- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
CheckMates Fest 2026
Watch Now!AI Security Masters
Hacking with AI: The Dark Side of Innovation
CheckMates Go:
CheckMates Fest
I have a large amount of SMB appliances that are using local auth which isn't ideal. I tried to setup Radius but I couldn't get it working because connections to Radius were going out the internet interface instead of across the IPSEC VPN to the Data Centre. I tried a few things which were shown in some Checkpoint articles, but I couldn't get it working.
I am now looking at using Azure SAML/SSO. Has anybody successfully got this working? The only downside is that I will need to create an enterprise app for every firewall.
Has anybody had success with other methods of auth?
The firewalls are centrally managed.
Thanks
Did you set the kernel variable as instructed specifically for centrally managed gateways?
There is also some route statements that might need to be added.
If you've done that and it's not working as expected, engage TAC.
As for SAML support for Admins, here's a screenshot of my 1590 running R81.10.17, with no mention of SAML.
Also no mention in the R82.xx firmware for SMBs about SAML support for Administrators either.
I presume fallback to local accounts would occur if RADIUS is offline.
However, that means you still have to manage local credentials on the device (at least for some user).
Which specific things did you try?
Doc/SK links would be helpful.
Even if you can make this work, relying on the VPN for authentication the local device would cause issues if the VPN is down.
As far as I know, we don't support SAML for authentication to the local device (e.g. for Administrators), only for Remote Access VPN.
I tried this with no luck (because it's centrally managed)
https://support.checkpoint.com/results/sk/sk119415
Also this, but I don't really want to be making these changes:
https://support.checkpoint.com/results/sk/sk92281
In the GUI I recall it seems to imply SAML is possible. I can't get a screenshot right now.
If the VPN was down, I would hope it would fall back to local auth. That's usually how these types of setup work.
Cheers
Did you set the kernel variable as instructed specifically for centrally managed gateways?
There is also some route statements that might need to be added.
If you've done that and it's not working as expected, engage TAC.
As for SAML support for Admins, here's a screenshot of my 1590 running R81.10.17, with no mention of SAML.
Also no mention in the R82.xx firmware for SMBs about SAML support for Administrators either.
I presume fallback to local accounts would occur if RADIUS is offline.
However, that means you still have to manage local credentials on the device (at least for some user).
Cheers, I did open a case with TAC previously. They referred me to sk31692. I just wasn't really keen on making those changes because it would affect every gateway. Also, as per the SK, even if I made those changes. They will get overwritten again when there is an upgrade on the SMS server, which isn't ideal at all.
If I use external auth, then you would typically have one breakglass account that only a few people have access to. Then every team member would get an external account.
These are the settings I was looking at, but I guess it's probably only for Remote Access VPN
I'm surprised that this is not more straightforward because I would think that most enterprise environments should be setup like this.
On other firewall platforms, you just choose the source interface for Radius requests.
Thanks
That is for Remote Access VPN only, correct.
OK thank you for clarifying.
The last time i looked at this the relevant advanced settings were:
VPN Site to Site global settings - Do not encrypt connections originating from the local gateway
VPN Site to Site global settings - Use internal IP address for encrypted connections from local gateway
Administrators RADIUS authentication - Local authentication (RADIUS inaccessible)
Administrators RADIUS authentication - Restrict Super User access by RADIUS
As PhoneBoy indicated some will have differing activation methods for centrally vs locally managed gateways however.
I would definitely do what Phoneboy suggested, certainly seems logical.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 56 | |
| 44 | |
| 16 | |
| 14 | |
| 12 | |
| 11 | |
| 10 | |
| 10 | |
| 9 | |
| 7 |
Thu 12 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 3: AI-Generated Malware - From Experimentation to Operational RealityFri 13 Feb 2026 @ 10:00 AM (CET)
CheckMates Live Netherlands - Sessie 43: Terugblik op de Check Point Sales Kick Off 2026Thu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesThu 12 Feb 2026 @ 05:00 PM (CET)
AI Security Masters Session 3: AI-Generated Malware - From Experimentation to Operational RealityFri 13 Feb 2026 @ 10:00 AM (CET)
CheckMates Live Netherlands - Sessie 43: Terugblik op de Check Point Sales Kick Off 2026Thu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY