Print Download PDF Send Feedback

Previous

Next

Managing Administrator Accounts

In This Section:

Creating and Changing an Administrator Account

Creating a Certificate for Logging in to SmartConsole

Configuring Default Expiration for Administrators

Setting SmartConsole Timeout

Deleting an Administrator

Revoking Administrator Certificate

Assigning Permission Profiles to Administrators

Defining Trusted Clients

Restricting Administrator Login Attempts

Unlocking Administrators

Unlocking a Locked Administrator

Administrator Collaboration

Configuring Authentication Methods for Administrators

Creating and Changing an Administrator Account

To successfully manage security for a large network, we recommend that you first set up your administrative team, and delegate tasks.

We recommend that you create administrator accounts in SmartConsole, with the procedure below or with the First Time Configuration Wizard.

If you create it through the SmartConsole, you can choose one of these authentication methods:

To create an administrator account using SmartConsole:

  1. Click Manage & Settings > Permissions and Administrators.

    The Administrators pane shows by default.

  2. Click New Administrator.

    The New Administrators window opens.

  3. Enter a unique name for the administrator account.

    Note - This parameter is case-sensitive.

  4. Set the Authentication Method, or create a certificate, or the two of them.

    Note - If you do not do this, the administrator will not be able to log in to SmartConsole.

    To define an Authentication Method:

    In the Authentication Method section, select a method and follow the instructions in Configuring Authentication Methods for Administrators.

    To create a Certificate - If you want to use a certificate to log in:

    In the Certificate Information section, click Create, and follow the instructions in Configuring Certificates for Administrators.

  5. Select a Permissions profile for this administrator, or create a new one.
  6. Set the account Expiration date:
    • For a permanent administrator - select Never
    • For a temporary administrator - select an Expire At date from the calendar

    The default expiration date shows, as defined in the Default Expiration Settings. After the expiration date, the account is no longer authorized to access network resources and applications.

  7. Optional: Configure Additional Info - Contact Details, Email and Phone Number of the administrator.
  8. Click OK.

To change an existing administrator account:

  1. Click Manage & Settings > Permissions and Administrators.
  2. Double-click an administrator account.

    The Administrators properties window opens.

Creating an administrator with cpconfig

We do not recommend creating an administrator with cpconfig, the Check Point Configuration Tool. Use it only if there is no access to SmartConsole or the Gaia Portal. If you use cpconfig to create an administrator:

Creating a Certificate for Logging in to SmartConsole

When you define an administrator, you must configure the authentication credentials for the administrator.

The authentication credentials for the administrator can be one of the supported authentication methods, or a certificate, or the two of them.

You can create a certificate file in SmartConsole. The administrator can use this file to log in to SmartConsole using the Certificate File option. The administrator must provide the password for the certificate file.

You can import the certificate file to the CryptoAPI (CAPI) certificate repository on the Microsoft Windows SmartConsole computer. The administrator can use this stored certificate to log in to SmartConsole using the CAPI Certificate option. The SmartConsole administrator does not need to provide a password.

To create a certificate file:

  1. In the New Administrator window, in the Certificate Information section, click Create.
  2. Enter a password.
  3. Click OK.
  4. Save the certificate file to a secure location on the SmartConsole computer.

The certificate file is in the PKCS #12 format, and has a .p12 extension.

Note - Give the certificate file and the password to the SmartConsole administrators. The administrator must provide this password when logging in to SmartConsole with the Certificate File option.

To Import the certificate file to the CAPI repository:

  1. On the Microsoft Windows SmartConsole computer, double-click the certificate file.
  2. Follow the instructions.

Configuring Default Expiration for Administrators

If you want to use the same expiration settings for multiple accounts, you can set the default expiration for administrator accounts. You can also choose to show notifications about the approaching expiration date at the time when an administrator logs into SmartConsole or one of the SmartConsole clients. The remaining number of days, during which the account will be alive, shows in the status bar.

To configure the default expiration settings:

  1. Click Manage & Settings > Permissions and Administrators > Advanced.
  2. Click Advanced.
  3. In the Default Expiration Date section, select a setting:
    • Never expires
    • Expire at - Select the expiration date from the calendar control
    • Expire after - Enter the number of days, months, or years (from the day the account is made) before administrator accounts expire
  4. In the Expiration notifications section, select Show 'about to expire' indication in administrators view and select the number of days in advance to show the message about the approaching expiration date.
  5. Click Publish.

Setting SmartConsole Timeout

Use the SmartConsole in a secure manner, and enforce secure usage for all administrators. Setting a SmartConsole timeout is a basic requirement for secure usage. When an administrator is not using the SmartConsole, it logs out.

To set the SmartConsole timeout:

  1. Click Manage & Settings.
  2. Select Permissions & Administrators > Advanced.
  3. In the Idle Timeout area, select Perform logout after being idle.
  4. Enter a number of minutes.

    When a SmartConsole is idle after this number of minutes, the SmartConsole automatically logs out the connected administrator, but all changes are preserved.

Deleting an Administrator

To make sure your environment is secure, the best practice is to delete administrator accounts when personnel leave or transfer.

To remove an administrator account:

  1. Click Manage & Settings > Permissions and Administrators.

    The Administrators pane shows by default.

  2. Select an administrator account and click Delete.
  3. Click Yes in the confirmation window that opens.

Revoking Administrator Certificate

If an administrator that authenticates through a certificate is temporarily unable to fulfill administrator duties, you can revoke the certificate for the account. The administrator account remains, but no one can authenticate to the Security Management Server with the certificate. However, if the account has an additional authentication method (a password, for example), that method can be used to authenticate to the account.

To revoke an administrator certificate:

  1. Click Manage & Settings > Permissions and Administrators.
  2. Select an administrator account and click Edit.
  3. In General > Authentication, click Revoke.

Assigning Permission Profiles to Administrators

A permission profile is a predefined set of Security Management Server and SmartConsole administrative permissions that you can assign to administrators. You can assign a permission profile to more than one administrator. Only Security Management Server administrators with the Manage Administrators permission in the profile can create and manage permission profiles.

To learn about permission profiles for Multi-Domain Security Management administrators, see the R80.10 Multi-Domain Security Management Administration Guide.

Changing and Creating Permission Profiles

Administrators with Super User permissions can edit, create, or delete permission profiles.

These are the predefined, default permission profiles. You cannot change or delete the default permission profiles. You can clone them, and change the clones:

To change the permission profile of an administrator:

  1. Click Manage & Settings > Permissions and Administrators.
  2. Double-click the administrator account.

    The Administrators properties window opens.

  3. In the Permissions section, select another Permission Profile from the list.
  4. Click OK.

To change a permission profile:

  1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Permission Profiles.
  2. Double-click the profile to change.
  3. In the Profile configuration window that opens change the settings as needed.
  4. Click Close.

To create a new permission profile:

  1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Permission Profiles.
  2. Click New Profile.

    The New Profile window opens.

  3. Enter a unique name for the profile.
  4. Select a profile type:
    • Read/Write All - Administrators can make changes to all features
    • Auditor (Read Only All) - Administrators can see all information but cannot make changes
    • Customized - Configure custom settings
  5. Click OK.

To delete a permission profile:

  1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Permission Profiles.
  2. Select a profile and click Delete.

    You cannot delete a profile that is assigned to an administrator. To see which administrators use a profile, in the error message, click Where Used.

    If the profile is not assigned to administrators, a confirmation window opens.

  3. Click Yes to confirm.

Configuring Customized Permissions

Configure administrator permissions for Gateways, Access Control, Threat Prevention, Others, Monitoring and Logging, Events and Reports, Management. For each resource, define if administrators that are configured with this profile can configure the feature or only see it.

Permissions:

Some features have Read and Write Options. If the feature is selected:

To configure customized permissions:

  1. In the Profile object, in the Overview > Permissions section, select Customized.
  2. Configure permissions in these pages of the Profile object:
  3. In the Management section, configure this profile with permissions to:
    • Manage Administrators - Manage other administrator accounts.
    • Manage Sessions - Lets the administrator configure the session management settings (single or multiple sessions)
    • the session mode for single or multiple sessions
    • High Availability Operations -Configure and work with High Availability.
    • Management API Login - Log in with the management API.
  4. Click OK.

Configuring Permissions for Access Control Layers

You can simplify the management of the Access Control Policy by delegating ownership of different Layers to different administrators.

To do this, assign a permission profile to the Layer. The permission Profile must have this permission: Edit Layer by the selected profiles in a layer editor.

An administrator that has a permission profile with this permission can manage the Layer.

Workflow:

  1. Give Layer permissions to an administrator profile.
  2. Assign the permission profile to the Layer.

To give Layer permissions to an administrator profile:

  1. In the Profile object, in the Access Control > Policy section, select Edit Layer by the selected profiles in a layer editor.
  2. Click OK.

To assign a permission profile to a Layer:

  1. In SmartConsole, click Menu > Manage policies and layers.
  2. In the left pane, click Layers.
  3. Select a Layer.
  4. Click Edit.
  5. In the left pane, select Permissions.
  6. Click +
  7. Select a profile with Layer permissions.
  8. Click OK.
  9. Click Close.
  10. Publish the session.

Configuring Permissions for Access Control and Threat Prevention

In the Profile object, select the features and the Read or Write administrator permissions for them.

Access Control

To edit a Layer, a user must have permissions for all Software Blades in the Layer.

Threat Prevention

Configuring Permissions for Monitoring, Logging, Events, and Reports

In the Profile object, select the features and the Read or Write administrator permissions for them.

Monitoring and Logging Features

These are some of the available features:

Events and Reports Features

These are the permissions for SmartEvent:

Defining Trusted Clients

By default, any authenticated administrator can connect to the Security Management Server from any computer. To limit the access to a specified list of hosts, can configure Trusted Clients. You can configure Trusted Clients in these ways:

Configuring Trusted Clients

Administrators with Super User permissions can add, edit, or delete trusted clients.

To add a new trusted client:

  1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Trusted Clients.
  2. Click New.

    The New Trusted Client window opens.

  3. Enter a unique name for the client.
  4. Select a client type and configure corresponding values:
    • Any - No values to configure
    • IPv4 Address - Enter an IPv4 address of a host
    • IPv4 Address Range - Enter the first and the last address of an IPv4 address range
    • IPv4 Netmask - Enter the IPv4 address and the netmask
    • IPv6 Address - Enter an IPv6 address of a host
    • IPv6 Address Range - Enter the first and the last address of an IPv6 address range
    • IPv6 Netmask - Enter the IPv6 address and the netmask
    • Name - Enter a host name
    • Wild cards (IP only) - Enter a regular expression that describes a set of IP addresses
  5. Click OK.

To change trusted client settings:

  1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Trusted Clients.
  2. Double-click the client you want to edit.
  3. In the Trusted Client configuration window that opens, change the settings as needed.
  4. Click OK.

To delete a trusted client:

  1. In SmartConsole, go to Manage & Settings > Permissions and Administrators > Trusted Clients.
  2. Select a trusted client and click Delete.

    The confirmation window opens.

  3. Click Yes to confirm.

Restricting Administrator Login Attempts

For administrators that login to the Security Management Server using a Check Point password, you can configure these login restrictions:

To configure login restrictions:

  1. Go to the Manage & Settings view or to the Multi-Domain view.
  2. Go to Permissions & Administrators > Advanced > Login Restrictions.

Note - these restrictions apply only to administrators that authenticate to the Security Management Server using a Check Point password.

Unlocking Administrators

An administrator who has the Manage Administrators permission can unlock another administrator if the locked administrator authenticates to the Security Management Server using a Check Point password.

To unlock an administrator:

  1. Go to the Manage & Settings view or to the Multi-Domain view.
  2. Right-click the locked administrator and select Unlock Administrator.

Or:

Use the unlock administrator API command.

Note - the Unlock Administrator feature does not apply to administrators using other authentication methods.

Unlocking a Locked Administrator

Administrator Collaboration

Multiple administrators can work with SmartConsole on the same Security Management Server with the same policies at the same time. To avoid configuration conflicts, every administrator has their own username, and works in a session that is independent of the other administrators.

When an administrator logs in to the Security Management Server through SmartConsole, a new editing session starts. The changes that the administrator makes during the session are only available to that administrator. Other administrators see a lock icon on object and rules that are being edited. Changes are saved automatically.

Usually, an administrator will make changes to the policy in a private session and publish the changes when finished.

Publishing

To make your changes available to other administrators, and to save the database before installing a policy, you must publish the session. When you publish a session, a new database version is created.

When you select Install Policy, you are prompted to publish all unpublished changes in the current session. You cannot install a policy if the included changes in the session are not published. Unpublished changes from other sessions will not be included in the policy installation.

Before you publish the session, you can add some informative attributes to it.

There is no need to save changes when working on a session. Changes are saved automatically. You can exit SmartConsole without publishing your changes from the session. You will see the changes next time you log into SmartConsole.

To publish a session:

In the SmartConsole toolbar, click Publish.

When a session is published, a new database version is created and shows in the list of database revisions.

To add a name or description to a session:

  1. Before you publish, in the SmartConsole toolbar, click Session.

    The Session Details window opens.

  2. Enter a name for the database version.
  3. Enter a description.
  4. Click OK.

Validation Errors

The validations pane in SmartConsole shows configuration error messages. Examples of errors are object names that are not unique, and the use of objects that are not valid in the Rule Base.

To publish, you must fix the errors.

Working with Sessions

You can see information about the SmartConsole sessions that are connected to the Security Management Server.

When an administrator changes objects, they are saved and locked. Another administrator with Manage Sessions permissions can unlock the changed objects, by publishing, or discarding the session. This allows other administrators to work with those objects. You can also publish, discard, or take over sessions that are disconnected. Disconnecting a session does not unlock the locked objects.

To see session information:

Click Manage & Settings > Sessions > View Sessions.

To unlock a session that is locked by another administrator:

Configuring Authentication Methods for Administrators

These instructions show how to configure authentication methods for administrators. For users, see Configuring Authentication Methods for Users.

For background information about the authentication methods, see Authentication Methods for Users and Administrators.

Configuring Check Point Password Authentication for Administrators

These instructions show how to configure Check Point Password authentication for administrators.

To configure a Check Point password for a SmartConsole administrator:

  1. Go to Manage & Settings > Permissions & Administrators > Administrators.
  2. Click New.
  3. The New Administrator window opens.
  4. Give the administrator a name.
  5. In Authentication method, select Check Point Password.
  6. Click Set New Password, type the Password, and Confirm it.
  7. Assign a Permission Profile.
  8. Click OK.
  9. Click Publish.
Click Publish.

Configuring OS Password Authentication for Administrators

These instructions show how to configure OS Password Authentication for administrators.

To configure an OS password for a SmartConsole administrator:

  1. Go to Manage & Settings > Permissions & Administrators > Administrators.
  2. Click New.
  3. The New Administrator window opens.
  4. Give the administrator a name.
  5. In Authentication method, select OS Password.
  6. Assign a Permission Profile.
  7. Click OK.
  8. Click Publish.
Click Publish.

Configuring a RADIUS Server for Administrators

These instructions show how to configure a RADIUS server for SmartConsole administrators. To learn how to configure a RADIUS server, refer to the vendor documentation.

To configure a RADIUS Server for a SmartConsole administrator:

  1. In SmartConsole, click Objects > More Object Types > Server > More > New RADIUS.
  2. Configure the RADIUS Server Properties:
    1. Give the server a Name. It can be any name.
    2. Click New and create a New Host with the IP address of the RADIUS server.
    3. Click OK.
    4. Make sure that this host shows in the Host field of the Radius Server Properties window.
    5. In the Shared Secret field, type the secret key that you defined previously on the RADIUS server.
    6. Click OK.
    7. Click Publish.
  3. Add a new administrator:
    1. Go to Manage & Settings > Permissions & Administrators > Administrators.
    2. Click New.

      The New Administrator window opens.

    3. Give the administrator the name that is defined on the RADIUS server.
    4. Assign a Permission Profile.
    5. In Authentication method, select RADIUS.
    6. Select the RADIUS Server defined earlier.
    7. Click OK.
  4. Click Publish.

Configuring a SecurID Server for Administrators

These instructions show how to configure a SecurID server for SmartConsole administrators. To learn how to configure a SecurID server, refer to the vendor documentation.

To configure the Security Management Server for SecurID:

  1. Connect to the Security Management Server.
  2. Copy the sdconf.rec file to the /var/ace/ folder

    If the folder does not exist, create the folder.

  3. Give the sdconf.rec file full permissions. Run:

    chmod 777 sdconf.rec

To configure a SecurID Server for a SmartConsole administrator:

  1. In SmartConsole, click Objects > More Object Types > Server > More > New SecurID.
  2. Configure the SecurID Properties:
    1. Give the server a Name. It can be any name.
    2. Click Browse and select the sdconf.rec file. This must be a copy of the file that is on the Security Management Server.
    3. Click OK.
  3. Add a new administrator:
    1. Go to Manage & Settings > Permissions & Administrators > Administrators.
    2. Click New.

      The New Administrator window opens.

    3. Give the administrator a name.
    4. Assign a Permission Profile.
    5. In Authentication method, select SecurID.
  4. In the SmartConsole Menu, click Install Database.

Configuring a TACACS Server for Administrators

These instructions show how to configure a TACACS server for SmartConsole administrators. To learn how to configure a TACACS server, refer to the vendor documentation.

To configure a TACACS Server for a SmartConsole administrator:

  1. In SmartConsole, click Objects > More Object Types > Server > More > New TACACS.
  2. Configure the TACACS Server Properties:
    1. Give the server a Name. It can be any name.
    2. Click New and create a New Host with the IP address of the TACACS server.
    3. Click OK.
    4. Make sure that this host shows in the Host field of the TACACS Server Properties window.
    5. In the Shared Secret field, type the secret key that you defined previously on the TACACS server.
    6. Click OK.
    7. Click Publish.
  3. Add a new administrator:
    1. Go to Manage & Settings > Permissions & Administrators > Administrators.
    2. Click New.

      The New Administrator window opens.

    3. Give the administrator the name that is defined on the TACACS server.
    4. Assign a Permission Profile.
    5. In Authentication method, select TACACS.
    6. Select the TACACS Server defined earlier.
    7. Click OK.
  4. Click Publish.