Introduction to Identity Awareness
Firewalls traditionally monitor traffic based on IP addresses, without recognizing the user or device identities linked to those addresses. Identity Awareness Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. enables enforcement of access control policies based on user and device identities for enhanced security.
Check Point provides a scalable solution for both Active Directory and non-Active Directory networks, supporting employees and guest users.
The solution identifies users and devices using the source and destination IP addresses of network traffic. These identities can be used in the Source and Destination fields of Access Control policy rules:
-
User or user group identities
-
Computer or computer group identities
Identity Awareness retrieves identities from configured identity sources. At least one Identity Source must be enabled and configured in the Identity Awareness Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. object. Refer to Identity Sources for configuration details.
To start working with Identity Clients, see Getting Started with Identity Clients.
Known Limitations
-
Identity Awareness does not support NAT.