- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters
E1: How AI is Reshaping Our World
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Goal:
VPN user login with MFA while respecting all groups the user belongs to.
Scenario:
During VPN login, the user at AzureAD is only checked against the one group that is allowed to perform VPN.
This means that only this one group can be used in the set of access rules.
We are using SAML Support for Remote Access VPN (Remote Access VPN R81.10 Administration Guide) and this is working as expected. The Firewall Management and Gateways are running on GAiA R81.10 and are on premise. If the vpn user logs in, when he/she only belongs to one Source User Group which is configured in the AzureAD (EXT_ID....).
Question:
Is there any way how the firewall can check which user groups (AzureAD) the vpn user also belongs to? This is to allow specific access regarding all groups the user belongs to.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY