Check Point Gateway Mobile Access Portal - RADIUS Configuration for Cloud Authentication Service - RSA Ready Implementation Guide
This section describes how to integrate Check Point Gateway Mobile access portal with RSA Cloud Authentication Service using RADIUS.
Configure RSA Cloud Authentication Service
Perform these steps to configure RSA Cloud Authentication Service using Radius.
Procedure
- Log into RSA Cloud Authentication Service.
- Go to Authentication Clients > RADIUS
- Click Add RADIUS Client and Profiles.
- On the RADIUS Client page, enter the following details:
-
- Name: Enter a descriptive name for the Radius client.
- IP Address: Enter the IP address of the Radius client.
- Shared Secret: Create and enter a secure shared secret. This secret will be used for secure communication between the Radius client and the Radius server.
- Enter the RADIUS client details and click Save and Next Step,
- Click Finish to complete the configuration.
- Click Publish Changes to apply your changes to the RADIUS server, and wait for the process complete.
Notes
- The RSA Cloud Authentication RADIUS server is configured to use UDP port 1812.
- Shared Secret must be an alphanumeric string between 1 and 31 characters in length and is case-sensitive.
Configure Check Point Mobile Access portal
Perform these steps to configure Check Point Mobile Access portal
Procedure
- Log in to Check Point SmartConsole desktop application with admin credentials.
- From the left pane, go to Gateways & Servers tab.
- Double click the required deployed Check Point Gateway.
- In the General properties of the gateway, ensure that Mobile Access Service is enabled.
Note: If Mobile Access Service is not enabled, follow the prompt to enable the service. During this process, the Mobile Access portal URL is configured which will be used by the end users to login to the portal.
- In the Gateway & Servers tab, click New > More > Server > RADIUS.
- In the RADIUS server window, if the RADIUS server host is not configured in the dropdown, create a new host with the Identity Router Management Interface IP address obtained from RSA.
- Select the service >NEW-RADIUS which uses port 1812.
- Enter the shared secret configured in RSA.
- In SmartConsole, click the Gateways & Servers pane.
- Open the Security Gateway object. In the left pane, click Mobile Access > Authentication.
- In the Multiple Authentication Client Settings section, click Add to add a Realm object. Choose New.
- On the Login Option pane, in the Authentication Methods section, click Add.
- Select RADIUS.
- Select the previously configured RADIUS server from the Server dropdown and click Ok.
- In the User Directories section:
- Internal users: In this configuration, the users authenticated against RSA must exist locally on the Check Point SmartConsole for authentication.
- LDAP users: In this configuration, the users authenticated against RSA must exist on a remote Active Directory server. Check Point must be configured to connect to it successfully to fetch the users according to the LDAP lookup for authentication.
Note: You must select the LDAP Lookup Type as mail.
-
- External user profiles: This relies on users existing outside of Check Point and LDAP, but you must create an external user generic profile to be able to authenticate correctly.
- Go to the Gateways & Servers main tab, go to Global properties > Advanced > Configure > FireWall-1 > Authentication > RADIUS.
- Configure values as shown in the following figure.
- In SmartConsole, click Publish.
- Select the applicable policy, and choose Access Control.
- Click Install to apply the policy.
The configuration is complete.
Return to Main page
Related Articles
Check Point Gateway Identity Awareness - RADIUS Configuration for Cloud Authentication Service - RSA Ready Implementation … 42Number of Views Check Point Gateway - RSA Ready Implementation Guide 95Number of Views Check Point Gateway Identity Awareness - RADIUS Configuration for Authentication Manager - RSA Ready Implementation Guide 67Number of Views Check Point Gateway Mobile Access Portal - RADIUS Configuration for Authentication Manager - RSA Ready Implementation Guide 44Number of Views Check Point Gateway Identity Awareness- SAML Relying Party Configuration for Cloud Authentication Service - RSA Ready Impl… 27Number of Views
Trending Articles
Passwordless Authentication in Windows MFA Agent for Active Directory – Quick Setup Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Authentication Manager Upgrade Process RSA Authentication Manager 8.7 SP2 Setup and Configuration Guide An example of SSO using SAML and ADFS with RSA Identity Management and Governance 6.9.x
Don't see what you're looking for?