 Show me the Videos
 Copyright Notice
 Important Information
 Security Management Administration Guide
 Terms
 Welcome
 Getting Started
 Managing Administrator Accounts
 Managing Gateways
 Managing Objects
 Managing Policies
 Creating an Access Control Policy
 Creating a Threat Prevention Policy
 Managing User Accounts
 Authentication Methods for Users and Administrators
 Configuring Authentication Methods for Users
 User Database
 Managing User Groups
 LDAP and User Directory
 User Directory and Identity Awareness
 User Directory Considerations
 The User Directory Schema
 Check Point Schema for LDAP
 User Directory Profiles
 Microsoft Active Directory
 Retrieving Information from a User Directory Server
 Deploying User Directory
 Enabling User Directory
 Account Units
 Working with LDAP Account Units
 Modifying the LDAP Server
 Account Units and High Availability
 Setting High Availability Priority
 Authenticating with Certificates
 Managing Users on a User Directory Server
 Access Roles
 Authentication Rules
 Client Certificates for Smartphones and Tablets
 Preferences and Management Settings
 Management High Availability
 The ICA Management Tool
 Command Line Reference
|