Microsoft ADFS
Use these instructions to configure the SSO Single Sign-On (SSO) - A session/user authentication process that permits a user to enter one name and password in order to access multiple applications. authentication with Microsoft ADFS Active Directory Federation Services. A Microsoft software component for Windows Server OS to give users single sign-on access to an organization's systems and applications..
-
In the Infinity Portal go to > Identity & Access > click the plus icon.
-
Enter a name for the Integration Title and select ADFS.
-
Click Next.
In this step, you can configure SSO authentication for Infinity Portal administrators and for end users of Check Point services.
-
Select Enable Administrators to log in to the portal using this IdP.
-
Select one of these options:
-
Login based on domain verification- Infinity Portal Administrators can log in to this Infinity Portal account with SSO from the Identity Provider A system entity that creates, maintains, and manages identity information for principals and also provides authentication services to relying applications within a federation or distributed network. Acronym: IdP or IDP.. Administrators log in through the Infinity Portal login page.
-
Login with a unique URL - Infinity Portal Administrators can log in with SSO from the Identity Provider for multiple Infinity Portal accounts. Administrators log in using the URL that appears in the box.
-
-
In the Service(s) Integration section, select one of these options:
-
No Services - There is no SSO authentication from the Identity Provider for end users of Check Point services. This is the default configuration.
-
All Services - End users can log in with SSO from the Identity Provider for all Check Point services that support SSO.
-
Specific Service(s) - A list of services opens. Select service(s) for which you want end users to log in with SSO from the Identity Provider. Available services:
-
Harmony Connect
-
Quantum Gateways
-
-
-
Click Next (or Apply) to complete the Integration Type configuration.
|
Note - If for Integration Type you selected "Login with a Unique URL", the Verify Domain step is not necessary. |
-
Copy the DNS Value from the Infinity Portal.
-
On your DNS server, enter the Value as a
TXT
record. -
In the Infinity Portal > Domain(s) section, enter a public DNS domain server name and click the plus icon.
Check Point makes a DNS query to verify your domain's configuration.
-
Optional - add more DNS domain servers.
-
Click Next.
Note - Wait until the DNS record is propagated and can be resolved.
Before you start, copy the Entity ID and Reply URL from the wizard and then open the Microsoft ADFS Management console.
-
Navigate to ADFS > Trust Relationships > Relying Party Trusts.
-
Right-click to select Add Relying Party Trust.
-
The Add Relying Party Trust Wizard opens. Click Start.
-
Select Enter data about the relying party manually > click Next.
-
Enter this information:
-
In Display name - Check Point Infinity Portal.
-
In Notes - This is the relying party trust for Check Point Infinity Portal.
-
-
Click Next.
-
Make sure to select the ADFS profile > click Next.
-
In the Configure Certificate section, do not upload a token encryption certificate. Click Next.
-
Select the checkbox Enable support for the SAML 2.0 Web SSO protocol.
-
In the Service URL field, enter the Reply URL that you copied from the Check Point Infinity Portal.
-
Click Next.
-
In the Relying party trust identifier textbox, enter the Entity ID that you copied from the Check Point Infinity Portal.
-
Click Add and then click Next.
-
In the next screen, make sure to select I do not want to configure multi-factor authentication > click Next.
-
Make sure to select Permit all users to access this relying party > click Next.
-
In the Ready to Add Trust section, click Next.
-
Select Open the Edit Claim Rules dialog for this relying party trust when the wizard closes, then click Close.
-
In the Edit Claim Rules for Check Point Infinity Portal panel > Issuance Transform Rules tab, click Add Rule.
-
Set the Claim rule template from the menu list to Send LDAP Attributes as Claims and click Next.
-
Below Configure Claim Rule, enter these settings:
-
Claim rule name - LDAP Lightweight Directory Access Protocol. It provides a mechanism used to connect to, search, and modify Internet directories (such as Microsoft Active Directory). - User Principal Name as Name ID
-
Attribute store - Active Directory Microsoft® directory information service. Stores data about user, computer, and service identities for authentication and access. Acronym: AD.
-
LDAP Attribute - User-Principal-Name
-
-
Add a claim with these settings:
-
Claim rule name - Groups Claim
-
Attribute store - Active Directory
-
LDAP Attribute - Token-Groups - Unqualified Names
-
Outgoing Claim Type - Group
Note - Configure the applicable group names in the Infinity Portal user groups IdP ID field.
-
-
Add the next claims:
-
Name
-
Claim rule name - Name
-
Attribute store - Active Directory
-
LDAP Attribute - Name
-
Outgoing Claim Type Name
-
-
Email
-
Claim rule name - Email
-
Attribute store - Active Directory
-
LDAP Attribute - E-Mail-Addresses
-
Outgoing Claim Type - E-Mail Address
-
-
Group IDs
-
Claim rule name - Groups IDs
-
Attribute store - Active Directory
-
LDAP Attribute - Token-Groups as SIDs
-
Outgoing Claim Type - Group SID
-
-
userId
-
Claim rule name - userId
-
Attribute store - Active Directory
-
LDAP Attribute - objectSid
-
Outgoing Claim Type - Primary SID
-
-
-
Make sure you have the claims and click OK.
-
Restart the ADFS services or restart the server to apply the configuration.
|
Note - It is necessary to configure the ADFS groups for use on the Infinity Portal User Groups page. The corresponding users in these groups are granted access to the Infinity Portal by the roles configured in the Infinity Portal User Groups. In the IdP ID field, below User Groups, provide the ADFS group name. |
-
Download the ADFS Federation Metadata file from:
https://<your-domain>/FederationMetadata/2007-06/FederationMetadata.xml
-
In the Configure Metadata page, upload the Federation Metadata XML that you downloaded from your ADFS.
Note - Check Point uses the service URL and the name of your Certificate to identify your users behind the sites.
-
Click Next.