
Rublon Authentication Proxy – Install the Rublon Authentication Proxy if you have not already.ģ. User Identity Provider (IdP) – You need an external Identity Provider, such as Microsoft Active Directory, OpenLDAP, or FreeRADIUS.Ģ. Install the Rublon Authenticator mobile app.ġ.Create an application in the Rublon Admin Console.Ensure you have prepared all required components.Supported Authentication Methods Authentication Methodīefore You Start Configuring MFA for Check Point Mobile Access VPNīefore configuring Rublon MFA for Check Point Mobile Access VPN: If the user is unable to complete the extra method, Rublon will deny their access, stopping any potential intruder from gaining access. If a user enters the correct username and password, they proceed to the secondary authentication method.

Rublon MFA for Check Point Mobile Access VPN enables Multi-Factor Authentication (MFA) / Two-Factor Authentication (2FA) during VPN connections. MFA for Check Point Mobile Access VPN is done using the Rublon Authentication Proxy. Rublon Multi-Factor Authentication (MFA) for Check Point Mobile Access VPN allows you to add an extra layer of security to your Check Point Mobile Access VPN logins. Incorporated into the Check Point Next Generation Firewalls (NGFW), Mobile Access provides enterprise-grade remote access through both Layer-3 VPN and SSL/TLS VPN, granting you effortless and secure access to your emails, calendar, contacts, and other corporate applications.


Overview of MFA for Check Point Mobile Access VPNĬheck Point Mobile Access is a secure and straightforward way to connect to corporate applications on the Internet with your smartphone, tablet, or PC. This means that even if a cybercriminal knows a user’s password, they will not be able to access the VPN without completing the second step of authentication. Check Point Mobile Access MFA requires the user to go through both primary (login/password) and secondary ( Mobile Push) authentication. MFA for Check Point Mobile Access VPN is an extra layer of security to ensure only the intended user is logging into the VPN.
