/

Check Point

Check Point

The Check Point integration enables biometric authentication via SAML 2.0 for Security Gateways, covering both Identity Awareness (captive portal) and Remote Access VPN (Mobile Access).

Integration type

SSO

Updated

Overview

1Kosmos integrates with Check Point Security Gateways as a SAML 2.0 identity provider, enabling users to authenticate biometrically through the 1Kosmos mobile app before accessing resources protected by Check Point Identity Awareness or Remote Access VPN. The integration covers both Identity Awareness (captive portal browser-based authentication) and Mobile Access (VPN authentication via Endpoint Security VPN or Secure Remote Access clients).

SAML identity provider configuration in Check Point is performed in SmartConsole. For each gateway and service combination, SmartConsole automatically generates a unique Entity ID and Reply URL.

These values are then entered into AdminX when adding Check Point as a SAML application. The 1Kosmos metadata or IdP values are imported into the Check Point Identity Provider object to complete the trust relationship.

For environments without an on-premises LDAP directory, a generic external user profile must be configured in SmartConsole to allow SAML-authenticated users without individual AD records to receive appropriate access policies.


Prerequisites

  • Active 1Kosmos tenant: Administrator access to the AdminX portal. Contact 1kosmos.com/contact if not yet provisioned.

  • Check Point SmartConsole access: SmartConsole R81 or later with access to Gateways and Servers and the Identity Awareness or Mobile Access blade enabled on the target Security Gateway.

  • Supported Check Point version: SAML identity provider support requires R81 or later for Identity Awareness. For Remote Access VPN (Mobile Access portal), confirm your gateway version supports SAML authentication via the Check Point release notes.

  • External user profile (if not using LDAP): A generic external user profile (generic*) must exist in SmartConsole for SAML-authenticated users who are not in your on-premises directory.

  • 1Kosmos mobile app installed: Users must have the app on iOS or Android with biometrics enrolled before testing.


Configuration values

Values to collect from 1Kosmos AdminX (IdP) for Check Point:

Field

Where to find it

SAML Metadata XML or URL

AdminX → Settings → IdP Configuration → Metadata URL

SSO Login URL

AdminX → Settings → IdP Configuration → Single SignOn Service URL

IdP Entity ID

AdminX → Settings → IdP Configuration → Core Configuration

Signing Certificate (PEM)

AdminX → Settings → IdP Configuration → View Certificate → Public Key

Values auto-generated by Check Point SmartConsole (SP) for AdminX:

Field

Pattern / Location

Entity ID (Identity Awareness)

Auto-generated per gateway: https://[GATEWAY_IP]/connect/spPortal/ACS/ID/[UID]

Reply URL / ACS (Identity Awareness)

Auto-generated: https://[GATEWAY_IP]/connect/spPortal/ACS/Login/[UID]

Entity ID (Remote Access VPN)

Auto-generated: https://[GATEWAY_IP]/saml-vpn/spPortal/ACS/ID/[UID]

Reply URL / ACS (Remote Access VPN)

Auto-generated: https://[GATEWAY_IP]/saml-vpn/spPortal/ACS/Login/[UID]


Integration steps

Step 1: Create the Identity Provider object in SmartConsole

  • Open SmartConsole and navigate to the Gateways and Servers panel.

  • Click New → More → User/Identity → Identity Provider.

  • In the New Identity Provider window, select the target Security Gateway in the Gateway field.

  • In the Service field, select either Identity Awareness (for browser-based captive portal authentication) or Remote Access VPN (for VPN authentication). SmartConsole auto-populates the Identifier (Entity ID) and Reply URL fields specific to this gateway and service combination.

  • Copy the Identifier (Entity ID) and Reply URL values. You will need them when adding Check Point as a SAML application in AdminX.

Step 2: Enter 1Kosmos IdP details in SmartConsole

  • In the New Identity Provider window, under the Data received from the SAML Identity Provider section, select Import Metadata File and upload the 1Kosmos SAML metadata XML file.

  • Alternatively, select Insert Manually and enter the 1Kosmos SSO Login URL in the Login URL field, paste the 1Kosmos IdP Entity ID in the Entity ID field, and upload the 1Kosmos signing certificate file.

  • Click OK to save the Identity Provider object. Install the policy after saving to activate the configuration.

Step 3: Configure the Identity Provider as an authentication method on the gateway

  • In SmartConsole, open the Security Gateway object and navigate to Identity Awareness → Browser-Based Authentication → Settings.

  • In the Authentication Method section, select Identity Provider and click the green [+] button to select the 1Kosmos Identity Provider object you created.

  • For Remote Access VPN, navigate to the Mobile Access blade settings and assign the Identity Provider object as the authentication method for the relevant portal or profile.

  • Install the policy.

Step 4: Configure the external user profile (if not using LDAP)

  • If users are not in an LDAP directory connected to Check Point, configure a generic external user profile in Legacy SmartDashboard.

  • Navigate to Manage and Settings → Blades → Mobile Access → Configure in SmartDashboard.

  • Under the Users tab, right-click an empty area and select New → External User Profile → Match all users. Confirm the profile name uses the default generic*.

Step 5: Add Check Point as a SAML application in AdminX

  • Log in to the AdminX portal and navigate to Applications → Add Application.

  • Scroll to Custom App, select SAML 2.0 Generic, and click Add integration.

  • Enter "Check Point" as the Application Name, set Instance to Production, and enter your Check Point captive portal or VPN URL as the Application Access URL. Click Next.

  • Set the NameID Format to urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress and NameID Value to email. Add claims for email (Username). Click Next.

  • Enter the Check Point Entity ID and Reply URL (ACS URL) values copied from SmartConsole in Step 1. Enable Assertion signing and click Save.

Step 6: Test the integration

  • Open a browser, navigate to your Check Point captive portal or VPN login URL, and initiate authentication.

  • Confirm you are redirected to the 1Kosmos login screen. Scan the QR code with the 1Kosmos mobile app and complete biometric authentication.

  • Confirm you are returned to the Check Point resource as an authenticated user.


Attribute mappings

Source (1Kosmos)

Target (Check Point)

Description

user.email

NameID (emailAddress)

Primary user identifier; must be in email format as required by Check Point SAML


Integration notes

Check Point generates a unique Entity ID and Reply URL per gateway per service type. If you are enabling SAML for both Identity Awareness and Remote Access VPN on the same gateway, each service requires a separate Identity Provider object in SmartConsole and a separate SAML application entry in AdminX.

Identity tags can be used in Check Point Access Role matching if your identity provider sends group membership claims; create corresponding Identity Tag objects in SmartConsole for each group name received in the SAML assertion.

After any change to the Identity Provider object or policy, install the policy to push the updated configuration to the gateway.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.

Transform how you verify and authenticate

Secure onboarding, eliminate passwords, and stop fraud on one platform. Schedule a demo and see it in action.