Scaled Identity Sharing

Scaled Identity Sharing is an improved way for Policy Decision Point (PDPClosed Check Point Identity Awareness Security Gateway that acts as Policy Decision Point: acquires identities from identity sources; shares identities with other gateways.) Identity AwarenessClosed Check Point Software Blade on a Security Gateway that enforces network access and audits data based on network location, the identity of the user, and the identity of the computer. Acronym: IDA. Gateways to share identity information with Policy Enforcement Point (PEPClosed Check Point Identity Awareness Security Gateway that acts as Policy Enforcement Point: receives identities via identity sharing; redirects users to Captive Portal.) Gateways. With Scaled Sharing, you can create simple configurations to share identities from a PDP to up to 300 PEPs. Scaled Sharing simplifies the user experience of Check Point administrators, reduces hardware cost, and reduces maintenance burden.

Scaled Sharing uses the industry standard TLS protocol. The older Identity Sharing method uses the Check Point proprietary SICClosed Secure Internal Communication. The Check Point proprietary mechanism with which Check Point computers that run Check Point software authenticate each other over SSL, for secure communication. This authentication is based on the certificates issued by the ICA on a Check Point Management Server. protocol. The new Scaled Identity Sharing (TLS-based) and the older Identity Sharing mechanism (SIC-based) are both supported.

With TLS-based Scaled Sharing, a PDP can directly share identities with a PEP located in a different Management Domain managed by the same Multi-Domain Security Management. With SIC-based Identity Sharing, sharing between Management Domains is possible only with additional configuration of an Identity BrokerClosed Identity Sharing mechanism between Identity Servers (PDP): (1) Communication channel between PDPs based on Web-API (2) Identity Sharing capabilities between PDPs - ability to add, remove, and update the identity session. Gateway. By removing the need for an Identity Broker, Scaled Sharing greatly simplifies sharing across Management Domains.

Comparison between Identity Sharing (SIC-based) and Scaled Identity Sharing (TLS-based)

 

Identity Sharing (SIC-based)

Scaled Sharing (TLS-based)

Protocol used for communication between PDP and PEP

SIC - Check Point proprietary protocol, uses Check Point certificates

TLS - Industry standard protocol, uses TLS certificates

Number of PEPs supported for each PDP

20 PEPs for each PDP

300 PEPs for each PDP

Identity Sharing between PDP and PEP located in different Management Domains

Supported only using Identity Broker, which adds additional configuration and computational load.

Simple configuration in Management CLI and SmartConsoleClosed Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. for sharing between Domains managed by the same Multi-Domain Security Management.

Comparison of Topology for SIC-based and TLS-based Identity Sharing

SIC-based Identity Sharing - Example Topology

In a SIC-based Identity Sharing configuration, several PDP Identity Broker Gateways may be required to share identities with PEP Gateways. Identity Brokers are needed to process a large number of identities, and share with many PEP Gateways, and share identities with PEP Gateways in a different Management Domain. Administrators must manage and monitor each of the PDP Identity Broker Gateways.

TLS-based Scaled Sharing - Example Topology

In a typical TLS-based Scaled Sharing configuration, a single PDP can share identities with many PEPs. No Identity Broker is needed. Fewer Security Gateways are needed to handle the same load. This reduces hardware costs and administrative burden.

Comparison of Communication between PDP and PEP for SIC-based Identity Sharing and TLS-based Scaled Identity Sharing

SIC-based Identity Sharing: Communication between PDP and PEP

In SIC-based Identity Sharing, there are two separate communication channels between the PDP and each PEP. In the "Networks registration" channel, the PEP queries the PDP for information about IP address ranges. In the "Identity Propagation" channel, the PDP sends information about users on these networks to the PEP.

TLS-based Scaled Sharing: Communication between PDP and PEP

In TLS-based Scaled Identity Sharing, there is one communication channel between the PDP and each PEP. The PDP is a TLS server, and the PEP is a TLS client. This communication is simpler than the two channels used in SIC-based Identity Sharing.

Scaled Sharing Prerequisites and Known Limitations

Scaled Sharing Prerequisites

Note - If the PDP Gateway or the PEP Gateway does not support Scaled Sharing, then the Gateways automatically use SIC-based Identity Sharing.

Scaled Sharing Known Limitations

Enabling Scaled Identity Sharing in the same Management Domain

  • Scaled Sharing must be enabled on all participating PDP and PEP Gateways.

  • Scaled Identity Sharing for PDP Gateways in different Management Domains

    Scaled Identity Sharing supports identity sharing between a PDP and a PEP that are in different Management Domains in the same Multi-Domain Security Management. To share identities between a PDP and a PEP that are managed by different Multi-Domain Security Management Servers, use Identity Broker.

    Monitoring Scaled Sharing

    This section includes monitoring that is specific to Scaled Sharing. Monitoring of the connection between the PDP Gateway and the PEP Gateway is the same for Scaled Sharing and for SIC-based Identity Sharing (see Monitoring Identity Sharing.

    Disabling Scaled Identity Sharing

    After you disable Scaled Sharing, the PDP uses SIC-based Identity Sharing. Configurations of PEP Gateways in the same Management Domain are preserved. Configurations of PEP Gateways in a different Domain are not preserved.