How To Enable LDAP Authentication: Classification: (Protected)
How To Enable LDAP Authentication: Classification: (Protected)
Authentication
Classification: [Protected]
1
© 2014 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright and distributed under licensing
restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be
reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has
been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This
publication and features described herein are subject to change without notice.
RESTRICTED RIGHTS LEGEND:
Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the
Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19.
TRADEMARKS:
Refer to the Copyright page (http://www.checkpoint.com/copyright.html) for a list of our trademarks. Refer to
the Third Party copyright notices (http://www.checkpoint.com/3rd_party_copyright.html) for a list of relevant
copyrights and third-party licenses.
2
How To Enable LDAP Authentication
Objective
This document explains the configuration of External Authentication to an LDAP (Active Directory) Server.
Details
Supported Versions
R75.40 to R77.xx
(This article was written using R77.)
Supported OS
Security Management: Windows, SecurePlatform, GAIA
Security Gateway: Windows, SecurePlatform, GAIA, IPSO
3
How To Enable LDAP Authentication
4
How To Enable LDAP Authentication
5
How To Enable LDAP Authentication
3. From Profile, select the profile that best matches your LDAP architecture.
4. Enter the domain of the LDAP server.
5. Click CRL retrieval and User management.
6. Click Enable Unicode support, if necessary.
7. Open Servers.
6
How To Enable LDAP Authentication
8. Click Add and then New (unless there is a host object already defined).
9. In Username, enter the login name of the admin account.
10. In Login DN, enter the full DN of the admin account.
For example: cn=UserAccount,cn=users,DC=Testdoamin,DC=org
The Login DN is for the Firewall. It must have administrator privileges, to be able to fetch user data from
the LDAP.
11. Enter the admin password.
12. OPTIONAL: You can enable SSL encryption between the Security Gateway and the LDAP server. If you
do, you must configure the LDAP server for this too. See your LDAP documentation on enabling LDAPs
(LDAP over SSL).
13. Make sure the port is the default 389.
14. Click OK.
In versions R65 and earlier, select Early Versions Compatibility server.
15. Open Objects Management.
7
How To Enable LDAP Authentication
8
How To Enable LDAP Authentication
19. Make sure that Use common group path for queries is not selected.
20. Make sure that Allowed authentication schemes > Check Point Password is selected.
21. In User’s default values, click Use user template and select the template created earlier.
22. OPTIONAL: Click Limit login failures and define the number of login attempts before account locking.
23. Click OK.
24. If you have multiple LDAP Servers (Domain controllers), repeat the steps to add your servers. For each
LDAP server object, make sure that the Default Priority value is unique among the servers.
9
How To Enable LDAP Authentication
Create Security Rules that use External LDAP User Group in the Security Policy:
The most common use of this configuration is for Remote Access VPN. You can also create legacy Client
Authentication rules with the same LDAP User Groups.
For a Remote Access VPN, right-click the Source column and select Add Objects > Add Legacy Users
Access. Make sure the LDAP group is in the Remote Access VPN community.
For a Client Auth rule, right-click the Action column and select Legacy and Client Auth.
10
How To Enable LDAP Authentication
Verifying
Test communication between the gateway and the LDAP server. Run:
ldapsearch -h <LDAP server IP> -D "cn=<your CN>,cn=users,dc=<your DC>,dc=com" -b
"dc=<your DC2>,dc=com" -w <password> "cn=*" > ldap.out
See that the data is taken from the server and in the output file.
Test the features that you require users to authenticate. Users login with LDAP login name and password as
normal.
For example, if you configured Remote Access VPN: When building the VPN site on the client machine, the
authentication method is “Username and Password”. When connecting, the user will use their LDAP
credentials.
If you configured Client Auth rules, the user will use their LDAP credentials when prompted by the security
gateway.
11