Creating an Administrator Account with RADIUS Server Authentication
Remote Authentication Dial-In User Service (RADIUS) is an external authentication method that provides security and scalability by separating the authentication function from the access server. With RADIUS, the Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. forwards the authentication requests to the RADIUS server. The RADIUS server, which stores administrator account information, does the authentication. The RADIUS protocol uses UDP to communicate with the Security Gateway
Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. or the Security Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server...
You can perform RADIUS authentication for SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. administrators through a RADIUS server or a RADIUS server group. You define RADIUS servers and RADIUS server group objects in SmartConsole. A RADIUS server group is a high availability group of identical RADIUS servers which includes any or all the RADIUS servers in the system. When you create the group, you define a priority for each server in the group. If the server with the highest priority fails, the one with the next highest priority in the group takes over, and so on. When you define a group of RADIUS servers, all members of the group must use the same protocol.
To learn how to configure a RADIUS server, refer to the vendor documentation.
After you configure RADIUS server authentication, you can, in addition, configure authentication with a certificate file. The administrator can then authenticate to SmartConsole with the RADIUS server or the certificate file.
You create the certificate file in SmartConsole. The administrator can use the certificate to log in to SmartConsole in two ways:
-
Log in to SmartConsole with the Certificate File option. The administrator must provide the password to use the certificate file.
-
You can import the certificate file to the Windows Certificate Store on the Microsoft Windows SmartConsole computer. The administrator can use this stored certificate to log in to SmartConsole with the CAPI Certificate option. The administrator does not need to provide a password to log in.
The administrator can also give the certificate to other administrators to log in to SmartConsole with no administrator account of their own.
To configure RADIUS server authentication for an administrator
-
In SmartConsole, configure a new RADIUS server object
-
Go to the Object Explorer and select New > More > Server > RADIUS.
-
Give the server a Name. It can be any name.
-
In the Host field, click the drop-down arrow, click New and create a New Host with the IP address of the RADIUS server.
-
Click OK.
This host now appears in the Host field of the New RADIUS window.
-
In the Shared Secret field, type the secret key that you defined previously on the RADIUS server.
-
Click OK.
-
Publish the SmartConsole session.
-
-
Create a new administrator and define RADIUS as the authentication method
-
Go to Manage & Settings > Permissions & Administrators > Administrators > Click New.
The New Administrator window opens.
-
Give the administrator the name that is defined on the RADIUS server.
-
In Authentication method, select RADIUS.
-
Select the RADIUS Server defined earlier.
-
Optional: In the Authentication section > Certificate Information, click Create:
-
Enter a password.
-
Click OK.
-
Save the certificate file to a secure location on the SmartConsole computer:
Notes:
-
Make sure that the login name is included in the File name field.
-
Make sure that Certificate Files (*p12) is selected in the Save as type drop-down list. The certificate file is in the PKCS #12 format, and has a
.p12
extension. -
A password is required to protect the sensitive data in the certificate file. The certificate file contains the private key. After the certificate is issued, save it to a file and give the administrator this file and password. The administrator can then authenticate with the certificate when they log in with SmartConsole to the Security Management Server.
-
-
-
Assign a Permission Profile.
-
In the Expiration section, select the expiration date and make sure that it is set to a valid future date.
-
Click OK.
-
Publish the SmartConsole session.
-
-
Optional: Configure a RADIUS server group for SmartConsole administrator authentication
-
In SmartConsole, configure all the servers that you want to include in the server group, as explained in To configure RADIUS server authentication for an administrator.
For each server, enter its priority in the group. The lower the number is, the higher the priority.
For example, if you create a group with 3 servers, with priorities 1,2 and 3, the server with number 1 is approached first, the server with number 2 second, and the server with number 3, third.
-
Create the server group: In SmartConsole, go to Object Explorer and click New > Server > More > RADIUS Group.
-
Configure the group properties and add servers to the group:
-
Give the group a Name. It can be any name.
-
Click the plus (+) for each server you want to add, and select each server from the drop-down list.
-
Click OK.
-
Publish the SmartConsole session.
-
-
-
Optional: Import the certificate file into the Windows Certificate Store
Note - This procedure applies if you create a certificate authentication in the administrator object, and you log in to SmartConsole with the CAPI Certificate option.
-
Right-click the *.p12 file you saved when you created the required administrator, and click Install PFX.
The Certificate Import Wizard opens.
-
In the Store Location section, select the applicable option:
-
Current User (this is the default)
-
Local Machine
-
-
Click Next.
-
Enter the same certificate password you used when you created the required administrator certificate.
-
Clear Enable strong private key protection.
-
Select Mark this key as exportable.
-
Click Next.
-
Select Place all certificates in the following store, click Browse > Personal > OK.
-
Click Next.
-
Click Finish.
-