Check Point Userauthority Guide
Total Page:16
File Type:pdf, Size:1020Kb
Check Point UserAuthority Guide Version NGX R62 700358 January 2006 © 2003-2006 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright and distributed under licensing restricting their use, copying, distribution, and decompilation. No part of this product or related documentation may be reproduced in any form or by any means without prior written authorization of Check Point. While every precaution has been taken in the preparation of this book, Check Point assumes no responsibility for errors or omissions. This publication and features described herein are subject to change without notice. RESTRICTED RIGHTS LEGEND: Use, duplication, or disclosure by the government is subject to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS 252.227-7013 and FAR 52.227-19. TRADEMARKS: ©2003-2006 Check Point Software Technologies Ltd. All rights reserved. Check Point, Application Intelligence, Check Point Express, the Check Point logo, AlertAdvisor, ClusterXL, ConnectControl, Connectra, Cooperative Enforcement, Cooperative Security Alliance, CoSa, DefenseNet, Eventia, Eventia Analyzer, Eventia Reporter, FireWall-1, FireWall -1 GX, FireWall-1 SecureServer, FloodGate-1, Hacker ID, IMsecure, INSPECT, INSPECT XL, Integrity, InterSpect, IQ Engine, NGX, Open Security Extension, OPSEC, OSFirewall, Policy Lifecycle Management, Provider-1, Safe@Office, SecureClient, SecureKnowledge, SecuRemote, SecurePlatform, SecureServer, SecureUpdate, SecureXL, SecureXL Turbocard, SiteManager-1, SmartCenter, SmartCenter Power, SmartCenter Pro, SmartCenter UTM, SmartDashboard, SmartDefense, SmartDefense Advisor, Smarter Security, SmartLSM, SmartMap, SmartUpdate, SmartView, SmartView Monitor, SmartView Reporter, SmartView Status, SmartViewTracker, SofaWare, SSL Network Extender, Stateful Clustering, TrueVector, Turbocard, UAM, UserAuthority, User-to-Address Mapping, VPN-1, VPN-1 Accelerator Card, VPN-1 Edge, VPN-1 Power, VPN-1 Power VSX, VPN-1 Pro, VPN-1 SecureClient, VPN-1 SecuRemote, VPN-1 SecureServer, VPN-1 UTM, VPN-1 UTM Edge, VPN-1 VSX, Web Intelligence, ZoneAlarm, ZoneAlarm Anti-Spyware, ZoneAlarm Antivirus, ZoneAlarm Internet Security Suite, ZoneAlarm Pro , Zone Labs, and the Zone Labs logo are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. Patent No. 5,606,668, 5,835,726, 6,496,935, 6,873,988, and 6,850,943 and may be protected by other U.S. Patents, foreign patents, or pending applications. For third party notices, see: THIRD PARTY TRADEMARKS AND COPYRIGHTS. Contents Preface Who Should Use This Guide.............................................................................. 10 Summary of Contents....................................................................................... 11 Appendices ................................................................................................ 12 Related Documentation .................................................................................... 13 More Information ............................................................................................. 15 Chapter 1 Introduction The Need for UserAuthority............................................................................... 18 Identity-based Access Control for Outbound Connections via VPN-1 Power Gateway 19 Underlying Concept and Advantage ................................................................... 20 Typical Deployment.......................................................................................... 21 UserAuthority SSO for VPN-1 Power Deployment ........................................... 21 OPSEC Protocols ............................................................................................. 23 How to Use this Guide...................................................................................... 24 Chapter 2 UserAuthority Deployments and Installation Overview ......................................................................................................... 26 Deployments ................................................................................................... 27 Outbound Access Control............................................................................. 27 Citrix MetaFrame or Windows Terminal Services............................................. 32 Installation and Configuration ........................................................................... 35 Installing and Configuring UAS on VPN-1 Power ............................................ 35 Installing and Configuring the UAS on the Windows DC .................................. 46 Chapter 3 Outbound Access Control The Challenge ................................................................................................. 58 The UserAuthority Solution ............................................................................... 59 Identification using SecureAgent.................................................................. 61 Identity Sharing.......................................................................................... 61 Retrieving Windows Groups with UserAuthority ................................................... 66 Outbound Access Control using Citrix Terminals as TIP ....................................... 67 Scenario - An Organization using Multiple Windows DCs...................................... 68 Scenario - An Organization Using Multiple Domains ............................................ 70 Configurations ................................................................................................. 72 Adding Additional Windows DCs................................................................... 72 Outbound Access Control on Citrix or Windows Terminals ............................... 73 Configuring UserAuthority Domain Equality ................................................... 73 Chapter 4 User Management in UserAuthority Overview ......................................................................................................... 78 Table of Contents 5 Managing Users and Groups ............................................................................. 79 Users in UserAuthority ................................................................................ 79 User Groups in UserAuthority....................................................................... 79 Using a Local Check Point Database.................................................................. 81 Using an External Database .............................................................................. 82 Using the Windows User Identity....................................................................... 83 Users in the Windows Domain...................................................................... 83 Configuring UserAuthority to Recognize Windows User Groups ........................ 83 Chapter 5 Auditing in UserAuthority Overview ......................................................................................................... 86 Using Logs for Auditing .................................................................................... 87 Auditing Outbound Traffic Using UserAuthority Outbound Access Control......... 88 Configuring UserAuthority for Auditing............................................................... 92 Configuring Auditing of Requests for External Resources ................................ 92 Chapter 6 High Availability and Load Balancing Overview ......................................................................................................... 93 High Availability ......................................................................................... 93 Load Balancing........................................................................................... 94 High Availability and Load Balancing in UserAuthority.................................... 94 Using Multiple Windows DCs ............................................................................ 95 Using a VPN-1 Power Cluster............................................................................ 96 Using VPN-1 Power Clusters ........................................................................ 96 Synchronizing the Credentials Manager......................................................... 96 Chapter 7 UserAuthority CLIs Chapter 8 UserAuthority OPSEC APIs Overview ....................................................................................................... 108 Programming Model....................................................................................... 109 Defining a UAA Client ............................................................................... 112 Client Server Configuration ........................................................................ 112 OPSEC UserAuthority API Overview ............................................................ 112 Function Calls ............................................................................................... 123 Session Management ................................................................................ 123 Assertions Management............................................................................. 124 Managing Queries ....................................................................................