- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Goal:
VPN user login with MFA while respecting all groups the user belongs to.
Scenario:
During VPN login, the user at AzureAD is only checked against the one group that is allowed to perform VPN.
This means that only this one group can be used in the set of access rules.
We are using SAML Support for Remote Access VPN (Remote Access VPN R81.10 Administration Guide) and this is working as expected. The Firewall Management and Gateways are running on GAiA R81.10 and are on premise. If the vpn user logs in, when he/she only belongs to one Source User Group which is configured in the AzureAD (EXT_ID....).
Question:
Is there any way how the firewall can check which user groups (AzureAD) the vpn user also belongs to? This is to allow specific access regarding all groups the user belongs to.
About CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY