- Products
- Learn
- Local User Groups
- Partners
- More
Introduction to Lakera:
Securing the AI Frontier!
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hi All,
I will be setting up Identity Awareness in an R80.10 MDS environment. We will be using Identity collects to communicate with the DCs and provide what is in the security logs to the firewall. After reading the documentation I have some questions regarding setup and usage. Thanks in advance:
1) I have read the following identity collection requirement:
"Identity collector provides information about users, machines and IP addresses to the Security Gateway. LDAP Account Unit(s) should be configured to allow PDP gateways to perform group lookups on IDs that are provided from Identity Collector to match them to Access Roles."
If an account unit is created in the domain (checkpoint local domain NOT active directory) and applied to the firewall object under firewall properties - others - user directory. Is that all I need to perform this requirement?
2) There is no way to apply an account unit I created in global directory (at least not that I can find). Does this mean I cannot use global rules with identity awareness since the global account unit would not be assigned to the firewall to perform global lookups?
3) Is there anyway to create rules for individual users opposed to groups?
Thanks,
Josh
Actually, I'd like to get some clarity on this statement too:
"Identity collector provides information about users, machines and IP addresses to the Security Gateway. LDAP Account Unit(s) should be configured to allow PDP gateways to perform group lookups on IDs that are provided from Identity Collector to match them to Access Roles."
I thought that the Identity Collector was, in part, used to circumvent the necessity of creating the Administrative account for Check Point's LDAP Account unit.
But looks like it is required anyway for IA to work as intended.
Hey Vladimir,
I do know in my readings that the collector only gets events from the domain security logs (user login/logout info). The collector then sends these usernames to the gateways to match it with an IP address BUT its only one part of the total equation. The gateway still needs match this username to AD groups and memberships hence the need for the LDAP account unit. Once you have this piece you can make access role objects and query anything in the AD directory for the gateway to enforce.
Josh
The Identity Collector just obtains the usernames.
LDAP Lookups still occur at the gateway level and those are tied to a specific domain, not global.
Which likely means you cannot configure LDAP groups at a global level, but @Royi_Priov should comment further.
If you want to create a user-specific rule, isn't that just a matter of defining an access role for the specific user in question?
Hey Phoneboy,
Once IC is implemented, Admin account is still needed onto LDAP account unit to perform LDAP lookups?
I saw on @Peter_Elmer videos that he switched to a non admin account onto LDAP account unit.
Last question, Will Captive Portal get identities correctly if LDAP account unit has not configured an Admin Account?
Thank you
Hey,
In regards to AD account used to configure IC to read Login data from AD, our account is not an admin account (is just allowed to read the AD logs) therefore I would say that you don't require an Admin account like it was needed with AD Query.
(we use same account for LDAP objects)
I can't answer on Captive Portal as we don't use it, we only get AD and ISE data into IA via IC 🙂 .
Ty,
The LDAP lookup piece has never required admin privileges, only the WMI piece.
Hello @checkpoint_chec ,
Best to look at the flow of events from the start:
I created videos on sk179544 showing the above flow and related configuration.
When using the Captive Portal the same as above is taking place, besides the Login Event is signalized by the client browser connecting to the portal. The user is providing credentials and the PDP is sending those to the AD Server. In case AD server authenticates the user, then the PDP is starting the authorization process and runs LDAP(s) group membership queries. Here, just like above, domain user access rights are sufficient.
Note the LDAP Account Unit object is holding the userID credentials the PDP uses to run the LDAP(s) group membership queries.
best regards
peter (pelmer)
Hello Peter,
we need to deploy in around 20 CMA same LDAP Account Units.... to facilitate the process, we create the LDAP AU objects in Global Domain, but it seems that the LDAP AU cannot be selected in the User Directory tab in authentication method (they are not visible)... is there any limitation on this?
thank you
from User Directory tab we got:
Looks like this is expected behavior: https://support.checkpoint.com/results/sk/sk181042
You need to set the priority in the object at the global level (not the local one).
yes i'm aware about that sk, but i left default values.... TAC Case araised
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
24 | |
15 | |
4 | |
3 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 |
Tue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureTue 07 Oct 2025 @ 10:00 AM (CEST)
Cloud Architect Series: AI-Powered API Security with CloudGuard WAFTue 30 Sep 2025 @ 08:00 AM (EDT)
Tips and Tricks 2025 #13: Strategic Cyber Assessments: How to Strengthen Your Security PostureThu 09 Oct 2025 @ 10:00 AM (CEST)
CheckMates Live BeLux: Discover How to Stop Data Leaks in GenAI Tools: Live Demo You Can’t Miss!Wed 22 Oct 2025 @ 11:00 AM (EDT)
Firewall Uptime, Reimagined: How AIOps Simplifies Operations and Prevents OutagesAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY