<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: teapi in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233340#M8855</link>
    <description>&lt;P&gt;It appears the teapi leverages UserCheck, which has a portal certificate you can replace.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk113599" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk113599&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 21 Nov 2024 00:03:36 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2024-11-21T00:03:36Z</dc:date>
    <item>
      <title>teapi</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233176#M8846</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;
&lt;P&gt;So, we are trying to connect to the teapi and getting an error on our self-signed certificate is not trusted.&lt;/P&gt;
&lt;P&gt;Where do I export my manager's certificate &amp;amp; how can I code this (python) so it is trusted rather than ignored?&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 19 Nov 2024 20:53:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233176#M8846</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2024-11-19T20:53:52Z</dc:date>
    </item>
    <item>
      <title>Re: teapi</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233276#M8850</link>
      <description>&lt;P&gt;It's not the certificate necessarily, it's the Certificate Authority (which is presumably the ICA).&lt;BR /&gt;You might need to use the ICA Management Tool to get it: &lt;A href="https://support.checkpoint.com/results/sk/sk30501" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk30501&lt;/A&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Coding acceptance of this in Python is a separate question.&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 15:17:26 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233276#M8850</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-11-20T15:17:26Z</dc:date>
    </item>
    <item>
      <title>Re: teapi</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233319#M8852</link>
      <description>&lt;P&gt;The developers would prefer to use a wildcard certificate rather than use the CA, becuase they think it will be more of a security risk and harder to manage changes.&amp;nbsp;&amp;nbsp; Is there a way to use my gateway's certificate (signed), &lt;A href="https://hostname.my.domain/teapi/et" target="_blank" rel="noopener"&gt;https://hostname.my.domain:18194/teapi/etc&amp;nbsp;&lt;/A&gt;and force the api to use it instead of the ica reference to my manager?&lt;/P&gt;</description>
      <pubDate>Wed, 20 Nov 2024 19:07:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233319#M8852</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2024-11-20T19:07:24Z</dc:date>
    </item>
    <item>
      <title>Re: teapi</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233340#M8855</link>
      <description>&lt;P&gt;It appears the teapi leverages UserCheck, which has a portal certificate you can replace.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk113599" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk113599&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 00:03:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233340#M8855</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-11-21T00:03:36Z</dc:date>
    </item>
    <item>
      <title>Re: teapi</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233423#M8858</link>
      <description>&lt;P&gt;Isn't usercheck exclusively for browser connectivity vs a python script to 18194?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 14:05:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233423#M8858</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2024-11-21T14:05:34Z</dc:date>
    </item>
    <item>
      <title>Re: teapi</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233445#M8859</link>
      <description>&lt;P&gt;That makes more sense as UserCheck is used for the "user facing" parts of Threat Emulation/Extraction.&lt;BR /&gt;The SK I linked suggests that the relevant Internal CA is what you need to trust as that's how it is configured in SmartEndpoint.&lt;BR /&gt;Don't believe there is a supported way to change the API endpoint certificate.&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 16:46:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233445#M8859</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-11-21T16:46:42Z</dc:date>
    </item>
    <item>
      <title>Re: teapi</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233446#M8860</link>
      <description>&lt;P&gt;I agree, that I need to trust the ICA.&amp;nbsp;&amp;nbsp; Does that change every year now?&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 16:48:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233446#M8860</guid>
      <dc:creator>Daniel_Kavan</dc:creator>
      <dc:date>2024-11-21T16:48:25Z</dc:date>
    </item>
    <item>
      <title>Re: teapi</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233448#M8861</link>
      <description>&lt;P&gt;At least for fresh installs of recent versions (e.g. R81.20), the CA should be valid until end of 2037.&lt;BR /&gt;You can verify this by viewing the internal_ca object (under Servers &amp;gt; Trusted CA in the Objects Explorer).&lt;/P&gt;</description>
      <pubDate>Thu, 21 Nov 2024 17:05:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/teapi/m-p/233448#M8861</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-11-21T17:05:35Z</dc:date>
    </item>
  </channel>
</rss>

