Active Directory Authentication

Endpoint Security Active Directory Authentication

When an Endpoint Security client connects to the Endpoint Security Management ServerClosed A Security Management Server that manages your Endpoint Security environment. Includes the Endpoint Security policy management and databases. It communicates with endpoint clients to update their components, policies, and protection data., an authentication process identifies the endpoint client and the user currently working on that computer.

The Endpoint Security system can function in these authentication modes:

The authentication process:

  1. The Endpoint Security client (1) requests an authentication ticket from the Active Directory server (2).

     

  2. The Active Directory server sends the ticket (3) to the client (1).

     

  3. The client sends the ticket to the Endpoint Security Management Server (4).

     

  4. The Endpoint Security Management Server returns an acknowledgment of authentication to the Endpoint Security client (1).

Important - If you use Active Directory Authentication, then Full Disk EncryptionClosed A component on Endpoint Security Windows clients. This component combines Pre-boot protection, boot authentication, and strong encryption to make sure that only authorized users are given access to information stored on desktops and laptops. Acronym: FDE. and Media Encryption & Port ProtectionClosed A component on Endpoint Security Windows clients. This component protects data stored on the computers by encrypting removable media devices and allowing tight control over computers' ports (USB, Bluetooth, and so on). Acronym. MEPP. are only supported on endpoint computers that are part of Active Directory.

Note - Full Disk Encryption and Media Encryption & Port Protection are not supported on endpoint computers in your environment that are not part of the Active Directory.

Configuring Active Directory Authentication

Make sure you configure Strong Authentication for your production environment. Do not set up Strong Authentication before you are ready to move to production. When you are ready to move to production, follow this process.

Workflow for Configuring Strong Authentication:

UPN Suffixes and Domain Names

The User Principal Name (UPN) is the username in "email format" for use in Windows Active Directory (AD). The user's personal username is separated from a domain name by the "@" sign.

UPN suffixes are part of AD logon names. For example, if the logon name is administrator@ad.example.com, the part of the name to the right of the ampersand is known as the UPN suffix. In this case, ad.example.com

When you configure a new user account in AD, you are given the option to select a UPN suffix, which by default will be the DNS name for your AD domain. It can be useful to have a selection of UPN suffixes available. If your AD domain name is ad.example.com, it might be more convenient to assign users a UPN suffix of example.com. To make additional UPN suffixes available, you need to add them to AD.

Configuring Alternative Domain Names

When you configure Strong Authentication for Active Directory communication between the Endpoint Security client and the Endpoint Security Management Server, you can configure multiple UPN suffixes for the Active Directory domain name.

To Configure Additional UPN Suffixes for Active Directory Authentication

  1. In Harmony Endpoint, go to Endpoint Settings > Authentication Settings.

  2. Click Add.

    The New Authentication Principal window opens.

  3. In the Domain name field, enter the alternative Active Directory domain name. For example, if the previously configured domain name is nac1.com add an alternative domain name such as ad.nac1.com

  4. Configure the other fields with the same values as the previously configured authentication settings:

    • Principle Name

    • Version Key

    • Encryption Method

    • Password

  5. Click OK.

  6. Go to the Policy tab and click Save All Changes.

Troubleshooting Authentication in Client Logs

The authentication log file for each Endpoint Security client is located on the client computer:

%DADIR%\logs\Authentication.log

A normal log looks like this:

[KERBEROS_CLIENT(KerberosLogger_Events)] : Credentials acquired for John@ACME-DOM.COM

[KERBEROS_MESSAGE(KerberosLogger_Events)] : Message is Empty.

[KERBEROS_CLIENT(KerberosLogger_Events)] : Security context is not yet established.continue needed.

  • If the Authentication.log file on the client shows:

    No authority could be contacted for authentication.

    The Endpoint Agent cannot find a Domain Controller to supply credentials.

    To fix this:

    1. Make sure that the client is in the domain and has connectivity to your Domain Controller.

    2. To authenticate with user credentials, log off and then log in again.

      To authenticate with device credentials, restart the computer.

  • If the Authentication.log file on the client shows:

    The specified target is unknown or unreachable.

    Check the service name. Make sure that there are no typing errors and that the format is correct.

    If there was an error, correct it on the Check Point Endpoint Security Management Server.