<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity Awareness, password rotation, and gMSA (Group Managed Service Accounts) in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/64413#M12937</link>
    <description>This gets into the whole "should we change passwords at all" debate.&lt;BR /&gt;Assuming the password is complex and long enough, I would personally say...no.&lt;BR /&gt; I assume the "safest" way to change the password would be to do it during an outage window.</description>
    <pubDate>Sat, 05 Oct 2019 04:41:42 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-10-05T04:41:42Z</dc:date>
    <item>
      <title>Identity Awareness, password rotation, and gMSA (Group Managed Service Accounts)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/48157#M12935</link>
      <description>&lt;P&gt;A feature request for ID Awareness - to simplify password rotations on service accounts for Identity Collector or even LDAP account units, it would be great to see support for gMSAs (&lt;A href="https://docs.microsoft.com/en-us/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview" target="_self"&gt;Group Managed Service Accounts&lt;/A&gt;).&amp;nbsp; These handle the password rotation automatically, and securely.&lt;/P&gt;&lt;P&gt;Until then, however, any recommendations for ID Awareness / Identity Collector for password rotation without impacting service?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Mar 2019 17:57:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/48157#M12935</guid>
      <dc:creator>phlrnnr</dc:creator>
      <dc:date>2019-03-21T17:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness, password rotation, and gMSA (Group Managed Service Accounts)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/64381#M12936</link>
      <description>&lt;P&gt;Does anyone have any thoughts around password rotation of the LDAP Account Unit service accounts in a way that minimizes impact to an Identity Collector setup?&amp;nbsp; I'm guessing anyone that logs in during the password change process will not get any group information tied to their authentications, and policy will not work well with them.&lt;/P&gt;&lt;P&gt;Even worse, would be what happened &lt;A href="https://community.checkpoint.com/t5/Access-Control-Products/Identity-Awareness-Issues-after-resetting-AD-service-account/m-p/55532" target="_self"&gt;here&lt;/A&gt;...&lt;/P&gt;&lt;P&gt;Any ideas to minimize the impact, other than setting the password to never expire?&lt;/P&gt;</description>
      <pubDate>Fri, 04 Oct 2019 15:30:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/64381#M12936</guid>
      <dc:creator>phlrnnr</dc:creator>
      <dc:date>2019-10-04T15:30:19Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness, password rotation, and gMSA (Group Managed Service Accounts)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/64413#M12937</link>
      <description>This gets into the whole "should we change passwords at all" debate.&lt;BR /&gt;Assuming the password is complex and long enough, I would personally say...no.&lt;BR /&gt; I assume the "safest" way to change the password would be to do it during an outage window.</description>
      <pubDate>Sat, 05 Oct 2019 04:41:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/64413#M12937</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-05T04:41:42Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness, password rotation, and gMSA (Group Managed Service Accounts)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/64471#M12938</link>
      <description>&lt;P&gt;While I understand where you are coming from, and mostly agree in this instance, we live in a world where Security policy often requires fairly frequent password rotations of service accounts.&amp;nbsp; Therefore, anything Checkpoint can do to minimize the impact of those rotations would be helpful.&lt;/P&gt;&lt;P&gt;I can avoid an outage on the Identity Collector side by using 2 IDC servers and 2 different accounts that rotate separately.&amp;nbsp; However, the LDAP account unit is the bigger pain point as changing it will cause an outage for some users.&amp;nbsp; Anything Checkpoint can do to eliminate that would be helpful.&lt;/P&gt;&lt;P&gt;As to your suggestion to do it safely in an "outage window" the whole point of having redundancy in clusters, multiple identity collector servers, etc is to avoid an outage completely.&amp;nbsp; Now I have to try to sell to management an outage every X number of months based on the Security policy currently in effect.&amp;nbsp; That is a tough sell to a 24x7 operation.&lt;/P&gt;</description>
      <pubDate>Mon, 07 Oct 2019 14:06:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/64471#M12938</guid>
      <dc:creator>phlrnnr</dc:creator>
      <dc:date>2019-10-07T14:06:22Z</dc:date>
    </item>
    <item>
      <title>Re: Identity Awareness, password rotation, and gMSA (Group Managed Service Accounts)</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/64488#M12939</link>
      <description>The LDAP lookup actually happens on the gateway to change passwords.&lt;BR /&gt;To change that requires a Security Policy push, which may create its own service impact.</description>
      <pubDate>Mon, 07 Oct 2019 18:09:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-Awareness-password-rotation-and-gMSA-Group-Managed/m-p/64488#M12939</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-07T18:09:46Z</dc:date>
    </item>
  </channel>
</rss>

