Selecting Identity Sources
Identity sources have different security and environment considerations. Depending on your organization's requirements, you can choose to set them separately, or as combinations that supplement each other. For information about how Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. prioritizes information it receives from different identity sources, see Identity Conciliation - PDP and Identity Conciliation - PEP.
Here are examples of how to choose identity sources for different organizational requirements:
|
Requirement |
Recommended Identity Source |
||
|---|---|---|---|
|
Logging and auditing with basic enforcement |
AD Query. |
||
|
Logging and auditing only |
AD Query. |
||
|
AD Query and Browser-Based Authentication. The Browser-Based Authentication If you configure Transparent Kerberos |
|||
|
Data Center, or internal server protection |
The options are:
|
||
|
Terminal Servers and Citrix environments |
Terminal Servers. Tells you to install the Terminal Servers Identity Agent on each Terminal Server. |
||
|
Users that get an access to the organization through VPN |
Remote Access. Lets you identify Mobile Access |
||
|
Environment that use a RADIUS server for authentication |
RADIUS Accounting. Make sure that you configure the Security Gateway |