Getting Started with Identity Clients

  1. Install the Management ServerClosed Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..

    See the Installation and Upgrade Guide for your version.

  2. Install the Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources..

    See the Installation and Upgrade Guide for your version.

  3. Install the applicable Identity Clients.

    See sk134312.

  4. In SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., configure the Security Gateway:

    1. From the left navigation panel, click Gateways & Servers.

    2. Open the Security Gateway object.

    3. Enable the Identity Awareness Software BladeClosed Specific security solution (module): (1) On a Security Gateway, each Software Blade inspects specific characteristics of the traffic (2) On a Management Server, each Software Blade enables different management capabilities. and follow the Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. Configuration wizard.

      See the Identity Awareness Administration Guide for your version.

    4. From the left, click the Identity Awareness page.

    5. Configure the applicable Identity Sources and their settings.

      See:

    6. Click OK.

  5. In SmartConsole, configure the applicable Access Roles and Access Control policy.

    See the Identity Awareness Administration Guide for your version.

  6. In SmartConsole, install the Access Control policy.

  7. In SmartConsole or SmartView, examine the logs in the Logs & Monitor view > on the Logs tab.