Configuring Ping Identity as Identity Provider
Set up your Identity Provider and then use these settings for the Identity Awareness Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. (see Identity Awareness).
Use Cases
-
To prevent cyber-attacks, Check Point requires access to your third-party Identity Provider to retrieve and report identity of the users attacked.
-
Administrators can enforce different sets of rules for different users and groups. After you integrate Identity Provider with Harmony Connect, you can select users and groups within the security policy Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection..
To configure Ping Identity as your Identity Provider:
-
Verify your domain
-
On the Verify Domain page, enter your organization domain.
Note - You need this step to ensure successful identification for all the users that belong to your organization and connected behind your branch offices. To learn more on the process, see Domain Verification.
-
The DNS record is generated below.
Click to copy this generated DNS record value.
-
Enter this generated DNS record to your DNS server as a TXT record.
-
Click Next on the Verify Domain page.
Check Point makes a DNS query attempt to verify your domain configuration.
Note - It may take some time until the DNS record is propagated and can be resolved.
-
-
Create a SAML application in the Ping Identity Portal
First, create a new environment in the Ping Identity Portal.
-
Log in to your Ping Identity Portal.
-
Go to the Home page and click Add Environment.
-
Select Customer solution and click Next.
-
Make sure PingOne for Customers is available. Click Next.
-
Enter all relevant information in the form.
-
Click Finish. Ping Identity redirects you to the Home page.
In the new environment, create a web application.
-
Navigate to Connections > Applications and click Add Application.
-
Click WEB APP, then select SAML and click Configure.
-
A new Create App Profile page opens.
-
Enter the application details. For example, set the application name to Check Point Harmony Connect.
-
Click Next. The Configure SAML Connection page opens.
-
Under Provide Meta Data, select Manually Enter.
-
-
Allow connectivity
-
Back in the Infinity Portal Harmony Connect, on the Allow Connectivity page, copy the Entity ID and the Reply URL.
-
Go back to the Ping Identity Portal and Configure SAML Connection:
-
Click Save and Continue.
-
In the Map Attributes page, define SAML attributes. The User ID attribute = saml_subject appears by default. Change User ID to Email Address.
-
Click Add Attribute and select PingOneAttribute to add a new attribute.
-
Select Population ID for User Attribute and enter groups for Application Attribute. Select the Required option.
-
Click Add Attribute and select PingOneAttribute to add one more attribute.
-
Select Group Names for User Attribute and enter memberOf for Application Attribute. Select the Required option.
-
Click Save and Close.
-
Ping Identity redirects you to the Applications page. In your newly created application, go to the Configuration tab and click Download under Connection Details > Download Metadata.
-
Download the SAML Metadata file to your computer.
-
-
Upload the Federation Metadata file
-
In the Infinity Portal, Identity Provider Wizard > Configure Metadata page, upload the Federation Metadata XML that you downloaded from the Ping Identity Portal.
Note - Check Point uses the service URL and the name of your Certificate to identify your users behind the sites.
-
Click Test your configuration to test your Identity Provider configuration.
-
Enter the Identity Provider credentials. This tests the configuration and shows the result:
Test passed:
Test failed:
-
Click Next. Check Point verifies the metadata of your Identity Provider.
-
-
Set up Users and Groups Synchronization
First, you create a Worker application. Then you can set up permissions for users and groups.
Create a Worker application in the Ping Identity PortalThe worker application helps you set user and group automatic synchronization. Therefore, the request to create a new worker application should be at the section “set up user and group synchronization.”
Set up Users and Groups PermissionsSet up permissions to allow selection of users and user groups from your Ping Identity at Harmony Connect Policy.
- On the Applications page of the Ping Identity portal, select the Worker application, open the Configuration tab, scroll down and make sure that Grant Type is set to Client Credentials. Under Token Endpoint Authentication Method, select Client Secret Post.
-
Click Save.
-
On the Applications page, toggle the slider for each of two applications to enable the User Access.
-
In the Infinity Portal, Identity Provider Wizard > Set Directory Integration page, fill in the required fields:
-
Environment ID - In Ping Identity Portal, go to Dashboard > Environment Properties and copy the value of Environment ID.
-
Region - In Ping Identity Portal, go to Dashboard > Environment Properties and check the region. In the Wizard, enter EU for Europe, COM for the United States, and ASIA for Asia Pacific.
-
Client ID and Shared Secret - In Ping Identity Portal, go to Connections > Applications and open your Worker application. Open the Configuration tab and copy two values: Client ID and Client Secret.
Verify that all fields in Directory Integration are correct.
-
-
To test the users and group synchronization between the Infinity Portal and Identity Provider, click Start User and Group Sync Test.
If the test fails, repeat step Set up users and groups synchronization to reconfigure the user and group synchronization parameters.
-
Click Next.
-
Confirm Identity Provider Integration
In the Confirm Identity Provider page, check all the details and click Add Identity Provider to complete the wizard.
The Identity Provider installation is ready. Follow the steps below to complete the integration of the Ping Identity Identification.
-
Enable Identity Awareness
(Optional) When you configure your Identity Provider and set the list of the excluded IP or network addresses, click Enable Identity Awareness for remote users or Enable Identity Awareness for branch sites or both and click Apply Changes.
Note - After the Identity Awareness update completes, a new notification appears on the Infinity Portal Notifications .
To disable Identity Awareness, clear the selection.
-
Bypass Authentication
When you enable Identity Awareness, you can enter one or more IP addresses for Check Point to bypass. The traffic from these IP addresses is not redirected to the Identity Provider authentication page. Use this for devices such as printers, servers, or Internet of Things (IoT).
To add the bypass authentication in the Identity Awareness window:
-
Go to Policy > Identity Awareness > Bypass authentication from these sources.
-
Enter the IP address and click [+] to add it.
-
Click Update.
Note - After the Identity Awareness update completes, a new notification appears on the Infinity Portal Notifications .
-
-
Enforce access control rules for specific users and groups
To get policy enforcement for users and groups, add users and groups to the policy: