Consumers - Security Gateways Using Identity and Trust for Access Control

After you configure Identity and Trust to collect directory and identity information, you can configure a Security Gateway to act as a consumer of Identity and Trust. It retrieves identity information from Identity and Trust and uses it to enforce identity‑based access control.

This chapter explains the configuration steps and how to use the retrieved identity information in access control rules.

Configuration

Monitoring and Troubleshooting the Connection between Identity and Trust and Security Gateways

If a user logs in successfully but does not get access to resources located behind a Security Gateway as expected, follow these steps to troubleshoot the issue.

  1. In Identity and Trust, from the left toolbar, open the Active sessions tab.

  2. At the top of the Active Sessions menu, select By users.

  3. Search the table for the relevant username.

    If the username appears in the table, keep Identity and Trust open and continue to the next step.

  4. On the CLI of the Security Gateway, run:

    pep show network intelligence

    If the username does not appear in the table, then there is a problem with the connection between Identity and Trust and the IdP.

    The output of the command is a table. In the Network column of the table, look for the network that appears in the table row for the username in the Identity and Trust UI. If you find the network, check if Identity and Trust appears in the Related Intelligence column.

    If the user's network appears, continue to the next step.

    If the user's network does not appear, then there is a problem with the connection between Identity and Trust and the Security Gateway.

  5. On the CLI of the Security Gateway, run:

    pep show user all

    The output of the command is a table. If the username appears in the Username@Machine column in the table, and Identity and Trust appears in the ID (PDP; UID) column, this means that the Security Gateway received the identity from Identity and Trust. The Access Control rule is not configured properly in SmartConsole, or there is a problem with the connection between the Security Gateway and the internal resource.

    If the username does not appear in the table, then there is a problem with the connection between Identity and Trust and the Security Gateway.

Verifying Connectivity Between the Security Gateway and Identity and Trust

After the Security Gateway and Identity and Trust synchronize information (about 15 minutes), a Security Gateway consumer card appears on the Integrations page.

Logs show related Security Gateway events. For example:

  • When a Security Gateway is configured to work with Identity and Trust

  • When a Security Gateway is removed

  • When a Security Gateway status changes from connected to disconnected