Support Center > Search Results > SecureKnowledge Details
Configure G Suite and Microsoft AD FS with CloudGuard SaaS Authentication Service Technical Level
Solution

This page describes how to configure CloudGuard SaaS to work with Microsoft AD FS as an Identity Provider and G Suite as Service Provider. After the configuration is finished, all login requests to G Suite will go through CloudGuard SaaS Authentication Service.

Table of Contents:

  • Prerequisites
  • Steps
    • Add and Configure AD FS as an Identity Provider
    • Configure G Suite to use CloudGuard SaaS Authentication Service as Identity Provider

Important Notes

#1 - This procedure will impact all G Suite users in your domain; it cannot be done only for specific user groups.

#2 - The change of Identity Provider in G Suite takes effect immediately.

#3 - In case you are using the Check Point MFA Adapter plugin on AD FS (see SK123143), the procedure will indicate when it is necessary to deactivate the plugin. 

#4 - Besides the configuration described in this article, you need to associate G Suite to CloudGuard SaaS in order to synchronize your users. This is done under Identity Protection\Configuration\SaaS Applications. Please consult the Identity Protection Admin Guide, section Getting Started - Initial Configuration, for more details.

Prerequisites

Administrator privileges to Microsoft AD FS and G Suite are required for the following procedure.

Steps

Add and Configure AD FS as an Identity Provider

  1. Log into CloudGuard SaaS portal and go to Configuration under the module Identity Protection. Under the tab Identity Providers, click on Add Identity Provider.
  2. In the wizard that opens, select Microsoft Active Directory Federation Services and click Next.
  3. Enter your domain name and make sure the integration method chosen is Authentication service and click Next.
  4. Copy the Entity ID and the Reply URL to a text file and save them for later. Click Next.
  5. Upload your AD FS metadata xml file. It is usually available from a static URL similar to: https://domain/FederationMetadata/2007-06/FederationMetadata.xml
  6. Click Next.

  7. Open the AD FS Management Tool of your primary AD FS server and add CloudGuard SaaS as a Relying Party Trust. 

    Please refer to this SK for a step-by-step process on how to add a Relying Party Trust in AD FS with the following modifications:

    • For Windows Server 2012 R2
      • In step # 6, use the name: CGS Authentication Service for the Relying Party Trust.
      • In step # 9, select the Enable support for the SAML 2.0 WebSSO protocol checkbox. Enter the Reply URL copied from the CloudGuard SaaS portal in the Service URL field.
      • In step # 10, for Relying party trust identifier enter the Entity ID copied from the CloudGuard SaaS portal.
    • For Windows Server 2016
      • In step # 6, use the name CGS Authentication Service for the Relying Party Trust.
      • In step # 8, select the Enable support for the SAML 2.0 WebSSO protocol checkbox. Enter the Reply URL copied from CloudGuard SaaS portal in the Service URL field.
      • In step # 9, for Relying party trust identifier enter the Entity ID copied from the CloudGuard SaaS portal.
  8.  

  9. Click the CONNECT button. This will open an AD FS login form where you are prompted to enter your email address and password. After validation, you should see a Login Success message.
  10. Troubleshooting:

    If an error is displayed before the credential validation stage, check the AD FS logs under Event Viewer\Applications\Service logs\AD FS\Admin.

    If an error is displayed after the credential validation stage, the screen should indicate the nature of the error. If there is no detail, please contact Check Point support after verifying that the previous configuration steps were followed accurately.

  11. Click Finish to save your Identity Provider configuration and close the wizard.

Configure G Suite to use CloudGuard SaaS Authentication Service as Identity Provider

  1. In the CloudGuard SaaS portal, navigate to Configuration under Identity Protection. In the box corresponding to the Microsoft AD FS Identity Provider you just configured, click on Click to add SaaS.
  2. In the wizard that opens, select G Suite and click Next. 
  3. Entity ID and Reply URL are pre-filled. Click Next.
  4. Copy and paste the Sign-in page URL and the Sign-out page URL to a text file and save for later. Download the certificate and click Finish to save and close the wizard.
  5. Log into the G Suite admin console. Click on Security.
  6. Scroll down to section 'Set up single sign on (SSO)' and expand it.
  7. Check the boxes 'Setup SSO with third party identity provider' and 'Use a domain specific issuer'.
  8. Upload the certificate downloaded in step 4 from the CloudGuard SaaS portal. 
  9. We recommend doing this before filling out the Sign-in page and Sign-out page URLs due to a randomly observed Google behavior that clears out the URLs after uploading the certificate.

  10. Fill out the Sign-in page URL and Sign-out page URL with the URLs provided by the Add Service Provider wizard in step 4.
  11. You can leave empty the Change password URL. Click Save.

  12. You're done! All login requests to G Suite will now go through CloudGuard SaaS Authentication Service before reaching Microsoft AD FS. Login events will be shown in the CloudGuard SaaS portal under Identity Protection\Events.
This solution has been verified for the specific scenario, described by the combination of Product, Version and Symptoms. It may not work in other scenarios.

Give us Feedback
Please rate this document
[1=Worst,5=Best]
Comment