Creating a User Account with RADIUS Server Authentication
Remote Authentication Dial-In User Service (RADIUS) is an external authentication method that provides security and scalability by separating the authentication function from the access server.
With RADIUS, the Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. lets you control access privileges for authenticated RADIUS users, based on the administrator's assignment of users to RADIUS groups. These groups are used in the Security Rule Base
All rules configured in a given Security Policy. Synonym: Rulebase. to restrict or give users access to specified resources. Users are unaware of the groups to which they belong.
The Security Gateway forwards authentication requests by remote users to the RADIUS server. The RADIUS server, which stores user account information, does the authentication.
The RADIUS protocol uses UDP to communicate with the Security Gateway.
To use RADIUS groups, you must define a return attribute in the RADIUS user profile of the RADIUS server. This attribute is returned to the Security Gateway and contains the group name (for example, RAD_<group to which the RADIUS users belong>) to which the users belong.
For the Gaia Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems. operating system, use the attribute "Vendor-Specific" (26) - refer to RFC 2865.
To learn how to configure a RADIUS server, refer to the vendor documentation.
Users can perform RADIUS authentication through a RADIUS server or a RADIUS server group. A RADIUS server group is a high availability group of identical RADIUS servers which includes any or all the RADIUS servers in the system. When you create the group, you define a priority for each server in the group. If the server with the highest priority fails, the one with the next highest priority in the group takes over, and so on. If you assign the same priority to all RADIUS servers, the Security Gateway will randomly select one of them for authentication.
After you configure authentication with a RADIUS server, you can, in addition, configure authentication with a certificate file. The user can then authenticate to the Security Gateway with the RADIUS server or the certificate file.
Configuring RADIUS Authentication for a User
-
In SmartConsole, configure a new RADIUS Server object
-
In the top right corner, click the Objects panel.
-
Click New > More > Server > RADIUS.
-
In the top field, enter the applicable object name.
-
Optional: Enter the comment.
-
In the Host field, click the drop-down arrow, click New.
-
Create a New Host with the IP address of the RADIUS server. Click OK.
-
Make sure that this host shows in the Host field of the New RADIUS window.
-
In the Service field, leave the default value RADIUS.
-
In the Shared Secret field, enter the secret key that you defined previously on the RADIUS server.
-
In the Version field, leave the default value RADIUS Ver. 1.0.
-
In the Protocol field, leave the default value PAP.
-
In the Priority field, leave the default value 1.
-
Click OK.
-
Publish the SmartConsole
Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. session.
-
-
Create a new user and select RADIUS as the authentication method
-
In the top right corner, click the Objects panel.
-
Click New > More > User/Identity > User.
The New User window opens.
-
Choose the applicable user template and click OK.
-
In the top field, enter the applicable object name.
This must be a unique, case sensitive character string.
If you generate a user certificate with a non-Check Point Certificate Authority, enter the Common Name (CN) component of the Distinguished Name (DN).
For example:
If the DN is:
CN = James, O = My Organization, C = My Country
then enter
James
as the user name.If you use Common Names as user names, they must contain exactly one string with no spaces.
-
Optional: Enter the comment.
-
On the General page, configure the applicable settings:
-
Email address (optional)
-
Mobile phone number (optional)
-
Expire at
This is the date, after which the user is no longer authorized to access network resources and applications.
The default expiration date is configured in > Global Properties > User Accounts > Expiration Date.
-
-
On the Groups page, you can select the applicable user group objects (in addition or instead those configured in the user template).
-
On the Authentication page:
-
In the Authentication method field, select RADIUS.
-
In the RADIUS server field, leave the default value Any or select the applicable RADIUS server object.
Important - If you do not select an authentication method, the user cannot log in or use network resources.
-
-
On the Location page:
-
Configure the allowed sources from which this user can access or send data and traffic.
These objects must already exist before you can select them.
-
Configure the allowed destinations to which this user can access or send data and traffic.
These objects must already exist before you can select them.
-
-
On the Time page:
If the user has specific working days or hours, you can configure when the user can be authenticated for access.
-
From and To - Enter start time and end time of an expected workday. This user will not be authenticated if a login attempt is made on a time outside the given range.
-
Days in week or Daily - Select the days on which the user can authenticate and access resources. This user will not be authenticated if a login attempt is made on an unselected day.
-
-
On the Certificates page:
You can configure the applicable certificates for this user for more secured access control.
-
Click New.
-
Select the applicable option:
-
Registration Key for certificate enrollment
Sends a registration key that activates the certificate.
-
Enter the number of days the user has to activate the certificate, before the registration key expires.
-
Optional: Enter a comment.
-
Optional: Click Template to preview the email template.
-
Click Send.
-
Click OK to save this key.
-
-
Certificate file (p12)
Creates a
*.p12
certificate file with a private password for the user.-
Enter and confirm the certificate password.
A password is required to protect the sensitive data in the certificate file.
-
Optional: Enter a comment.
-
Click OK.
-
Wait for the Save As window to open.
-
In the File name field, make sure to include the username.
-
In the Save as type field, select Certificate Files (*p12).
The certificate file is in the PKCS #12 format, and has a
.p12
extension. -
Browse to a secure location on the SmartConsole computer.
-
Click Save.
-
Give the user this file and password.
-
-
-
Click OK.
Notes:
-
If a user will not be in the system for some time (for example, going on an extended leave), you can revoke the certificate. This leaves the user account in the system, but it cannot be accessed until you renew the certificate.
-
To revoke a key / certificate, select the key / certificate and click Revoke.
-
-
On the Encryption page:
You can configure the IKEv2 authentication and encryption settings for Remote Access VPN.
-
Select IKE.
-
Click Edit.
The encryption IKE Phase 2 Properties window opens.
-
On the Authentication page, select the authentication schemes:
-
Password - The user authenticates with a pre-shared secret password.
-
Public Key - The user authenticates with a public key contained in a certificate file.
-
-
On the Encryption page, there are no settings to configure.
Youy configure these algorithms in SmartConsole > Global Properties > Remote Access > VPN - Authentication > section Encryption algorithms.
-
Click OK.
-
-
Click OK.
-
-
Optional: Configure a RADIUS server group for SmartConsole user authentication
-
In SmartConsole, configure all the servers that you want to include in the server group. For each server, enter its priority in the group. The lower the number is, the higher the priority. For example, if you create a group with 3 servers, with priorities 1,2 and 3, the server with number 1 is approached first, the server with number 2 second, and the server with number 3, third.
-
Create the server group:
In SmartConsole, go to Object Explorer and click New > Server > More > RADIUS Group.
-
Configure the group properties and add servers to the group:
-
Give the group a Name. It can be any name.
-
Click the plus (+) for each server you want to add, and select each server from the drop-down list.
-
Click OK.
-
Publish the SmartConsole session.
-
-
Add a new user.
-
Publish the SmartConsole session.
-
Install the Access Control Policy.
-
Granting User Access Using RADIUS Server Groups
The Security Gateway lets you control access privileges for authenticated RADIUS users, based on the assignment of users to RADIUS groups. These groups are used in the Security Policy Collection of rules that control network traffic and enforce organization guidelines for data protection and access to resources with packet inspection. to restrict or give users access to specified resources. Users are unaware of the groups to which they belong.
To use RADIUS groups, you must define a return attribute in the RADIUS user profile of the RADIUS server. This attribute is returned to the Security Gateway and contains the group name (for example, RAD_<group to which the RADIUS users belong>) to which the users belong.
Use the RADIUS attribute "Vendor-Specific
" (26). Refer to RFC 2865.