- Products
- Learn
- Local User Groups
- Partners
- More
Firewall Uptime, Reimagined
How AIOps Simplifies Operations and Prevents Outages
Introduction to Lakera:
Securing the AI Frontier!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi all,
Has anyone figured out how to enable this function: Identity Awareness(SAML): Forced Re-authentication, which requires mandatory login for each session?
Previously, I followed the instructions described in sk180948.
Best regards,
Alex
Im fairly positive there is a feature on Azure portal you need to enable to make this work. Let me talk to one of my coleagues, Im sure he will know what it is.
Andy
I believe this is what you need to follow, but will verify.
Andy
https://learn.microsoft.com/en-us/entra/identity/saas-apps/check-point-remote-access-vpn-tutorial
Hi @the_rock ,
thank you for your message. I set up the Azure authorization according to that guide, and everything is working perfectly. However, I can’t find a function in Azure that would enforce authentication each time a client connects.
I used sk180948 to implement persistent authentication. I was hoping there might now be an option in Check Point to handle this without manually editing the config file.
Alex
This option likely pertains to Conditional Access Policies in Office365. See more here: https://learn.microsoft.com/en-us/entra/identity/conditional-access/concept-session-lifetime#require...
Yep, thats it!
Andy
Hi @the_rock ,
Simply activating this function in the Conditional Policy didn’t change anything. The MS documentation includes the following: 'Sign-in frequency set to every time works best when the resource has the logic of when a client should get a new token.'
It seems to me that some configuration change might also be needed on the Check Point side. Is there anyone we could ask about this?
Alex
Thats the same link my collegue sent me as well, sorry. Im not aware of anything else. Maybe you can double check with TAC or lets see if someone else may know.
Andy
After a few hours, it started working better. Authentication is requested if the last session was more than 5 minutes ago.
Maybe just took some time...
Agreed, Microsoft always requires some time.
I wish that were only true for Microsoft lol
Anyway, is it working for all users now?
Andy
Yes, this works for everyone who falls under this Conditional Policy.
Alex
I diffed the relevant file in R81.20 JHF 89 versus a fresh install of R81.20.
There is one line added to the file that didn't exist before:
'ForceAuthn' => ( ( IsForceAuthnOverride((string)$realm_name) || (property_exists($realm, "ForceAuthn") && ($realm->ForceAuthn === true))) ? true : false ),
Not exactly sure where it is reading this property from, though.
I'll see if I can get more information.
It would be nice if there was at least an sk for those new SAML features (Request Signing, Assertion Decryption and Forced Re-authentication).
SAML for remote access vpn broke for us on upgrade to take89, and we ended up reverting and installing take84 instead.
We were assuming it was related to those new features, but struggled to find any information about them.
I actually gave feedback for the sk, lets hope they made a modification.
Andy
sk180948 is where the existing "ForceAuthn = true" modification is documented.
I left feedback on this SK and it appears R&D plans to update this with the relevant information.
I got an email today about the sk being modified and when I checked it, it indeed was.
Andy
It looks like an additional modification to the file needs to be made for R82 and R81.20 JHF 89 (If I'm understanding the SK correctly).
Thats my understanding as well, but let me see if I can reply to email they sent, cause Im not sure that mailbox might be monitored.
Andy
I responded to an email and they answered advising to do modifications as per sk.
Andy
Looks like the SK has been removed - https://support.checkpoint.com/results/sk/sk180948 can no longer be found. I had made the additional changes when I installed R81.20 take 89, but after installing take 99 this morning the extra configuration has been lost and I don't have the documentation of what I changed. Does anyone have this to hand? Many thanks.
I think that may have just been unfortunate timing - the sk is accessible now, but does show a modification date of today (20/05/2025), so I suspect you may have hit the sk mid-edit or something.
Also, it now directs to sk182042 for jumbo 89 and higher, which covers all three of the new SAML features.
Yup, I see same thing on jumbo 90 as well, that exact line.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
23 | |
12 | |
9 | |
8 | |
8 | |
6 | |
5 | |
5 | |
4 | |
4 |
Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesTue 28 Oct 2025 @ 11:00 AM (EDT)
Under the Hood: CloudGuard Network Security for Google Cloud Network Security Integration - OverviewAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY