Configuring Identity Awareness Gateway as an Active Directory Proxy

If a Security Management ServerClosed Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. is not currently connected to your Active Directory environment, an Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. Gateway can work as Active Directory Proxy. This let you use the Identity Awareness User Picker in an Access RoleClosed Access Role objects let you configure network access according to: Networks, Users and user groups, Computers and computer groups, Remote Access Clients. After you activate the Identity Awareness Software Blade, you can create Access Role objects and use them in the Source and Destination columns of Access Control Policy rules. object in SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. (see Using Identity Awareness in the Firewall Rule Base). To work as an Active Directory Proxy, the Identity Awareness Gateway must be connected to your Active Directory server.

Known Limitations

Configuring an Identity Awareness Gateway as an Active Directory Proxy

Procedure:

  1. Create a new Host object for each Active Directory Domain Controller in your Active Directory environment:

    1. In the top left corner, click Objects > New Host.

    2. Configure the object name and IP address.

    3. Click OK.

  2. Install the Access Control Policy on the Identity Awareness Gateway.

  3. Configure an LDAP Account Unit object:

    1. In the top left corner, click Objects > Object Explorer.

      The Object Explorer window opens.

    2. In the left navigation tree, click Servers.

    3. From the toolbar, click New > More > User/Identity > LDAP Account Unit.

      The LDAP Account Unit Properties window opens.

    4. Configure properties on each tab in the window.

    5. Click OK to complete the configuration of the new LDAP Account Unit object and to close the LDAP Account Unit Properties window.

(Optional) Configuring the Security Gateway to Encrypt the LDAP Connection with your Domain Controller

Procedure:

  1. Open the LDAP Account Unit object you configured in Step 3.

  2. Go to the Servers tab.

  3. Select the LDAP Server object and click Edit.

  4. Go to the Encryption tab.

  5. Select Use Encryption (SSL).

  6. In the Verify that server has the following Fingerprints field, enter the Active Directory server fingerprint you get from the Identity Awareness Gateway.

  7. Click OK to close the LDAP Account Unit Properties window.