Creating an Administrator Account with SecurID Authentication
SecurID requires administrators to possess a token authenticator and to supply a PIN or password. Token authenticators generate one-time passwords that are synchronized to an RSA Authentication Manager (AM) and may come in the form of hardware or software. Hardware tokens are key-ring or credit card-sized devices. Software tokens reside on the PC or device from which the administrator wants to authenticate. All tokens generate a random, one-time use access code that changes approximately every minute. When an administrator attempts to authenticate to a protected resource, the AM must validate the one-time use code.
The Security Management Server Dedicated Check Point server that runs Check Point software to manage the objects and policies in a Check Point environment within a single management Domain. Synonym: Single-Domain Security Management Server. forwards SecurID authentication requests by remote administrators to the AM. The AM manages the database of the RSA users and their assigned hard or soft tokens. The Security Management Server
Check Point Single-Domain Security Management Server or a Multi-Domain Security Management Server. act as an AM Agent and directs all access requests to the RSA AM for authentication. For additional information on agent configuration, refer to the RSA Authentication Manager documentation.
There are no specific parameters required for the SecurID authentication method. Authentication requests can be sent over SDK-supported API or through REST API.
To learn how to configure a SecurID server, refer to the vendor documentation.
After you configure SecurID authentication, you can, in addition, configure authentication with a certificate file. The administrator can then authenticate to SmartConsole Check Point GUI application used to manage a Check Point environment - configure Security Policies, configure devices, monitor products and events, install updates, and so on. with SecurID authentication or the certificate file.
You create the certificate file in SmartConsole. The administrator can use the certificate to log in to SmartConsole in two ways:
-
Log in to SmartConsole with the Certificate File option. The administrator must provide the password to use the certificate file.
-
You can import the certificate file to the Windows Certificate Store on the Microsoft Windows SmartConsole computer. The administrator can use this stored certificate to log in to SmartConsole with the CAPI Certificate option. The administrator does not need to provide a password to log in.
The administrator can also give the certificate to other administrators to log in to SmartConsole with no administrator account of their own.
Prerequiste:
Make sure you configured the required Permission Profile Predefined group of SmartConsole access permissions assigned to Domains and administrators. With this feature you can configure complex permissions for many administrators with one definition.. See Assigning Permission Profiles to Administrators.
To configure SecurID authentication for an administrator
-
Configure the Security Management Server to use SecurID (this procedure is only relevant if you use an SDK-supported API)
-
Connect to the command line on the Security Management Server.
-
Log in to the Expert mode.
-
Copy the
sdconf.rec
file to the/var/ace/
directory.If the
/var/ace/
directory does not exist, create it with this command:mkdir -v /var/ace/
-
Assign all permissions to the
sdconf.rec
file:chmod -v 777 /var/ace/sdconf.rec
-
-
Configure the SecurID Server object
-
Add a new SecurID server object:
Go to the Object Explorer and select New > More > Server > New SecurID.
-
In the top field, enter the applicable object name.
-
Optional: Enter the comment.
-
This step applies only to SDK-supported API:
Click Browse and select the
sdconf.rec
file.This must be a copy of the file that is located on the Security Management Server.
-
Click OK.
-
-
Add a new administrator and define SecurID as the authentication method
-
From the left navigation panel, click Manage & Settings..
-
Expand Permissions & Administrators > click Administrators.
-
From the top toolbar, click the
icon (New) > click New Administrator.
The New Administrator window opens and shows the General page.
-
In the top field, enter the applicable object name.
-
Optional: Enter the comment.
-
In Authentication method, select SecurID.
-
Optional: Create a certificate for this administrator:
-
In the Certificate Information field, click Create.
-
In the Password field, enter the password.
A password is required to protect the sensitive data in the certificate file.
-
In the Confirm field, enter the same password.
-
Click OK.
-
Wait for the Save As window to open.
-
In the File name field, make sure to include the username.
-
In the Save as type field, select Certificate Files (*p12).
The certificate file is in the PKCS #12 format, and has a
.p12
extension. -
Browse to a secure location on the SmartConsole computer.
-
Click Save.
Notes:
-
After you save the certificate file, give the administrator this file and password.
The administrator can then authenticate with the certificate when they log in with SmartConsole to the Security Management Server.
-
You can revoke this certificate at any time. Select the certificate and click Revoke.
-
-
In the Permission Profile field, select the applicable profile.
-
In the Expiration section, configure the required valid expiration date.
-
Optional: On the Additional Info page, configure:
-
Phone Number
-
Contact Details
-
Email
-
-
Click OK.
-
Publish the SmartConsole session.
-
-
Optional: Import the certificate file into the Windows Certificate Store
Note - This procedure applies if you create a certificate authentication in the administrator object, and you log in to SmartConsole with the CAPI Certificate option.
-
Right-click the *.p12 file you saved when you created the required administrator, and click Install PFX.
The Certificate Import Wizard opens.
-
In the Store Location section, select the applicable option:
-
Current User (this is the default)
-
Local Machine
-
-
Click Next.
-
Enter the same certificate password you used when you created the required administrator certificate.
-
Clear Enable strong private key protection.
-
Select Mark this key as exportable.
-
Click Next.
-
Select Place all certificates in the following store, click Browse > Personal > OK.
-
Click Next.
-
Click Finish.
-