Identity Awareness - Comparison of Acquisition Sources
These tables show how identity sources are different in terms of usage and environment considerations. Based on these considerations, you can configure Identity Awareness Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. to use one or more identity of these identity sources (see Selecting Identity Sources).

Unidentified users log in with a user name and password in a Captive Portal A Check Point Identity Awareness web portal, to which users connect with their web browser to log in and authenticate, when using Browser-Based Authentication.. After authentication, the user clicks a link to go to the destination address.

The Transparent Kerberos An authentication server for Microsoft Windows Active Directory Federation Services (ADFS). Authentication Single-Sign On (SSO) solution transparently authenticates users already logged into the AD. When users authenticate to the domain, they can access all authorized network resources, and do not have to enter credentials again. If Transparent Kerberos Authentication fails, the user is redirected to the Captive Portal for manual authentication.
|
Note - The Identity Agent |

Gets identity data seamlessly from Active Directory (AD).

A lightweight Identity Agent authenticates users securely with Single Sign-On (SSO).

Identifies multiple users, who connect from one IP address. A Terminal Server Identity Agent is installed on the application server, which hosts the terminal/Citrix services.

You can configure an Identity Awareness Gateway to use RADIUS Accounting to get user and computer identities directly from a RADIUS accounting client. Identity Awareness Gateway uses this information to apply access permissions to the connection.
RADIUS Accounting gets identity data from RADIUS Accounting Requests generated by the RADIUS accounting client. Identity Awareness Gateway uses the data from these requests to get user and device group information from the LDAP server. Firewall rules apply these permissions to users, computers and networks.

The Identity Collector Check Point dedicated client agent installed on Windows Servers in your network. Identity Collector collects information about identities and their associated IP addresses, and sends it to the Check Point Security Gateways for identity enforcement. You can download the Identity Collector package from Support Center. See sk134312. is a Windows-based application, which collects identity information and sends it to the Identity Awareness Gateways for identity enforcement.

The Web API is a flexible identity source that you can use for simple integration with 3rd party security and identity products.

Users who get access using IPsec VPN Check Point Software Blade on a Security Gateway that provides a Site to Site VPN and Remote Access VPN access. Office Mode can authenticate seamlessly.