This section describes how to integrate Check Point Gateway Mobile Access portal with RSA Authentication Manager using RADIUS.
Configure RSA Authentication Manager
Perform these steps to configure RSA Authentication Manager using Radius.
Procedure
- Sign in to Security Console.
- Go to RADIUS > RADIUS Servers.
Note: Mark the IP address of the selected RADIUS server as it will be later used in the Check Point configuration.
- Go to RADIUS > RADIUS Clients > Add New.
- On the Add RADIUS Client page, enter the following details:
-
- Client Name: Enter a descriptive name for the Radius client.
- IPv4 Address: Enter the IP address of the Radius client.
- Make / Model: Select CheckPoint from the drop-down menu.
- Shared Secret: Create and enter a secure shared secret. This secret will be used for secure communication between the Radius client and the Radius server.
- Click Save & Create Associated RSA Agent.
- On the Add New Authentication Agent page, click Save.
- Confirm by clicking Yes, Save Agent.
Notes
- The RSA Authentication Manager RADIUS server is configured to use UDP ports 1655 and 1234.
- The relationship of agent host record to RADIUS client in the Authentication Manager can 1 to 1, 1 to many or 1 to all (global).
- Shared Secret must be an alphanumeric string between 1 and 31 characters in length and is case-sensitive.
Configure Check Point Mobile Access portal
Procedure
- Log in to Check Point SmartConsole desktop application with admin credentials.
- From the left pane, go to Gateways & Servers tab and double click on the required deployed Check Point Gateway.
- In the General properties of the gateway, ensure that Mobile Access service is enabled (ticked).
Note: If the Mobile Access service is not enabled, follow the prompt to enable the service. During this process, the Mobile Access portal URL is configured and end users will use it to log in to the portal.
- In the Gateway & Servers tab, click New > More > Server > RADIUS.
- In the RADIUS server window, go to Host and choose the RADIUS server host.
Note: If the RADIUS server host is not yet configured in the dropdown list, create a new host with the RADIUS server IP address obtained from RSA. Select the service as NEW-RADIUS which uses port 1812 and enter the shared secret configured in RSA.
- In SmartConsole, click the Gateways & Servers pane.
- Open the Security Gateway object. From the left pane, click Mobile Access > Authentication.
- In the Multiple Authentication Client Settings section, click Add to add a new Realm object. Choose New.
- On the Login Option pane, in the Authentication Methods section, click Add.
- Select RADIUS.
- Choose from the Server dropdown list the configured RADIUS server earlier. Click OK.
- In the User Directories section:
- Internal users: In this configuration, the users authenticated against RSA must exist locally on the Check Point SmartConsole for authentication.
- LDAP users: In this configuration, the users authenticated against RSA must exist on a remote Active Directory server. Check Point must be configured to connect to it successfully to fetch the users according to the LDAP lookup for authentication.
Note: You must select the LDAP Lookup Type as mail.
-
- External user profiles: This relies on users existing outside of Check Point and LDAP, but you must create an external user generic profile to be able to authenticate correctly.
- Go to Gateways & Servers main tab, go to Global properties > Advanced > Configure > FireWall-1 > Authentication > RADIUS.
- Configure values as shown in the following figure:
- In SmartConsole, click Publish.
- Select the applicable policy and choose Access Control.
- Click Install to apply the policy.
The configuration is complete.
Return to Main page
Related Articles
Check Point Gateway Identity Awareness - RADIUS Configuration for Authentication Manager - RSA Ready Implementation Guide 67Number of Views Check Point Gateway Mobile Access Portal - RADIUS Configuration for Cloud Authentication Service - RSA Ready Implementatio… 25Number of Views Check Point Gateway - RSA Ready Implementation Guide 94Number of Views Check Point Gateway Identity Awareness - RADIUS Configuration for Cloud Authentication Service - RSA Ready Implementation … 40Number of Views Check Point Gateway Identity Awareness- SAML Relying Party Configuration for Cloud Authentication Service - RSA Ready Impl… 27Number of Views
Trending Articles
RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Authentication Manager 8.9 Release Notes (January 2026) RSA Release Notes for RSA Authentication Manager 8.8 Deploying RSA Authenticator 6.2.2 for Windows Using DISM Downloading RSA Authentication Manager license files or RSA Software token seed records