Active Directory Authentication
Endpoint Security Active Directory Authentication
When an Endpoint Security client connects to the Endpoint Security Management Server A Security Management Server that manages your Endpoint Security environment. Includes the Endpoint Security policy management and databases. It communicates with endpoint clients to update their components, policies, and protection data., an authentication process identifies the endpoint client and the user currently working on that computer.
The Endpoint Security system can function in these authentication modes:
-
Unauthenticated mode - Client computers and the users on those computers are not authenticated when they connect to the Endpoint Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server.. They are trusted "by name". This operation mode is recommended for evaluation purposes only.
-
Strong Authentication mode - Client computers and the users on those computers are authenticated with the Endpoint Security Management Server Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. when they connect to the Endpoint Security Management Server. The authentication is done by the Active Directory server using the industry-standard Kerberos An authentication server for Microsoft Windows Active Directory Federation Services (ADFS). protocol. This option is only available for endpoints that are part of Active Directory.
The authentication process:
|
|
|
Important - If you use Active Directory Authentication, then Full Disk Encryption A component on Endpoint Security Windows clients. This component combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops. Acronym: FDE. and Media Encryption & Port Protection A component on Endpoint Security Windows clients. This component protects data stored on the computers by encrypting removable media devices and allowing tight control over computers' ports (USB, Bluetooth, and so on). Acronym. MEPP. are only supported on endpoint computers that are part of Active Directory. Note - Full Disk Encryption and Media Encryption & Port Protection are not supported on endpoint computers in your environment that are not part of the Active Directory. |
Configuring Active Directory Authentication
Make sure you configure Strong Authentication for your production environment. Do not set up Strong Authentication before you are ready to move to production. When you are ready to move to production, follow this process.
Workflow for Configuring Strong Authentication:
Endpoint Security Strong Authentication uses the Kerberos network authentication protocol.
To enable the Active Directory server to validate the identity of clients that authenticate themselves through Kerberos, run the ktpass.exe
command on the Active Directory Server. By running the ktpass
command, you create a user that is mapped to the ktpass
service. This creates a Principal Name for the AD server. The Principal Name must have this format: ServiceName/realm@REALM
|
Important - After you create the user that is mapped to the |
To prepare the Active Directory Server for authentication:
-
Go to Start menu > All Programs > Administrative Tools > Active Directory Users and Computers.
-
Create a domain user and clear the option User must change password at next logon.
-
Open an elevated Windows Command Prompt.
-
In Windows Command Prompt, go to this folder:
cd %WinDir%\System32\
-
Map a service to a user with this command:
ktpass princ <Service Name>/<realm name>@<REALM NAME> mapuser <Username>@<REALM NAME> pass <Password> out <Name of Output File>
Example:
ktpass princ tst/nac1.com@NAC1.COM mapuser auth-user@NAC1.COM pass 123456 out outfile.keytab
Parameters:
Syntax Example Value Explanation <Service Name>
tst
Name of the service. <realm name>
<REALM NAME>
nac1.com
NAC1.COM
Domain name of the Active Directory server.
The first instance is in lower case.
The second instance in upper case.
<Username>
auth-user
The Active Directory domain user. <Password>
123456
Password for user. <Name of Output File>
outfile.keytab
Name of the encrypted keytab file.
-
Save the console output to a text file.
See the version number (vno) and encryption type (etype).
Sample output:
Targeting domain controller: nac1-dc.nac1.com
Successfully mapped tst/nac1.com to auth-user.
WARNING: pType and account type do not match. This might cause problems.
Key created.
Output keytab to outfile.log:
Keytab version: 0x502
keysize 74 tst/nac1.com@NAC1.COM ptype 0 (KRB5_NT_UNKNOWN) vno 7 etype 0x17 (RC4-HMAC) keylength 16 (0x32ed87bdb5fdc5e9cba88547376818d4)
Important - We recommend that you do not use DES-based encryption for the Active Directory Domain Controller server, as it is not secure. If you choose to use DES encryption and your environment has Windows 7 clients, see sk64300
Notes:
-
Make sure that the clock times on the Endpoint Security servers and the Kerberos server are less than 5 minutes apart. If the difference in the clock times is more than 5 minutes, a runtime exception shows and Active Directory authentication fails. On Gaia Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems., use NTP or a similar service.
-
To use Capsule Docs A component on Endpoint Security Windows clients. This component provides security classifications and lets organizations protect and share documents safely with various groups - internal and external. with Single Sign-On, disable the User Access Control (UAC) on Windows Active Directory Servers.
-
Configure the settings in Harmony Endpoint for client to server authentication.
|
Important - Use the Unauthenticated mode only for evaluation purposes. Never use this mode for production environments. Configure the authentication settings before moving to production. |
How the Authentication Settings are Used in Deployment Packages
When you configure client package profiles, you select an authentication account. The SSO Configuration details are included in the client deployment package, which allows the server to authenticate the client.
To configure authentication settings:
-
In Harmony Endpoint, go to the Endpoint Settings view > the Authentication Settings tab.
-
Click Add.
The New Authentication Principal window opens.
-
Enter the details from the output of
ktpass.exe,
that you configured in Step 1 of 3: Configuring the Active Directory Server for Authentication:Field
Description
Domain name
Active Directory domain name.
For example:
nac1.com
Principle Name
Authentication service name in the format:
ServiceName/realm@REALM
This value must match the name that was configured in Active Directory > New Object.
For example:
tst/nac1.com@NAC1.COM
Version Key
Enter the version number according to the Active Directory output in the
vno
field.For example:
7
Encryption method
Select the encryption method according to the Active Directory output in the
etype
field.For example:
RC4-HMAC
Password
Enter (and confirm) the password of the Active Directory Domain Admin user you created for Endpoint Security use.
For example:
123456
-
Click Add.
-
When you are ready to work in Strong Authentication mode, select Work in authenticated mode in the Authentication Settings tab.
|
Important - After you turn on Strong Authentication, wait one minute before you initiate any client operations. It takes time for the clients and the Endpoint Security Management Server to synchronize. During this time, the environment remains unauthenticated, and some operations fail. The exact amount of time depends on the Active Directory scanner (see Managing Active Directory Scanners). |
After you finished configuring strong authentication for Active Directory, save your changes.
-
In Harmony Endpoint, go to the Policy tab.
-
On the Policy Toolbar, click Save All Changes.
UPN Suffixes and Domain Names
The User Principal Name (UPN) is the username in "email format" for use in Windows Active Directory (AD). The user's personal username is separated from a domain name by the "@
" sign.
UPN suffixes are part of AD logon names. For example, if the logon name is administrator@ad.example.com
, the part of the name to the right of the ampersand is known as the UPN suffix. In this case, ad.example.com
When you configure a new user account in AD, you are given the option to select a UPN suffix, which by default will be the DNS name for your AD domain. It can be useful to have a selection of UPN suffixes available. If your AD domain name is ad.example.com
, it might be more convenient to assign users a UPN suffix of example.com
. To make additional UPN suffixes available, you need to add them to AD.
Configuring Alternative Domain Names
When you configure Strong Authentication for Active Directory communication between the Endpoint Security client and the Endpoint Security Management Server, you can configure multiple UPN suffixes for the Active Directory domain name.
To Configure Additional UPN Suffixes for Active Directory Authentication
-
In Harmony Endpoint, go to Endpoint Settings > Authentication Settings.
-
Click Add.
The New Authentication Principal window opens.
-
In the Domain name field, enter the alternative Active Directory domain name. For example, if the previously configured domain name is
nac1.com
add an alternative domain name such asad.nac1.com
-
Configure the other fields with the same values as the previously configured authentication settings:
-
Principle Name
-
Version Key
-
Encryption Method
-
Password
-
-
Click OK.
-
Go to the Policy tab and click Save All Changes.
Troubleshooting Authentication in Client Logs
The authentication log file for each Endpoint Security client is located on the client computer:
%DADIR%\logs\Authentication.log
A normal log looks like this:
|
-
If the Authentication.log file on the client shows:
No authority could be contacted for authentication.
The Endpoint Agent cannot find a Domain Controller to supply credentials.
To fix this:
-
Make sure that the client is in the domain and has connectivity to your Domain Controller.
-
To authenticate with user credentials, log off and then log in again.
To authenticate with device credentials, restart the computer.
-
-
If the Authentication.log file on the client shows:
The specified target is unknown or unreachable.
Check the service name. Make sure that there are no typing errors and that the format is correct.
If there was an error, correct it on the Check Point Endpoint Security Management Server.