Creating an Administrator Account with TACACS Server Authentication
Terminal Access Controller Access Control System (TACACS) provides access control for routers, network access servers and other networked devices through one or more centralized servers.
TACACS is an external authentication method that provides verification services. With TACACS, the Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. forwards authentication requests by remote administrators to the TACACS server. The TACACS server, which stores administrator account information, authenticates administrators. The system supports physical card key devices or token cards and Kerberos
An authentication server for Microsoft Windows Active Directory Federation Services (ADFS). secret key authentication. TACACS encrypts the administrator name, password, authentication services and accounting information of all authentication requests to secure communication.
You can perform TACACS authentication for SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. administrators through a TACACS server or a TACACS server group. A TACACS server group is a High Availability group of identical TACACS servers in the system. When you create the group, you define a priority for each server. If the server with the highest priority fails, the one with the next highest priority in the group takes over, and so on. All TACACS servers in the group must use the same protocol.
To learn how to configure a TACACS server, refer to the vendor documentation.
After you configure TACACS server authentication, you can, in addition, configure authentication with a certificate file. The administrator can then authenticate to SmartConsole with the TACACS server or the certificate file.
You create the certificate file in SmartConsole. The administrator can use the certificate to log in to SmartConsole in two ways:
-
Log in to SmartConsole with the Certificate File option. The administrator must provide the password to use the certificate file.
-
You can import the certificate file to the Windows Certificate Store on the Microsoft Windows SmartConsole computer. The administrator can use this stored certificate to log in to SmartConsole with the CAPI Certificate option. The administrator does not need to provide a password to log in.
The administrator can also give the certificate to other administrators to log in to SmartConsole with no administrator account of their own.
To configure TACACS server authentication for an administrator
-
In SmartConsole, add a new TACACS server object
-
Go to Object Explorer and click New > More > Server > TACACS.
-
Enter the server Name.
-
In the Host field, click the drop-down arrow, click New, and create a New Host with the IP address of the TACACS server.
-
Click OK.
This host now appears in the Host field of the New TACACS window.
-
Select a Server type.
-
If your server type is TACACS+, type the Secret key that you defined previously on the TACACS+ server.
-
Click OK.
-
Publish the SmartConsole session.
-
-
Add a new administrator and define as the authentication method
-
Go to Manage & Settings > Permissions & Administrators > Administrators > click New.
The New Administrator window opens.
-
Enter the administrator name that is defined on the TACACS server.
-
In Authentication Method, select TACACS.
-
Select the TACACS Server defined earlier from the drop-down list.
- Optional: In the Authentication section > Certificate Information, click Create:
Enter a password.
Click OK.
Save the certificate file to a secure location on the SmartConsole computer:
Notes:
Make sure that the login name is included in the File name field.
Make sure that Certificate Files (*p12) is selected in the Save as type drop-down list. The certificate file is in the PKCS #12 format, and has a
.p12
extension.A password is required to protect the sensitive data in the certificate file. The certificate file contains the private key. After the certificate is issued, save it to a file and give the administrator this file and password. The administrator can then authenticate with the certificate when they log in with SmartConsole to the Security Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server..
-
Assign a Permission Profile.
-
In the Expiration section, select the expiration date and make sure that it is set to a valid future date.
-
Click OK.
-
Publish the SmartConsole session.
-
-
Optional: Configure a TACACS Server group for SmartConsole administrator authentication
-
In SmartConsole, configure all the servers that you want to include in the server group, as explained in To configure TACACS server authentication for an administrator.
For each server, enter its priority in the group. The lower the number is, the higher the priority.
For example, if you create a group with 3 servers, with priorities 1,2 and 3, the server with number 1 is approached first, the server with number 2 second, and the server with number 3, third.
-
Create the server group: In SmartConsole, go to Object Explorer and click New > Server > More > TACACS Group.
-
Configure the group properties and add servers to the group:
-
Enter the group Name.
-
Click the + icon for each server you want to add, and select the server from the drop-down list.
-
Click OK.
-
Publish the SmartConsole session.
-
-
-
Optional: Import the certificate file into the Windows Certificate Store
Note - This procedure applies if you create a certificate authentication in the administrator object, and you log in to SmartConsole with the CAPI Certificate option.
-
Right-click the *.p12 file you saved when you created the required administrator, and click Install PFX.
The Certificate Import Wizard opens.
-
In the Store Location section, select the applicable option:
-
Current User (this is the default)
-
Local Machine
-
-
Click Next.
-
Enter the same certificate password you used when you created the required administrator certificate.
-
Clear Enable strong private key protection.
-
Select Mark this key as exportable.
-
Click Next.
-
Select Place all certificates in the following store, click Browse > Personal > OK.
-
Click Next.
-
Click Finish.
-