<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Third Parties Certificate details in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/76940#M15649</link>
    <description>&lt;P&gt;API commands for user management are still on the roadmap.&lt;BR /&gt;&lt;BR /&gt;However,&amp;nbsp;&lt;/P&gt;
&lt;PRE class="p1"&gt;&lt;SPAN class="s1"&gt; echo -e "query users\n-q\n" |dbedit -local&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;with some additional greps should do the trick&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 03 Mar 2020 08:09:33 GMT</pubDate>
    <dc:creator>_Val_</dc:creator>
    <dc:date>2020-03-03T08:09:33Z</dc:date>
    <item>
      <title>Third Parties Certificate details</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/76911#M15641</link>
      <description>&lt;P&gt;Hi There,&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT face="courier new,courier" color="#0000FF"&gt;cpca_client lscert&lt;/FONT&gt;&lt;/STRONG&gt; will list only the details of internal certificates,&amp;nbsp;just wonder if anyone out there aware of a CLI command -or API call- to get the details for any third party used certificate on the SMS.&lt;/P&gt;&lt;P&gt;We were caught of a certificate expiring -causing impact on remote users, which we're trying to avoid by creating a cron job -or something similar- to alert us, but first we need to get the command to extract the information.&lt;/P&gt;&lt;P&gt;Many thanks as always&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Mar 2020 21:57:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/76911#M15641</guid>
      <dc:creator>_Daniel_</dc:creator>
      <dc:date>2020-03-02T21:57:16Z</dc:date>
    </item>
    <item>
      <title>Re: Third Parties Certificate details</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/76919#M15644</link>
      <description>&lt;P&gt;Doesn't appear to be API support for this, and I'm not aware of any way to pull this over the CLI.&lt;BR /&gt;Might be an RFE.&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1046"&gt;@Eran_Habad&lt;/a&gt;&lt;SPAN style="font-family: inherit;"&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 01:43:34 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/76919#M15644</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-03T01:43:34Z</dc:date>
    </item>
    <item>
      <title>Re: Third Parties Certificate details</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/76940#M15649</link>
      <description>&lt;P&gt;API commands for user management are still on the roadmap.&lt;BR /&gt;&lt;BR /&gt;However,&amp;nbsp;&lt;/P&gt;
&lt;PRE class="p1"&gt;&lt;SPAN class="s1"&gt; echo -e "query users\n-q\n" |dbedit -local&lt;/SPAN&gt;&lt;/PRE&gt;
&lt;P class="p1"&gt;&lt;SPAN class="s1"&gt;with some additional greps should do the trick&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Mar 2020 08:09:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/76940#M15649</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-03-03T08:09:33Z</dc:date>
    </item>
    <item>
      <title>Re: Third Parties Certificate details</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/77050#M15669</link>
      <description>&lt;P&gt;Thanks both,&lt;/P&gt;&lt;P&gt;Though not after the user details in particular rather the third party certificate's details installed on the gateway for remote users connecting to.&lt;/P&gt;&lt;P&gt;Will keep a close eye&lt;/P&gt;&lt;P&gt;Cheers&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 03:45:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/77050#M15669</guid>
      <dc:creator>_Daniel_</dc:creator>
      <dc:date>2020-03-04T03:45:18Z</dc:date>
    </item>
    <item>
      <title>Re: Third Parties Certificate details</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/77070#M15674</link>
      <description>&lt;P&gt;Even easier, you can query GW with HTTPS on SSL portal and script certificate expiration retrieval.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 07:26:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/77070#M15674</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2020-03-04T07:26:46Z</dc:date>
    </item>
    <item>
      <title>Re: Third Parties Certificate details</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/77123#M15682</link>
      <description>&lt;P&gt;From management where gateway/cluster is managed:&lt;/P&gt;
&lt;P&gt;fwm printcert -obj &amp;lt;MANAGED_GATEWAY_NAME&amp;gt;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Mar 2020 13:44:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/77123#M15682</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2020-03-04T13:44:13Z</dc:date>
    </item>
    <item>
      <title>Re: Third Parties Certificate details</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/77201#M15700</link>
      <description>Pretty sure that doesn't work for OPSEC CAs.&lt;BR /&gt;It returned an empty result on my R80.40 Manager where I have at least one OPSEC CA configured.</description>
      <pubDate>Thu, 05 Mar 2020 00:00:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/77201#M15700</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-05T00:00:49Z</dc:date>
    </item>
    <item>
      <title>Re: Third Parties Certificate details</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/78212#M15936</link>
      <description>&lt;P&gt;&lt;SPAN&gt;fwm printcert -ca &amp;lt;CA_NAME&amp;gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 13:54:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/78212#M15936</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2020-03-13T13:54:24Z</dc:date>
    </item>
    <item>
      <title>Re: Third Parties Certificate details</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/78255#M15947</link>
      <description>&lt;P&gt;Sure enough that works.&lt;/P&gt;
&lt;P class="p1 lia-indent-padding-left-30px"&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;[Expert@R8040Mgmt:0]# &lt;STRONG&gt;fwm printcert -ca testca&lt;/STRONG&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Subject: CN=ISRG Root X1,O=Internet Security Research Group,C=US&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Issuer: CN=ISRG Root X1,O=Internet Security Research Group,C=US&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Not Valid Before: Thu Jun&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;4 04:04:38 2015 Local Time&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Not Valid After:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;Mon Jun&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;4 04:04:38 2035 Local Time&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Serial No.:&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp; &lt;/SPAN&gt;008210cfb0d240e3594463e0bb63828b00&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Public Key: RSA (4096 bits)&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Signature: RSA with SHA256&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN class="s1"&gt;Key Usage:&lt;BR /&gt;&lt;/SPAN&gt;&lt;SPAN style="font-family: inherit;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; keyCertSign&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; cRLSign&lt;BR /&gt;&lt;/SPAN&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;Basic Constraint:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;SPAN style="font-family: 'courier new', courier;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; is CA&lt;BR /&gt;&lt;/SPAN&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;MD5 Fingerprint:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;&lt;SPAN class="Apple-converted-space"&gt;&amp;nbsp;&amp;nbsp; &lt;/SPAN&gt;0C:D2:F9:E0:DA:17:73:E9:ED:86:4D:A5:E3:70:E7:4E&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;SHA-1 Fingerprints:&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;1. CA:BD:2A:79:A1:07:6A:31:F2:1D:25:36:35:CB:03:9D:43:29:A5:E8&lt;BR /&gt;&lt;/SPAN&gt;&lt;/FONT&gt;&lt;FONT face="courier new,courier"&gt;&lt;SPAN class="s1"&gt;2. OWNS TERM INCA TOY DRAM HAL ULAN TENT AQUA COST LINT RENT&lt;/SPAN&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P class="p1"&gt;Nice work &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 13 Mar 2020 22:40:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/78255#M15947</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-03-13T22:40:04Z</dc:date>
    </item>
    <item>
      <title>Re: Third Parties Certificate details</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/78357#M15966</link>
      <description>&lt;P&gt;Thanks Jozko,&lt;/P&gt;&lt;P&gt;This command perfectly lists the CA details, not though the certificate(s) generated -and assigned to a particular gateway- by this CA itself.&lt;/P&gt;&lt;P&gt;I've tried another flavor of it:&amp;nbsp; fwm printcert -obj &amp;lt;&lt;EM&gt;gateway&lt;/EM&gt;&amp;gt;-cert &amp;lt;&lt;EM&gt;cert nickname&lt;/EM&gt;&amp;gt; but didn't list the details we're after, rather it listed the certificate generated by the internal CA. Adding or removing the -cert option didn't make any difference in our case&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wish this command got an option as below:&lt;/P&gt;&lt;P&gt;fwm printcert -ca &amp;lt;&lt;EM&gt;3rd party CA&lt;/EM&gt;&amp;gt; -cert &amp;lt;&lt;EM&gt;cert nickname&lt;/EM&gt;&amp;gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But I still think, if the GUI can list the details, then there should be a CLI command to do it as well... I'm still digging &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 15 Mar 2020 19:47:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Third-Parties-Certificate-details/m-p/78357#M15966</guid>
      <dc:creator>_Daniel_</dc:creator>
      <dc:date>2020-03-15T19:47:07Z</dc:date>
    </item>
  </channel>
</rss>

