<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic GA: Authentication Enforcement for Check Point WAF in WAF</title>
    <link>https://community.checkpoint.com/t5/WAF/GA-Authentication-Enforcement-for-Check-Point-WAF/m-p/270803#M377</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Now GA: Authentication Enforcement for API Protection&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;APIs are the backbone of modern apps and keeping them secure means more than just spotting bad traffic. You also need to make sure the &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;right&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; clients are connecting in the first place. That’s exactly why we built &lt;/SPAN&gt;&lt;STRONG&gt;Authentication Enforcement&lt;/STRONG&gt;&lt;SPAN&gt; for Check Point WAF, a new way to make sure only authenticated clients get through to your protected APIs and applications.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Think of it this way. Schema enforcement gives you a positive model of what your API &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;should&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; look like, the request structure, the fields and formats you expect, and blocks anything that doesn’t match. It’s hugely effective at stopping accidental misuse and a wide range of attacks like injections or malformed payloads because anything outside the approved schema simply isn’t allowed.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Authentication Enforcement goes a step further upstream: it doesn’t just check the &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;structure of a&amp;nbsp; request&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;, it checks the &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;identity&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; behind it. Before letting a request get near your sensitive endpoints, it verifies that a valid authentication token is present, that it hasn’t expired, and that its signature checks out. Currently, this is done using JWTs, the standard bearer token used by most modern APIs - with support for additional authentication methods planned in the future.&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot 2026-02-13 at 10.54.33.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33298i0EF45A9E5ABFA92D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2026-02-13 at 10.54.33.png" alt="Screenshot 2026-02-13 at 10.54.33.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;Here’s why this matters.&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;An API can look structurally correct, match the schema but still come from an unauthorized or malicious client. Without identity validation, attackers can still probe your API, scrape data, or abuse endpoints that weren’t meant to be public. Authentication Enforcement closes that gap. By understanding who is making the call, it stops unauthorized traffic in its tracks, aligning with zero trust principles that are becoming the baseline for secure API ops.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Best of all, from the defender’s standpoint, this is a natural extension of schema enforcement. Schema rules ask “does this request belong here?” Authentication Enforcement asks “&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;who&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; is at the door?” and demands that they present valid credentials. Working together, they give you both &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;structural&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;identity-based&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; assurance. It’s a one-two punch that makes your API security far stronger than either check on its own.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Authentication Enforcement is now GA and it’s a big step toward making API access control more robust, integrated, and seamless. Plus, it helps ensure the right clients get access, protects your backend from unauthorized use, and lets you build confidence knowing both intent and identity are part of your security model. It’s just one more way that we are pushing the &lt;/SPAN&gt;&lt;A href="https://blog.checkpoint.com/securing-the-cloud/waf-security-test-results-2026-why-prevention-first-matters-more-than-ever/?utm_source=linkedin-unpaid&amp;amp;utm_medium=social-media" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;best WAF on the market&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to get even better in 2026.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 13 Feb 2026 16:49:48 GMT</pubDate>
    <dc:creator>TCarrigan</dc:creator>
    <dc:date>2026-02-13T16:49:48Z</dc:date>
    <item>
      <title>GA: Authentication Enforcement for Check Point WAF</title>
      <link>https://community.checkpoint.com/t5/WAF/GA-Authentication-Enforcement-for-Check-Point-WAF/m-p/270803#M377</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Now GA: Authentication Enforcement for API Protection&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;APIs are the backbone of modern apps and keeping them secure means more than just spotting bad traffic. You also need to make sure the &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;right&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; clients are connecting in the first place. That’s exactly why we built &lt;/SPAN&gt;&lt;STRONG&gt;Authentication Enforcement&lt;/STRONG&gt;&lt;SPAN&gt; for Check Point WAF, a new way to make sure only authenticated clients get through to your protected APIs and applications.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Think of it this way. Schema enforcement gives you a positive model of what your API &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;should&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; look like, the request structure, the fields and formats you expect, and blocks anything that doesn’t match. It’s hugely effective at stopping accidental misuse and a wide range of attacks like injections or malformed payloads because anything outside the approved schema simply isn’t allowed.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Authentication Enforcement goes a step further upstream: it doesn’t just check the &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;structure of a&amp;nbsp; request&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt;, it checks the &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;identity&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; behind it. Before letting a request get near your sensitive endpoints, it verifies that a valid authentication token is present, that it hasn’t expired, and that its signature checks out. Currently, this is done using JWTs, the standard bearer token used by most modern APIs - with support for additional authentication methods planned in the future.&amp;nbsp;&lt;span class="lia-inline-image-display-wrapper lia-image-align-center" image-alt="Screenshot 2026-02-13 at 10.54.33.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/33298i0EF45A9E5ABFA92D/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2026-02-13 at 10.54.33.png" alt="Screenshot 2026-02-13 at 10.54.33.png" /&gt;&lt;/span&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;STRONG style="font-family: inherit; background-color: #ffffff;"&gt;Here’s why this matters.&amp;nbsp;&amp;nbsp;&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;An API can look structurally correct, match the schema but still come from an unauthorized or malicious client. Without identity validation, attackers can still probe your API, scrape data, or abuse endpoints that weren’t meant to be public. Authentication Enforcement closes that gap. By understanding who is making the call, it stops unauthorized traffic in its tracks, aligning with zero trust principles that are becoming the baseline for secure API ops.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Best of all, from the defender’s standpoint, this is a natural extension of schema enforcement. Schema rules ask “does this request belong here?” Authentication Enforcement asks “&lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;who&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; is at the door?” and demands that they present valid credentials. Working together, they give you both &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;structural&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; and &lt;/SPAN&gt;&lt;I&gt;&lt;SPAN&gt;identity-based&lt;/SPAN&gt;&lt;/I&gt;&lt;SPAN&gt; assurance. It’s a one-two punch that makes your API security far stronger than either check on its own.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Authentication Enforcement is now GA and it’s a big step toward making API access control more robust, integrated, and seamless. Plus, it helps ensure the right clients get access, protects your backend from unauthorized use, and lets you build confidence knowing both intent and identity are part of your security model. It’s just one more way that we are pushing the &lt;/SPAN&gt;&lt;A href="https://blog.checkpoint.com/securing-the-cloud/waf-security-test-results-2026-why-prevention-first-matters-more-than-ever/?utm_source=linkedin-unpaid&amp;amp;utm_medium=social-media" target="_blank" rel="noopener"&gt;&lt;SPAN&gt;best WAF on the market&lt;/SPAN&gt;&lt;/A&gt;&lt;SPAN&gt; to get even better in 2026.&amp;nbsp; &lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 16:49:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/GA-Authentication-Enforcement-for-Check-Point-WAF/m-p/270803#M377</guid>
      <dc:creator>TCarrigan</dc:creator>
      <dc:date>2026-02-13T16:49:48Z</dc:date>
    </item>
    <item>
      <title>Re: GA: Authentication Enforcement for Check Point WAF</title>
      <link>https://community.checkpoint.com/t5/WAF/GA-Authentication-Enforcement-for-Check-Point-WAF/m-p/270809#M378</link>
      <description>&lt;P&gt;Great!&lt;/P&gt;</description>
      <pubDate>Fri, 13 Feb 2026 16:52:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/WAF/GA-Authentication-Enforcement-for-Check-Point-WAF/m-p/270809#M378</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2026-02-13T16:52:31Z</dc:date>
    </item>
  </channel>
</rss>

