<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: gaia api access for tacacs users in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154198#M7022</link>
    <description>&lt;P&gt;Yes. Define the user in clish, but don't assign a password. This allows you to add an RBA role. The role needs to include permissions for API calls, most (maybe all?) of which start with 'expert_api_'. Once the user is created and the RBA role is assigned, you need to use&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;gaia_api access --user &amp;lt;user&amp;gt; --enable true&lt;/PRE&gt;
&lt;P&gt;as described in the link.&lt;/P&gt;
&lt;P&gt;Linux uses a subsystem called PAM for authenticating users. With how PAM is set up on Check Point systems, local passwords are tried first, then TACACS and RADIUS. By not defining a password for the user in clish, that check fails and falls through to the central authentication options.&lt;/P&gt;</description>
    <pubDate>Fri, 29 Jul 2022 18:25:39 GMT</pubDate>
    <dc:creator>Bob_Zimmerman</dc:creator>
    <dc:date>2022-07-29T18:25:39Z</dc:date>
    <item>
      <title>gaia api access for tacacs users</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154116#M7019</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;is there a way to give access to the gaia api to tacacs users?&lt;BR /&gt;&lt;BR /&gt;&amp;nbsp;&lt;A href="https://sc1.checkpoint.com/documents/latest/GaiaAPIs/#api_access~v1.6%20\" target="_blank"&gt;https://sc1.checkpoint.com/documents/latest/GaiaAPIs/#api_access~v1.6%20\&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2022 15:30:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154116#M7019</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2022-07-28T15:30:44Z</dc:date>
    </item>
    <item>
      <title>Re: gaia api access for tacacs users</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154120#M7020</link>
      <description>&lt;P&gt;I assume the users are not locally defined in Gaia, correct?&lt;BR /&gt;That may be a requirement for this option, not entirely sure.&lt;/P&gt;</description>
      <pubDate>Thu, 28 Jul 2022 17:19:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154120#M7020</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-07-28T17:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: gaia api access for tacacs users</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154144#M7021</link>
      <description>&lt;P&gt;It was defined locally but I had to&amp;nbsp; add "add rba user USER roles adminRole" and now it works.&lt;BR /&gt;I guess there is no equivalent&amp;nbsp; api command to&amp;nbsp; the cli "tacacs_enable TACP-15"&amp;nbsp; command, right?&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 09:00:09 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154144#M7021</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2022-07-29T09:00:09Z</dc:date>
    </item>
    <item>
      <title>Re: gaia api access for tacacs users</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154198#M7022</link>
      <description>&lt;P&gt;Yes. Define the user in clish, but don't assign a password. This allows you to add an RBA role. The role needs to include permissions for API calls, most (maybe all?) of which start with 'expert_api_'. Once the user is created and the RBA role is assigned, you need to use&amp;nbsp;&lt;/P&gt;
&lt;PRE&gt;gaia_api access --user &amp;lt;user&amp;gt; --enable true&lt;/PRE&gt;
&lt;P&gt;as described in the link.&lt;/P&gt;
&lt;P&gt;Linux uses a subsystem called PAM for authenticating users. With how PAM is set up on Check Point systems, local passwords are tried first, then TACACS and RADIUS. By not defining a password for the user in clish, that check fails and falls through to the central authentication options.&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 18:25:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154198#M7022</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-07-29T18:25:39Z</dc:date>
    </item>
    <item>
      <title>Re: gaia api access for tacacs users</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154199#M7023</link>
      <description>&lt;P&gt;Yeah thanks, all works. The only think is that I would like to be able to use a non admin user for read_only type of api queries&lt;/P&gt;</description>
      <pubDate>Fri, 29 Jul 2022 18:29:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154199#M7023</guid>
      <dc:creator>Luis_Miguel_Mig</dc:creator>
      <dc:date>2022-07-29T18:29:24Z</dc:date>
    </item>
    <item>
      <title>Re: gaia api access for tacacs users</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154202#M7024</link>
      <description>&lt;LI-CODE lang="markup"&gt;add rba role ansibleRO domain-type System readonly-features expert_api_Messages,expert_api_Misc,expert_api_NTP,expert_api_aaa,expert_api_allowed-clients,expert_api_asset,expert_api_backup,expert_api_cphaprob,expert_api_cpstat,expert_api_dhcp-server,expert_api_diagnostics,expert_api_dns,expert_api_files,expert_api_ftw,expert_api_groups,expert_api_hostname,expert_api_interface,expert_api_ioc-feeder,expert_api_ipv6,expert_api_license,expert_api_lldp,expert_api_passwordcontrols,expert_api_proxy
add rba role ansibleRO domain-type System readonly-features expert_api_route,expert_api_routes,expert_api_runScript,expert_api_server-status,expert_api_snapshot,expert_api_snmp,expert_api_syslog,expert_api_system,expert_api_versions
...&lt;/LI-CODE&gt;</description>
      <pubDate>Fri, 29 Jul 2022 19:07:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/154202#M7024</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2022-07-29T19:07:32Z</dc:date>
    </item>
    <item>
      <title>Re: gaia api access for tacacs users</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/189612#M7949</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Works like a charm!&lt;BR /&gt;&lt;BR /&gt;But why is then there the option "&lt;SPAN&gt;gaia_api access -u unlocal_users -e true"?&lt;BR /&gt;When I try it without&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/27871"&gt;@Bob_Zimmerman&lt;/a&gt; local created user - the tacacs user logs into the API successfully with TACP-0 but cannot execute any commands. Although i added the REST API Calls to the TACP-0 Role.&lt;BR /&gt;&lt;BR /&gt;The official documentation for this is not helpful &lt;span class="lia-unicode-emoji" title=":face_with_rolling_eyes:"&gt;🙄&lt;/span&gt; Unfortunately that's not the first time where the documentation is not answering all questions... luckily we have check mates!&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Aug 2023 14:09:55 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/189612#M7949</guid>
      <dc:creator>D_W</dc:creator>
      <dc:date>2023-08-16T14:09:55Z</dc:date>
    </item>
    <item>
      <title>Re: gaia api access for tacacs users</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/189852#M7953</link>
      <description>&lt;P&gt;Itried to see if it works for _nonlocl user&amp;nbsp; .....&lt;/P&gt;
&lt;P&gt;]# gaia_api access --user _nonlocl --enable true&lt;BR /&gt;Grant Access: User '_nonlocl' doesn't exist&lt;/P&gt;
&lt;P&gt;Too bad it didn't. That would solve it all at once.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Aug 2023 06:40:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/gaia-api-access-for-tacacs-users/m-p/189852#M7953</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2023-08-18T06:40:20Z</dc:date>
    </item>
  </channel>
</rss>

