You can use the Identity Awareness Configuration Utility to create custom Identity Agent installation packages (the Identity Awareness Configuration Utility - IAConfigTool.exe
- is installed as part of Identity Agent). Identity Agents have many advanced configuration parameters. Some of these parameters are related to the installation process, while others are related to Identity Agent functionality. All of the configuration parameters have default values that are deployed with the product and can remain unchanged.
Identity Agent Type |
Description |
---|---|
Full |
Predefined Identity Agent that includes packet tagging and computer authentication. It applies to all users of the computer, on which it is installed. Administrator permissions are required to use the Full Identity Agent type. |
Light |
Predefined Identity Agent that does not include packet tagging and computer authentication. You can install this Identity Agent individually for each user on the target computer. Administrator permissions are not required. |
Terminal Servers |
Predefined Identity Agent that installs Managed Asset Detection (MAD) services and the Multi-user host driver on Citrix and Terminal Servers. This Identity Agent type cannot be used for endpoint computers. |
Custom |
Lets you configure custom features for all computers that use this agent, such as MAD services and packet tagging. |
You must install Microsoft .NET Runtime framework 4.0 or higher before you install and run the Identity Agent Configuration Tool.
To install the .NET Runtime Framework v4.0:
To create a custom Identity Agent installation package, you must first copy the customizable MSI file from the Security Gateway to your management computer. This is the computer, on which you use the Identity Agent Configuration Tool.
To get the customizable MSI file:
/opt/CPNacPortal/htdocs/nac/nacclients/customAgent.msi
You must use the original copy of the MSI file when you work with the Identity Agent Configuration Tool.
You must install Identity Agent v2.0 or above (from Security Gateway R77 or above) on your management client computer. The Configuration Tool is installed in the Identity Agent installation directory.
To install the Identity Agent on your client computer:
/opt/CPNacPortal/htdocs/nac/nacclients/fullAgent.exe
/opt/CPNacPortal/htdocs/nac/nacclients/lightAgent.exe
To run the Identity Agent Configuration Tool:
The Identity Agent Configuration Tool opens.
You configure all features and options in the Identity Agent Configuration Tool window.
MSI Package Path
Enter or browse to the source installation package. You must use a Check Point customizable MSI file as the source for the configuration tool.
Installation Type
Select whether the Identity Agent applies to one user or to all users of the computer, on which it is installed.
Installation UI
Select one of these end user interaction options:
Identity Agent Type
Select the type of Identity Agent to install:
Custom Features
Select these features for the Custom Identity Agent type:
Copy configuration
Save
Click to save this configuration to a custom MSI file. Enter a name for the MSI file.
To deploy a custom Identity Agent with the Captive Portal:
customAgent.msi
package to the /opt/CPNacPortal/htdocs/nacclients/
directory on the Security Gateway.Identity Agent can now reconnect to the original PDP Security Gateway after it recovers.
To configure the automatic reconnection to a higher-priority PDP Security Gateway:
pdp auth recovery_interval show
pdp auth recovery_interval set <interval between 1 and 864000 seconds>
PDP CLI Reference
Syntax |
Description |
---|---|
|
Show the recovery interval |
|
Set the recovery interval value between 1 and 864000 seconds |
|
Enable the automatic reconnection to a higher-priority PDP Security Gateway |
|
Disable the automatic reconnection to a higher-priority PDP Security Gateway |
Notes:
recovery_interval
parameter controls the recovery interval, during which the Identity Agent searches for a higher priority PDP Security Gateway.recovery_interval
parameter in the context of each Virtual System with Identity Awareness enabled.recovery_interval
parameter when it connects to the PDP Security Gateway. Therefore, the value must be the same on all relevant PDP Security Gateways in your environment.Identity Awareness can now recognize Microsoft group membership data in the Kerberos tickets that are granted by any domain controller configured in SmartConsole.
The Transparent Kerberos SSO Authentication feature is disabled by default.
To configure the Transparent Kerberos SSO Authentication feature on Identity Awareness Gateway:
pdp auth fetch_by_sid status
pdp auth fetch_by_sid enable
pdp auth fetch_by_sid disable
Note - On VSX Gateway, run the command in the context of the Virtual System with enabled Identity Awareness Software Blade.
To configure the Identity Agent to support domains, which are not configured in SmartConsole:
pdp auth kerberos_any_domain status
pdp auth kerberos_any_domain enable
pdp auth kerberos_any_domain disable
Note - On VSX Gateway, run the command in the context of the Virtual System with enabled Identity Awareness Software Blade.
To configure the Identity Agent to send updated Kerberos tickets upon policy installation:
By default, Identity Agent fetches and sends a Kerberos ticket to the Identity Awareness Gateway only during a re-authentication (according to the Identity Agent settings).
You can force the Identity Agent to send an updated Kerberos ticket when you install Access Policy on the Identity Awareness Gateway.
pdp auth reauth_agents_after_policy status
pdp auth reauth_agents_after_policy enable
pdp auth reauth_agents_after_policy disable
Note - On VSX Gateway, run the command in the context of the Virtual System with enabled Identity Awareness Software Blade.
Terminal Servers Identity Agent now supports Microsoft Active Directory cross-forest trust.
This lets you associate users from foreign domains, if these users are members of groups in the local domain.
This feature is enabled by default.
Note - The Terminal Servers Identity Agent works only with Microsoft Active Directory as a user-directory server.