Identity Agent for a User Endpoint Computer - Configuring as Identity Source

Configuring the Identity Agent Settings on the Identity Awareness Gateway

  1. Connect with SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. to the Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. / Multi-Domain ServerClosed Dedicated Check Point server that runs Check Point software to host virtual Security Management Servers called Domain Management Servers. Synonym: Multi-Domain Security Management Server. Acronym: MDS. that manages the Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. Gateway.

  2. From the left navigation panel, click Gateways & Servers.

  3. Double-click the Identity Awareness Gateway object.

  4. From the left tree, click the Identity Awareness page.

  5. In the Identity Sources section, select Identity Agents and click Settings.

    The Identity Agents Settings window opens.

  6. In the Identity Agents Settings window, configure the applicable settings:

  7. Click OK to close the Check Point Gateway window.

  8. Install the Access Control Policy on the Identity Awareness Gateway.

Configuring an Identity Agent Environment

It is possible to configure an Identity Agent environment in these ways:

  • From Captive Portal

    You can tell users to download the Identity Agent from the Captive PortalClosed A Check Point Identity Awareness web portal, to which users connect with their web browser to log in and authenticate, when using Browser-Based Authentication.. In addition, you can let users install the Identity Agent on a specified later date . During installation, the Identity Agent automatically detects if there are administrator permissions on the computer , and installs itself accordingly.

    Notes

    • When you configure the Full Identity Agent, the user that installs the client must have administrator privileges on the computer. If the user does not have administrator privileges, the Light Identity Agent is installed instead.

    • When users authenticate with the transparent portal, the download link does not show. Users must install the agent from the distribution media.

    Procedures:

  • With the Identity Agent Distributed Configuration Tool

    You can configure the Identity Agent with distribution software. You can download Identity Agent (Full Agent and Light Agent) from sk134312.