If you do not configure SSO, or you disable it, the Identity Agent uses username and password authentication with a standard LDAP server. SSO transparently authenticates users that log in to the Active Directory domain, and then an Identity Agent identifies them as they use the Identity Agent. Note - Make sure to use the correct Identity Agent for your environment (see Creating Custom Identity Agents). Light Identity Agent type does not require Administrator permissions. You can install this Identity Agent individually for each user on the target computer. In addition, you can leverage computer authentication if you specify computers in Access Roles.ĭefault Identity Agent that does not include packet tagging and computer authentication. For the Full Identity Agent, you can enforce IP spoofing protection. It applies to all users on the computer on which it is installed.Īdministrator permissions are required to use the Full Identity Agent type. that includes packet tagging and computer authentication. You can download the Full and Light Identity Agent package from the Captive Portal - ' or from sk134312. There are two types of Identity Agents - Full and Light. The administrator configures the Identity Agents (not the end users). This Identity Agent acquires and reports identities to the Check Point Identity Awareness Security Gateway. Default Identity Agent Check Point dedicated client agent installed on Windows-based user endpoint computers.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |