SAML Authentication in Remote Access VPN Clients
SAML Authentication in Remote Access VPN Clients
My Favorites
Version
R80.40, R81, R81.10, R81.20
Last Modified
2023-09-19
Solution
Overview
This article describes the configuration of SAML (Security Assertion Markup Language) for Remote Access VPN (Endpoint Security Client on Windows
OS and macOS).
SAML support provides a Multi-Factor Authentication method defined by the policy of the Identity Provider. Authorization is based on groups defined in an
Privacidad - Términos
For the list of the limitations, see the Remote Access VPN Administration Guide for the version of the Management Server.
Requirements
Endpoint Security Client for Windows - version E84.70 build 986102705 or higher
R80.40 with the R80.40 Jumbo Hotfix Accumulator, Take 114 or higher
R80.40 with the R80.40 Jumbo Hotfix Accumulator, Take 114 or higher
4. SmartConsole:
If using Smart-1 Cloud, contact Check Point Support to have enabled on your Tenant and provide the Tenant ID.
For the detailed procedure, see the Remote Access VPN Administration Guide for the version of the Management Server > chapter "SAML Support for
Remote Access VPN".
Notes:
Download the Script to Allow Remote Access VPN for Security Gateways R80.40 and higher and run on the Management Server. See the Remote
Access VPN Administration Guide for the version of the Management Server > chapter "SAML Support for Remote Access VPN" > section
"Configure the Identity Provider as an Authentication Method".
For Azure AD Identity Provider, we recommend to watch the Overview and configuration of SAML for a VPN Remote Access solution.
If it is necessary to use the same Identity Provider for multiple Software Blades (Mobile Access, Remote Access, Identity Awareness) on an R80.40
Security Gateway, then you must install the R80.40 Jumbo Hotfix Accumulator Take 119 or higher.
If you are implementing SAML for different gateways, you will need separate IDP object per gateway, per service (Remote Access, Mobile Access,
Identity Awareness).
Symptom
Remote Access service does not appear in the Identity Provider object.
Cause
JS
SAML for Remote Access VPN was not implemented correctly.
Solution
1. Make sure the versions / Jumbo Hotfix Accumulator takes of the Management Server and Security Gateways support SAML for Remote Access
VPN. For more information, see the Remote Access VPN Administration Guide for the version of the Management Server > chapter "SAML Support
for Remote Access VPN" > heading "Requirements".
2. If the version of at least one Security Gateway is R81.10 or lower, you must run a script on the Management Server to use the feature. For more
information, see the Remote Access VPN Administration Guide for the version of the Management Server > chapter "SAML Support for Remote
Access VPN" > heading "Configure the Identity Provider as an Authentication Method".
4. When making the Identity Provider object, if you can not have "Remote Access" as a service option.
a. Verify the URL in the SAML portal settings in the gateway object.
i. If using a 3rd party Certificate. The URL must match the Certificate FQDN,
iii. Note, the SAML portal settings URL must relate to your external interface set in IPSec Link Selection.
b. If the "Remote Access" service is not in the IDP object, verify that the gateway is in the RA community and selected in the IDP object.
5. If steps 1-4 are verified correctly, and the Remote Access Service is still not showing up, then install database to the management server.
Case 2: Policy installation fails when an Authentication method is defined with a Identity Provider
Symptoms
Policy installation fails when an Authentication method is defined with a Identity Provider.
This error message appears: "VPN Clients -> Settings section cannot contain multiple login option object that uses an identity provider as an
authentication method. R81 and below gateways are not supported with identity providers for VPN Clients Authentication. Please refer to SK172909".
Cause
JS
The SAML Authentication Feature was not enabled on the Management Server for managed gateways running R81.10 or lower.
Please run the above script from section "Requirements", step "5. Script to add SAML" on the management server"
Solution
Run the required script on the Management Server. For more information, see the Remote Access VPN Administration Guide for the
version of the Management Server > chapter "SAML Support for Remote Access VPN" > heading "Configure the Identity Provider as an
Authentication Method".
If this is a Smart-1 Cloud Environment contact Check Point Support to run the script on your Smart-1 Cloud Tenant.
For faster resolution please provide your Tenant ID when you open a case.
Article Properties
Access Level
Advanced
Date Created
2021-04-05
Last Modified
2023-09-19
Was this page helpful? Yes No JS
Follow Us
™
YOU DESERVE THE BEST SECURITY