Selecting Identity Sources
Identity sources have different security and environment considerations. Depending on your organization requirements, you can choose to set them separately, or as combinations that supplement each other.
These are the priorities of the different Identity Sources:
-
Remote Access
-
Identity Agent, Terminal Servers Identity Agent
-
Captive Portal, Identity Collector
Check Point dedicated client agent installed on Windows Servers in your network. Identity Collector collects information about identities and their associated IP addresses, and sends it to the Check Point Security Gateways for identity enforcement. You can download the Identity Collector package from Support Center. See sk134312., RADIUS Accounting, Identity Awareness
Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. API
-
AD Query