Configuring Users on an External LDAP Server
LDAP is an external identity integration technology supported by Check Point Quantum.
An LDAP provides these capabilities:
-
The Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. can use the LDAP data to authenticate and authorize users.
-
The Security Gateway can retrieve CRLs when using certificate information.
Other identity integration options include: Check Point Quantum management internal user database, Entra ID, and Check Point Infinity Identity.
Microsoft Active Directory
For an overview of Microsoft Active Directory, see Active Directory Domain Services.
The branch CN=Schema, CN=Configuration, DCROOT
contains all schema definitions.
Check Point can take advantage of an existing Active Directory object as well as add new types. For users, the existing user can be used "as is" or be extended with fw1person
as an auxiliary of "User" for full feature granularity. The existing Active Directory "Group" type is supported "as is". A User Directory Check Point Software Blade on a Management Server that integrates LDAP and other external user management servers with Check Point products and security solutions. template can be created by adding the
fw1template
object-class. This information is downloaded to the directory using the schema_microsoft_ad.ldif
file (see Adding New Attributes to the Active Directory).
Performance
For certain Software Blades, the information which is related to the Active Directory group-is stored in the user object. Therefore, when fetching the user object, no additional query is necessary in order to assign the group to the user. The same is true for users and templates. In some cases, The Security Gateway sends additional queries. See sk128212.
Manageability
SmartDashboard Legacy Check Point GUI client used to create and manage the security settings in versions R77.30 and lower. In versions R80.X and higher is still used to configure specific legacy settings. allows the creation and management of existing and new objects. However, some specific Active Directory fields are not enabled in SmartDashboard.
Enforcement
You can work with the existing Active Directory objects without extending the schema. This is made possible by defining an Internal Template object and assigning to it the User Directory Account Unit defined on the Active Directory server.
For example, if you wish to enable all users with IKE+Hybrid based on the Active Directory passwords, create a new template with the IKE properties enabled and "Check Point password" as the authentication method.
Updating the Registry Settings
To modify the Active Directory schema, add a new registry DWORD key named Schema Update Allowed
with the value different from zero under HKLM\System\CurrentControlSet\Services\NTDS\Parameters
.
Delegating Control
Delegating control over the directory to a specific user or group is important because by default the system administrator is not allowed to modify the schema or even manage directory objects through User Directory protocol.

-
On the Domain Controller, open the Active Directory Users and Computers Control console.
-
Right-click the domain name displayed in the left pane and select Delegate control from the right-click menu.
The Delegation of Control wizard window is displayed.
-
Add a user or a group to the list of users who can control the directory.
-
Reboot the machine.
Extending the Active Directory Schema
Modify the file with the Active Directory schema, to use SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. to configure the Active Directory users.
To extend the Active Directory schema
-
From the Security Gateway, go to the directory of the schema file:
$FWDIR/lib/ldap
. -
Copy
schmea_microsoft_ad.ldif
to the C:\ drive in the Active Directory server. -
From Active Directory server, with a text editor open the schema file.
-
Find the value
DOMAINNAME
, and replace it with the name of your domain in LDIF format.For example, the domain
sample.checkpoint.com
in LDIF format is:DC=sample,DC=checkpoint,DC=com
-
Make sure that there is a dash character
-
at the end of themodify
section.This is an example of the
modify
section.dn: CN=User,CN-Schema,CN=Configuration,DC=sample,DC=checkpoint,DC=com
changetype: modify
add: auxiliaryClass
auxiliaryClass: 1.3.114.7.3.2.0.2
-
-
Run:
ldifde -i -f c:/schema_microsoft_ad.ldif
Adding New Attributes to the Active Directory
Below is an example in LDAP Data Interchange (LDIF) format which shows how to add one attribute to the Microsoft Active Directory:
|
You can add all Check Point attributes in the same way.
The definitions of all attributes in LDIF format are contained in the schema_microsoft_ad.ldif
file located in the $FWDIR/lib/ldap
directory.
Before attempting to run the ldapmodify
command, edit schema_microsoft_ad.ldif
and replace all instances of DCROOT
with the domain root of your organization. For example, if your domain is support.checkpoint.com
, replace DCROOT
with dc=support,dc=checkpoint,dc=com
.
After modifying the file, run the ldapmodify
command to load the file into the directory. For example if you use the system administrator account of the dc=support,dc=checkpoint,dc=com domain
, the command syntax will be as follows:
|
Note - A shell script is available for UNIX gateways. The script is at: |
|
Updating the user or service account password to the LDAP account unit on the Active Directory
Security Gateways authenticate to the LDAP server using the LDAP server user name and password saved in the SmartConsole LDAP account unit. After establishing a connection to the LDAP server from a Security Gateway, the Security Gateway reuses this connection to transmit subsequent LDAP queries without undergoing reauthentication.
If you update the password in the Active Directory on the LDAP server, you must do these steps for the changes to apply:
-
Update the information in the LDAP account unit.
-
Install policy.