Kerberos SSO Compliance

The Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. Single Sign-On (SSO) solution for Identity Clients lets you transparently authenticate users that are logged in to the domain. After a user authenticates to the domain once, the user has access to all authorized network resources without additional authentication. This solution is available for:

These are some major benefits of Identity Clients SSO:

  • User and computer identity.

  • Minimal user intervention - The administrators do all the necessary configuration steps, and no input from a user is necessary.

  • Seamless connectivity - There is transparent authentication when users are logged in to the domain. If you do not configure SSO, users enter their credentials manually. You can let users save their credentials.

  • Connectivity through roaming - Users stay automatically identified when they move between networks, while the client detects the movement and reconnects.

  • Added security - You can use packet tagging to prevent IP Spoofing. In addition, Identity Clients give you strong (KerberosClosed An authentication server for Microsoft Windows Active Directory Federation Services (ADFS). based) user and computer authentication.

You get SSO in Windows domains with the Kerberos authentication protocol. Kerberos is the default authentication protocol for Windows 2000 and above.

The Kerberos protocol uses tickets. Tickets are encrypted data packets issued by a trusted authority, in this case the Active Directory (AD). When a user logs in, the user authenticates to a domain controller that provides an initial ticket granting ticket (TGT). This ticket proves the user's identity. When the user authenticates against the Identity Awareness Gateway, the Identity Client presents this ticket to the domain controller and requests a service ticket (SR) for a specific Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources.. The Identity Client then presents this service ticket to the Security Gateway that grants access.

How SSO Works

This is the workflow for SSO:

  1. The user logs in to the computer and authenticates to the AD server.

  2. The AD sends an initial ticket (TGT) to the computer.

  3. The Identity Client connects to the Identity Awareness Gateway, which then requests the identity.

  4. The Identity Client requests an SR (service ticket) for the Identity Awareness Gateway and presents the TGT to the AD server.

  5. The AD server sends the SR to the computer.

    The user name is encrypted with the shared secret between the Identity Awareness Gateway and the AD server.

  6. The Identity Client sends the SR to the Identity Awareness Gateway.

  7. The Identity Awareness Gateway uses the shared secret to decrypt the ticket and confirms the user identity.

  8. The user gets access to resources behind the Identity Awareness Gateway.

Item

Description

1

Computer for the user

2

Active Directory Domain Controller server

3

Identity Awareness Gateway

4

Resources behind the Identity Awareness Gateway

SSO Configuration

SSO configuration includes these steps: