Print Download PDF Send Feedback

Previous

Next

Creating Custom Identity Agents

Custom Identity Agents

You can use the Identity Awareness Configuration Utility to create custom Identity Agent installation packages (the Identity Awareness Configuration Utility - IAConfigTool.exe - is installed as part of Identity Agent). Identity Agents have many advanced configuration parameters. Some of these parameters are related to the installation process, while others are related to Identity Agent functionality. All of the configuration parameters have default values that are deployed with the product and can remain unchanged.

Identity Agent Type

Description

Full

Predefined Identity Agent that includes packet tagging and computer authentication. It applies to all users of the computer, on which it is installed. Administrator permissions are required to use the Full Identity Agent type.

Light

Predefined Identity Agent that does not include packet tagging and computer authentication. You can install this Identity Agent individually for each user on the target computer. Administrator permissions are not required.

Terminal Servers

Predefined Identity Agent that installs Managed Asset Detection (MAD) services and the Multi-user host driver on Citrix and Terminal Servers. This Identity Agent type cannot be used for endpoint computers.

Custom

Lets you configure custom features for all computers that use this agent, such as MAD services and packet tagging.

Installing Microsoft .NET Framework

You must install Microsoft .NET Runtime framework 4.0 or higher before you install and run the Identity Agent Configuration Tool.

To install the .NET Runtime Framework v4.0:

  1. Download the .NET v4.0 installation package.
  2. When prompted to start the installation immediately, click Run.
  3. Follow the instructions on the screen.

Working with the Identity Agent Configuration Tool

Getting the source MSI File

To create a custom Identity Agent installation package, you must first copy the customizable MSI file from the Security Gateway to your management computer. This is the computer, on which you use the Identity Agent Configuration Tool.

To get the customizable MSI file:

  1. Copy this file from the Security Gateway running on Gaia to your management computer:

    /opt/CPNacPortal/htdocs/nac/nacclients/customAgent.msi

  2. Make a backup copy of this file on your management computer with a different name.

    You must use the original copy of the MSI file when you work with the Identity Agent Configuration Tool.

Running the Identity Agent Configuration Tool

You must install Identity Agent v2.0 or above (from Security Gateway R77 or above) on your management client computer. The Configuration Tool is installed in the Identity Agent installation directory.

To install the Identity Agent on your client computer:

  1. Copy these agents from the Security Gateway to your management computer:
    • Full Identity Agent:
      /opt/CPNacPortal/htdocs/nac/nacclients/fullAgent.exe
    • Light Identity Agent:
      /opt/CPNacPortal/htdocs/nac/nacclients/lightAgent.exe
  2. Run one of these executable files as applicable for your environment.
  3. Follow the instructions on the screen.

To run the Identity Agent Configuration Tool:

  1. Go to the Identity Agent installation directory.
    1. Click Start > All Programs > Check Point > Identity Agent.
    2. Right-click the Identity Agent shortcut and select Properties from the menu.
    3. Click Open File Location (Find Target in some Windows versions).
  2. Double-click IAConfigTool.exe.

    The Identity Agent Configuration Tool opens.

Configuring the Identity Agent

You configure all features and options in the Identity Agent Configuration Tool window.

MSI Package Path

Enter or browse to the source installation package. You must use a Check Point customizable MSI file as the source for the configuration tool.

Installation Type

Select whether the Identity Agent applies to one user or to all users of the computer, on which it is installed.

Installation UI

Select one of these end user interaction options:

Identity Agent Type

Select the type of Identity Agent to install:

Custom Features

Select these features for the Custom Identity Agent type:

Copy configuration

Save

Click to save this configuration to a custom MSI file. Enter a name for the MSI file.

Deploying a Custom Identity Agent with the Captive Portal

To deploy a custom Identity Agent with the Captive Portal:

  1. Upload the custom customAgent.msi package to the /opt/CPNacPortal/htdocs/nacclients/ directory on the Security Gateway.
  2. Configure the Captive Portal to distribute the custom Identity Agent:
    1. In SmartConsole, open the Identity Awareness Gateway object.
    2. Go to the Identity Awareness pane.
    3. Click on the Browser-Based Authentication Settings button.
    4. Change the Require users to download value to Identity Agent - Custom.
    5. Click OK.
  3. Install the Access Policy.

Automatic Reconnection to Prioritized PDP Gateways

Identity Agent can now reconnect to the original PDP Security Gateway after it recovers.

To configure the automatic reconnection to a higher-priority PDP Security Gateway:

  1. Configure the PDP Security Gateway:
    1. Connect to the command line on the PDP Security Gateway.
    2. Log in to the Expert mode.
    3. To show the recovery interval value, run:

      pdp auth recovery_interval show

    4. To set the recovery interval value, run:

      pdp auth recovery_interval set <interval between 1 and 864000 seconds>

  2. Install the Access Policy on the PDP Security Gateway.

PDP CLI Reference

Syntax

Description

pdp auth recovery_interval show

Show the recovery interval

pdp auth recovery_interval set <value>

Set the recovery interval value between 1 and 864000 seconds

pdp auth recovery_interval enable

Enable the automatic reconnection to a higher-priority PDP Security Gateway

pdp auth recovery_interval disable

Disable the automatic reconnection to a higher-priority PDP Security Gateway

Notes:

Transparent Kerberos SSO Authentication for Identity Agent

Identity Awareness can now recognize Microsoft group membership data in the Kerberos tickets that are granted by any domain controller configured in SmartConsole.

The Transparent Kerberos SSO Authentication feature is disabled by default.

To configure the Transparent Kerberos SSO Authentication feature on Identity Awareness Gateway:

To configure the Identity Agent to support domains, which are not configured in SmartConsole:

To configure the Identity Agent to send updated Kerberos tickets upon policy installation:

By default, Identity Agent fetches and sends a Kerberos ticket to the Identity Awareness Gateway only during a re-authentication (according to the Identity Agent settings).

You can force the Identity Agent to send an updated Kerberos ticket when you install Access Policy on the Identity Awareness Gateway.

Active Directory cross-forest trust support for Identity Agent

Terminal Servers Identity Agent now supports Microsoft Active Directory cross-forest trust.

This lets you associate users from foreign domains, if these users are members of groups in the local domain.

This feature is enabled by default.

Note - The Terminal Servers Identity Agent works only with Microsoft Active Directory as a user-directory server.