Configuring RADIUS Servers for Non-Local Gaia Users
Non-local users can be defined on a RADIUS server and not in Gaia Check Point security operating system that combines the strengths of both SecurePlatform and IPSO operating systems..
When a non-local user logs in to Gaia, the RADIUS server authenticates the user and assigns the applicable permissions.
You must configure the RADIUS server to correctly authenticate and authorize non-local users.
|
Important - If you define a RADIUS user with a null password (on the RADIUS server), Gaia cannot authenticate that user. |
In addition, see sk72940.
Step |
Instructions |
||
---|---|---|---|
1 |
Copy the applicable dictionary file to your RADIUS server. |
||
|
Example for the "Steel-Belted RADIUS server"
|
||
|
Example for the "FreeRADIUS server"
|
||
|
Example for the "OpenRADIUS server"
|
||
2 |
Define the user roles on Gaia. Add this Check Point Vendor-Specific Attribute to users in your RADIUS server user configuration file:
For example:
|
||
3 |
Define the Check Point users that must have superuser access to the Gaia shell. Add this Check Point Vendor-Specific Attribute to users in your RADIUS server user configuration file:
|
A user with super user permissions can use the Gaia shell to do system-level operations, including working with the file system.
Super user permissions are defined in the Check Point Vendor-Specific Attributes.
Users that have a UID of 0 have super user permissions.
They can run all the commands that the root user can run.
Users that have a UID of 96 must run the sudo
command to get super user permissions.
The UIDs of all non-local users are defined in the /etc/passwd
file.
|
Important - On Scalable Platforms (Maestro and Chassis), you must run the applicable commands in the Expert mode on the applicable Security Group. |
Step |
Instructions |
|
---|---|---|
1 |
Connect to the command line on Gaia. |
|
2 |
Log in to the Expert mode. |
|
3 |
Run:
The user now has superuser permissions. |