A. Captive Portal and Transparent Kerberos Authentication
Browser-based Authentication sends users to a web page to acquire identities using Captive Portal and Transparent Kerberos Authentication.
Captive Portal is a web page that users are redirected to for authentication purposes. It is commonly used in browser-based authentication to prompt users to enter their credentials.
Transparent Kerberos Authentication allows for seamless authentication without user interaction if the user's browser and the network are configured to support Kerberos.
These methods are used to acquire user identities in a browser-based authentication scenario.
A is the correct awnser .
To enable Identity Awareness:
1. Log in to SmartDashboard.
2. From the Network Objects tree, expand the Check Point branch.
3. Double-click the Security Gateway on which to enable Identity Awareness.
4. In the Software Blades section, select Identity Awareness on the Network Security tab.
The Identity Awareness Configuration wizard opens.
5. Select one or more options. These options set the methods for acquiring identities of managed and unmanaged assets.
AD Query - Lets the Security Gateway seamlessly identify Active Directory users and computers.
Browser-Based Authentication - Sends users to a Web page to acquire identities from unidentified users. If Transparent
Kerberos Authentication is configured, AD users may be identified transparently
It is definitely option A.
Browser-Based Authentication is HTTPS based. It sends users to a web page to acquire identities using Captive Portal and Transparent Kerberos Authentication.
Taken from the CCSA R81.10 guide page 503
If you ask GPT it will tell you Captive Portal but the answer is A even if the A sentence sounds unclear but if you check the course which is not public it says:
Browser-Based Authentication is HTTPS based.
It sends users to a web page to acquire identities using Captive Portal and Transparent Kerberos Authentication.
Captive Portal is a simple method that authenticates users through a web interface before granting them access to resources.
Captive Portal is recommended for:
- Identity-based enforcement for non-AD users, non-Windows OS and guest users
- Deployment of Endpoint Agents.
I think its D
Main key is web page.
Captive Portal authenticates users with a web interface. When users try to access a protected web resource, they enter authentication information in a form that shows in their web browser.
A
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Identity-Sources-Browser-Based-Authentication.htm#
Technically should be Captive Portal OR Transparent Kerberos Authentication, not AND.
Browser-Based AuthenticationClosed gets identities and authenticates users with ONE of these acquisition methods.
I presume A would still be correct regardless.
https://sc1.checkpoint.com/documents/R81/WebAdminGuides/EN/CP_R81_IdentityAwareness_AdminGuide/Topics-IDAG/Identity-Sources-Browser-Based-Authentication.htm
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
keikei1228
2 weeks, 1 day agoNando0505
1 year agomfhashmi
1 year, 3 months agodarkdante24
1 year, 5 months agombrionesm
1 year, 6 months agoFaridtnx
1 year, 7 months agojerodrig28
1 year, 8 months agoDoris8000
1 year, 9 months agoavegacon
1 year, 9 months agoyuop
1 year, 11 months agoyuop
1 year, 11 months agodogiii
2 years agoMcBeano
2 years agomonkemann21
2 years ago