- Products
- Learn
- Local User Groups
- Partners
- More
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
10 December @ 5pm CET / 11am ET
Announcing Quantum R82.10!
Learn MoreOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
The Remote Access VPN community consists of 12 gateways.
Users typically connect to the primary gateway in the U.S. data center, which issues Office Mode IP addresses.
The VPN client utilizes Secondary Connect to reach resources behind other gateways in the community.
All gateways are configured for SAML-based Single Sign-On (SSO) using Microsoft Entra ID.
When a user accesses a resource behind a Secondary Connect gateway, the VPN client triggers a new SAML authentication flow. This opens the user's default browser and starts the SSO process again.
The repeated SAML prompt confuses users and interrupts their tasks, leading to a frustrating VPN experience and reduced productivity.
Is there a configuration that would allow the VPN client to reuse the initial SAML authentication and avoid triggering a new browser-based authentication prompt when accessing resources behind a Secondary Connect gateway?
Could a single Remote Access identity provider configuration be applied across all 12 participating gateways to streamline the authentication process and eliminate redundant prompts?
If you've configured things per either sk180948 or sk182042, you'll need to undo this configuration since the gateway sends an attribute to force reauthentication, which will also apply to Secondary Connect.
However, this creates a situation where if the user is authorized on the machine (i.e. with Entra ID) and the timeout hasn't expired, they will be able to connect to the VPN without authentication.
Whether this works the same way with Secondary Connect is a separate question.
If your environment is complex enough that Secondary Connect is needed, Harmony SASE might be worth exploring.
Not sure if Infinity Identity will help with this use case, but it will definitely centralize the configuration.
Until we can support this use case with Secondary Connect, it might provide a better user experience to disable Secondary Connect.
Traffic will be tunneled from whatever gateway the user connects to when Secondary Connect is disabled.
Hi @Ave_Joe ,
I will start with a disclaimer that I'm not well familiar with VPN internal flows.
However, my assumption is that the issue you are facing is caused due to the fact the SAML configuration in Quantum requires different application on Entra side, and considered as separate "service". It means, each gateway acts as a different service, therefore there is no reuse of the SAML authentication.
In R82, we have introduced a new SAML I/S powered by Infinity Identity. Once you configure the Entra ID integration in Infinity Portal, it is automatically replicated to your Quantum management (prerequisite to this is a trust between the Quantum management and Infinity Portal, under "Infinity Services"). In this scenario, Infinity services are the "service provider" and the gateway consume the SAML authentication result from Infinity.
After explaining this, few notes:
I hope it helps.
I wasn't sure if the different "Service Providers" (in SAML terms) would allow credential reuse; thanks for confirming it doesn't.
That suggests @Ave_Joe that your requirement can't be met today with Quantum Security Gateways today.
However it does sound like it will be possible in the future.
Harmony SASE can support this use case today.
Oh bother!
I kind of figured that would be the case.
Moving this service to Harmony SASE is not an option as that would require additional licensing which is outside the scope of what is trying to be done at this time.
Cheers!
Thank you for the response.
I was hoping there might be a viable solution, but we’ll continue to monitor for new features or updates that could help improve the user experience moving forward.
hey,
any news on this?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 3 | |
| 2 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 | |
| 1 |
Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Fri 12 Dec 2025 @ 10:00 AM (CET)
Check Mates Live Netherlands: #41 AI & Multi Context ProtocolTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY