Configuring Browser-Based Authentication

For the overview, see Browser-Based Authentication.

In the Identity Sources section of the Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. page, select Browser-Based Authentication to send unidentified users to the Captive PortalClosed A Check Point Identity Awareness web portal, to which users connect with their web browser to log in and authenticate, when using Browser-Based Authentication..

If you configure Transparent KerberosClosed An authentication server for Microsoft Windows Active Directory Federation Services (ADFS). Authentication (see Transparent Kerberos Authentication Configuration), the browser tries to identify AD users before sending them to the Captive Portal.

If you already configured the portal in the Identity Awareness Wizard or SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on., its URL shows below Browser-Based Authentication.

To configure the Browser-Based Authentication settings:

  1. Select Browser-Based Authentication and click Settings.

  2. From the Portal Settings window, configure:

    Note - When you enable Browser-Based AuthenticationClosed Authentication of users in Check Point Identity Awareness web portal - Captive Portal, to which users connect with their web browser to log in and authenticate. on an IPSO Security Gateway that is on an IP Series appliance, make sure to set the Voyager management application port to a port other than 443 or 80.