latest)
Thanks
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Are you sure the application in Azure AD is set up per here?
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topic...
The groups needed for Azure AD are retrieved via the Graph API (supported in R81 and above).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Had the same issue on R81, login to Azure SAML worked fine but after that , cleanup rule was used instead of the specific access role policy rule. TAC provided a hotfix and this started working after we applied the hotfix to the gateway and installed the policy. Hotfix will be custom and dependent on your HFA level.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
i have the same issue on r81.10 take 45 , Is there a public SK on this?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
can you share the SR# number ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
We had same issue. After SAML authentication (Azure AD), Users were not able to access LAN networks. Access role was not matched. We followed below steps to resolve issue.
Now I have different problem. I cannot use mobile access application with Azure IDP access role as per sk171557. I am checking if I need to use simple "destination" field to restrict user for specific destination or not.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Check this : sk179788 Access Roles are not enforced when using SAML authentication
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Access role issue is already resolved but my concern is how I can use Access role Azure identity with mobile access application to restrict user for certain destination.
As per sk171557, we cannot do that
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Through this SK179788 it works, but we are finding an anomaly:
- We are using Azure AD groups directly, and it seems to work correctly.
step -> Using Azure AD for Authorization https://sc1.checkpoint.com/documents/r81/webadminguides/en/cp_r81_centityAWareness_adminguide/topics...
- But in a random way sometimes the firewall "not retrieve the correct group from AD Azure" and makes the retrieval from the LOCAL LDAP groups (from local Active Directory), and in this case VPN connections doesn't work because non match the correct AR Azure.
Then just after an install policy everything recovers and the firewall retrieve the correct information from azure
Has anyone made this integration, without setting manual groups and works without anomalies?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Sounds like a bug and I recommend opening a TAC case.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
-
Step 1 - d
-
Click New Application > Non-gallery application.
Can we use the pre populated Checkpoint Secure VPN access application or is the specific requirement to create a new non-gallery application? what is the reason.
