How the Security Gateway Searches for Users

If you configure authentication for a blade from the main Security GatewayClosed Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. Legacy Authentication page, the Security Gateway searches for users in a standard way when they try to authenticate.

The Security Gateway searches in this order:

  1. The internal users database.

  2. If the specified user is not defined in this database, the Security Gateway queries the User DirectoryClosed Check Point Software Blade on a Management Server that integrates LDAP and other external user management servers with Check Point products and security solutions. (LDAP) servers defined in the Account Unit one at a time, and according to their priority.

    If more than one Account Unit exists, the Security Gateway searches in all at the same time. .With multiple servers, the priority for servers can be set only in the scope of one account unit, but not between several account units.

  3. If the information still cannot be found, the Security Gateway uses the external users template to see if there is a match against the generic profile. This generic profile has the default attributes applied to the specified user.