<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Enabling AD password expiration warning/change and SupportOldSchema impact in an MDS enviornment in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259955#M50983</link>
    <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/107731"&gt;@jennyado&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I dont sadly have lab access atm as Im in Africa, but what I mentioned is my previous experience.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
    <pubDate>Wed, 15 Oct 2025 15:42:42 GMT</pubDate>
    <dc:creator>the_rock</dc:creator>
    <dc:date>2025-10-15T15:42:42Z</dc:date>
    <item>
      <title>Enabling AD password expiration warning/change and SupportOldSchema impact in an MDS enviornment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259872#M50957</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;I am reviewing the configuration to allow Active Directory users to &lt;STRONG&gt;receive a warning and change their password from the Check Point VPN Client&lt;/STRONG&gt; before their password expires, according to SKs &lt;STRONG&gt;sk33404&lt;/STRONG&gt; and &lt;STRONG&gt;sk89841&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;I have an &lt;STRONG&gt;MDS environment&lt;/STRONG&gt;, and I want to apply this configuration &lt;STRONG&gt;within a domain where I have 3 LDAP Account Units&lt;/STRONG&gt;, but I intend to enable this functionality &lt;STRONG&gt;only on one of them&lt;/STRONG&gt; so that VPN users can change their password through the client.&lt;/P&gt;&lt;P&gt;According to the documentation, the steps include:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Enable in &lt;STRONG&gt;Global Properties → User Directory&lt;/STRONG&gt; the option&lt;BR /&gt;&lt;STRONG&gt;“Enable Password change when a user's Active Directory password expires”&lt;/STRONG&gt;&lt;BR /&gt;(some articles indicate this is also required to allow password change before expiration).&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Ensure the &lt;STRONG&gt;LDAP Account Unit&lt;/STRONG&gt; is using the &lt;EM&gt;Microsoft_AD&lt;/EM&gt; profile with:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SSL enabled (TCP 636)&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Write data to this server&lt;/STRONG&gt; enabled&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;DN with sufficient permissions to modify passwords&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If the AD &lt;STRONG&gt;does not have the Check Point LDAP schema extended&lt;/STRONG&gt;, configure in GuiDBedit:&lt;/P&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;SPAN&gt;Tables &amp;gt; Managed Objects &amp;gt; LDAP &amp;gt; Microsoft_AD &amp;gt; &lt;SPAN class=""&gt;Common&lt;/SPAN&gt; &lt;SPAN class=""&gt;SupportOldSchema&lt;/SPAN&gt; &lt;SPAN class=""&gt;=&lt;/SPAN&gt; &lt;SPAN class=""&gt;1&lt;/SPAN&gt; &lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;(Optional, according to SK33404) In the LDAP Account Unit object where the change will be applied:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;IsPasswordWarning = True&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;PasswordWarningTime = &amp;lt;number of days&amp;gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;UseNativePwdParams = True&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;HR /&gt;&lt;H3&gt;&lt;span class="lia-unicode-emoji" title=":light_bulb:"&gt;💡&lt;/span&gt; My questions:&lt;/H3&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;SupportOldSchema interpretation:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If the AD &lt;EM&gt;does not have&lt;/EM&gt; the extended schema → SupportOldSchema = 1&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;If the AD &lt;EM&gt;does have&lt;/EM&gt; the extended schema → SupportOldSchema = 0&lt;BR /&gt;Is this correct?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Impact on other LDAP Account Units in the same domain:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Does enabling “Enable Password change when a user's AD password expires” on one LDAP Account Unit affect the other two LDAP Account Units?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Could changing SupportOldSchema on this LDAP Account Unit impact authentication or user queries for the other LDAP Account Units using the &lt;EM&gt;Microsoft_AD&lt;/EM&gt; profile?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Scope of warning parameters:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;If I apply IsPasswordWarning, PasswordWarningTime, and UseNativePwdParams &lt;STRONG&gt;only to this LDAP Account Unit&lt;/STRONG&gt;, does this affect any of the other LDAP Account Units that are not modified?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Will the other LDAP Account Units continue authenticating normally without any additional changes?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Impact on VPN and active sessions:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Could enabling these changes on this LDAP Account Unit &lt;STRONG&gt;interrupt or log out active VPN users&lt;/STRONG&gt; authenticating against this AD?&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;In other words, is it safe to enable these options in a production MDS environment without affecting existing sessions on other LDAP Account Units?&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;HR /&gt;&lt;P&gt;Any confirmation or practical experience with this configuration would be greatly appreciated — especially in MDS environments with multiple LDAP Account Units and VPN users authenticating simultaneously.&lt;/P&gt;&lt;P&gt;Thanks in advance &lt;span class="lia-unicode-emoji" title=":raising_hands:"&gt;🙌&lt;/span&gt;&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Wed, 15 Oct 2025 01:53:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259872#M50957</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2025-10-15T01:53:42Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling AD password expiration warning/change and SupportOldSchema impact in an MDS enviornment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259876#M50958</link>
      <description>&lt;P&gt;Oldschema parameter option, you got that right. Does not affect other ldap account units if changed on one and no, ALREADY logged users would stay logged in.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 04:00:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259876#M50958</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-15T04:00:20Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling AD password expiration warning/change and SupportOldSchema impact in an MDS enviornment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259955#M50983</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/107731"&gt;@jennyado&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I dont sadly have lab access atm as Im in Africa, but what I mentioned is my previous experience.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 15:42:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259955#M50983</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-15T15:42:42Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling AD password expiration warning/change and SupportOldSchema impact in an MDS enviornment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259962#M50984</link>
      <description>&lt;P&gt;Thanks a lot for the reply — really appreciate you taking the time to share your experience, especially while abroad! &lt;span class="lia-unicode-emoji" title=":globe_showing_europe_africa:"&gt;🌍&lt;/span&gt;&lt;BR /&gt;Your confirmation about the impact on other LDAP Account Units and active VPN users was super helpful.&lt;/P&gt;&lt;P&gt;Just to clarify one last thing:&lt;BR /&gt;When setting the SupportOldSchema value in&lt;/P&gt;&lt;P&gt;Tables &amp;gt; Managed Objects &amp;gt; LDAP &amp;gt; Microsoft_AD &amp;gt; Common&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="SupportOldSchema.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/31731i6A70E5F62C3AAC65/image-size/medium?v=v2&amp;amp;px=400" role="button" title="SupportOldSchema.png" alt="SupportOldSchema.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;it looks like this parameter applies to the Microsoft_AD profile itself, not to each individual LDAP Account Unit.&lt;/P&gt;&lt;P&gt;If that’s correct, then all LDAP Account Units that use this same profile would inherit that value, right?&lt;BR /&gt;I’m currently checking with the AD team whether their directory is using the extended Check Point schema or not, so I just want to confirm if changing this parameter would affect all LDAP Account Units in the domain that use the Microsoft_AD profile.&lt;/P&gt;&lt;P&gt;Would you confirm if this behavior is global per profile, and if creating a duplicate profile (for example, “Microsoft_AD_NoSchema”) would be the proper way to isolate it if needed?&lt;/P&gt;&lt;P&gt;Thanks again for your help and time!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 15:59:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259962#M50984</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2025-10-15T15:59:00Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling AD password expiration warning/change and SupportOldSchema impact in an MDS enviornment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259964#M50985</link>
      <description>&lt;P&gt;Its no issue, raining here like crazy, so nothing better to do haha. Im sure that setting would indeed affect all account units. I do know one customer who added no schema value and it worked for them, but this was while ago, might be worth confirming with TAC.&lt;/P&gt;
&lt;P&gt;Best,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 16:03:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/259964#M50985</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-15T16:03:26Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling AD password expiration warning/change and SupportOldSchema impact in an MDS enviornment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/260014#M50997</link>
      <description>&lt;P&gt;Thanks a lot for your help and for taking the time to reply — really appreciate it!&lt;BR /&gt;I’ve already opened a TAC case to confirm how that behavior works in the latest versions, just to be fully sure before applying any change.&lt;/P&gt;&lt;P&gt;Enjoy the rest of your vacation (hopefully the rain lets up soon)! &lt;span class="lia-unicode-emoji" title=":cloud_with_rain:"&gt;🌧&lt;/span&gt;️&lt;span class="lia-unicode-emoji" title=":grinning_face_with_smiling_eyes:"&gt;😄&lt;/span&gt;&lt;BR /&gt;Thanks again for the support!&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 23:43:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/260014#M50997</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2025-10-15T23:43:14Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling AD password expiration warning/change and SupportOldSchema impact in an MDS enviornment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/260015#M50998</link>
      <description>&lt;P&gt;Thank you! Yes, rain stopped, but its 1 am here, time to sleep lol&lt;/P&gt;
&lt;P&gt;Cheers,&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 15 Oct 2025 23:51:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/260015#M50998</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-15T23:51:05Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling AD password expiration warning/change and SupportOldSchema impact in an MDS enviornment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/260208#M51037</link>
      <description>&lt;P&gt;Based on the guidence recevied from TAC, these are my comments:&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;SupportOldSchema Parameter&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;This parameter is defined at the &lt;STRONG&gt;Microsoft_AD profile level&lt;/STRONG&gt;:&lt;BR /&gt;Tables → Managed Objects → LDAP → Microsoft_AD → Common&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Any change to this value affects all LDAP Account Units using this profile.&lt;/STRONG&gt;&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;&lt;STRONG&gt;Recommendation:&lt;/STRONG&gt; create a duplicate profile (e.g., Microsoft_AD_PwdChange) and assign it only to the LDAP Account Unit where the password expiration functionality is needed.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Global Option: “Enable Password change when a user's AD password expires”&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;This setting enables password-change workflows across all LDAP Account Units globally.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Only properly configured LDAP Account Units (correct profile, SSL enabled, write permissions, schema handling) will actually use the feature.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Other LDAP Account Units continue operating normally.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 20:55:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/260208#M51037</guid>
      <dc:creator>jennyado</dc:creator>
      <dc:date>2025-10-17T20:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Enabling AD password expiration warning/change and SupportOldSchema impact in an MDS enviornment</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/260211#M51038</link>
      <description>&lt;P&gt;Excellent!&lt;/P&gt;</description>
      <pubDate>Fri, 17 Oct 2025 21:00:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Enabling-AD-password-expiration-warning-change-and/m-p/260211#M51038</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-10-17T21:00:14Z</dc:date>
    </item>
  </channel>
</rss>

