<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic User authentication via SSH using passwords on Security Gateways in AWS. in Cloud Firewall</title>
    <link>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260123#M5552</link>
    <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;&lt;P&gt;One of our clients has just deployed a cluster in the AWS cloud with R81.20 Take 105, which, as we recall, uses the Key Pair to authenticate via SSH.&lt;/P&gt;&lt;P&gt;However, since the client belongs to financial institutions and has robust security policies, it is not possible for them to share the Key Pair with multiple users. In this regard, we would like to ask the following:&lt;/P&gt;&lt;P&gt;Is it possible to create local users with passwords to manage the cluster and allow the admin user to continue authenticating with the Key Pair?&lt;/P&gt;&lt;P&gt;If this is not possible, have you tried any alternatives to prevent a user from using the same Key Pair to access with any user?&lt;/P&gt;&lt;P&gt;We look forward to your response.&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 16 Oct 2025 21:04:10 GMT</pubDate>
    <dc:creator>Jose_Luis_Hdz</dc:creator>
    <dc:date>2025-10-16T21:04:10Z</dc:date>
    <item>
      <title>User authentication via SSH using passwords on Security Gateways in AWS.</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260123#M5552</link>
      <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;&lt;P&gt;One of our clients has just deployed a cluster in the AWS cloud with R81.20 Take 105, which, as we recall, uses the Key Pair to authenticate via SSH.&lt;/P&gt;&lt;P&gt;However, since the client belongs to financial institutions and has robust security policies, it is not possible for them to share the Key Pair with multiple users. In this regard, we would like to ask the following:&lt;/P&gt;&lt;P&gt;Is it possible to create local users with passwords to manage the cluster and allow the admin user to continue authenticating with the Key Pair?&lt;/P&gt;&lt;P&gt;If this is not possible, have you tried any alternatives to prevent a user from using the same Key Pair to access with any user?&lt;/P&gt;&lt;P&gt;We look forward to your response.&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 16 Oct 2025 21:04:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260123#M5552</guid>
      <dc:creator>Jose_Luis_Hdz</dc:creator>
      <dc:date>2025-10-16T21:04:10Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication via SSH using passwords on Security Gateways in AWS.</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260205#M5558</link>
      <description>&lt;P&gt;PasswordAuthentication is disabled by default for SSH on cloud instances.&lt;BR /&gt;This has to be disabled:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk109587" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk109587&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 20:41:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260205#M5558</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-10-17T20:41:14Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication via SSH using passwords on Security Gateways in AWS.</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260272#M5559</link>
      <description>&lt;P&gt;Phoneboy is indeed correct.&lt;/P&gt;</description>
      <pubDate>Sun, 19 Oct 2025 11:50:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260272#M5559</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-19T11:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication via SSH using passwords on Security Gateways in AWS.</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260343#M5560</link>
      <description>&lt;P&gt;Hello Phoneboy.&lt;/P&gt;&lt;P&gt;My question is more about the implications of enabling SSH as an authentication method. That is, would doing this apply to all users in general, including the admin user? Or, alternatively, could the admin user keep the Key Pair as the authentication method and have local users authenticate via password?&lt;/P&gt;&lt;P&gt;Best regards.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 15:21:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260343#M5560</guid>
      <dc:creator>Jose_Luis_Hdz</dc:creator>
      <dc:date>2025-10-20T15:21:45Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication via SSH using passwords on Security Gateways in AWS.</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260345#M5561</link>
      <description>&lt;P&gt;Traditionally, you just stick a bunch of public keys in the shared user account's ~/.ssh/authorized_keys file. Any key there can authenticate as the user, so each admin has their own unique key.&lt;/P&gt;
&lt;P&gt;If you do this, I would highly, highly recommend requiring users to put their unique username at the end of the line so as people resign, their key can be removed.&lt;/P&gt;</description>
      <pubDate>Mon, 20 Oct 2025 15:32:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260345#M5561</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2025-10-20T15:32:44Z</dc:date>
    </item>
    <item>
      <title>Re: User authentication via SSH using passwords on Security Gateways in AWS.</title>
      <link>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260516#M5564</link>
      <description>&lt;P&gt;You mean Password authentication?&lt;BR /&gt;This is a server-wide setting, which means users are ALLOWED to use password-based authentication.&lt;BR /&gt;SSH clients will always attempt key-based authentication first, which will be accepted if the key offered by the client matches an entry in ~/.ssh/authorized_keys (under user's home directory).&lt;BR /&gt;If the key offered isn't authorized, if PasswordAuthentication is set to yes, then the user will be permitted to enter a password for authentication.&lt;/P&gt;
&lt;P&gt;Hope that makes it clear.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Oct 2025 20:21:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Cloud-Firewall/User-authentication-via-SSH-using-passwords-on-Security-Gateways/m-p/260516#M5564</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-10-21T20:21:22Z</dc:date>
    </item>
  </channel>
</rss>

