<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: GAIA Password Policy - Deny access to unused accounts in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179275#M29873</link>
    <description>&lt;P&gt;If you’re using an external system for authentication (e.g. RADIUS), it’s probably better to enforce this on the authentication server instead of on Gaia.&lt;/P&gt;</description>
    <pubDate>Thu, 27 Apr 2023 00:04:07 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2023-04-27T00:04:07Z</dc:date>
    <item>
      <title>GAIA Password Policy - Deny access to unused accounts</title>
      <link>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179267#M29869</link>
      <description>&lt;P&gt;We have a client that has a enterprise identity access system that controls logon, password rotation and complexity to access systems like GAIA. They would like to turn on "Deny access to unused accounts". The admin account in GAIA is considered a "break glass" account and not normally used unless there was an emergency and the identity access system not available (identity access system does not include the admin account). As per the documentation "If there were no successful login attempts within a set time, the user is locked out and cannot log in". Can anyone confirm this would apply to the default admin account as well? I'm sure it does and would result in admin being locked out.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2023 20:12:36 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179267#M29869</guid>
      <dc:creator>John_Richards</dc:creator>
      <dc:date>2023-04-26T20:12:36Z</dc:date>
    </item>
    <item>
      <title>Re: GAIA Password Policy - Deny access to unused accounts</title>
      <link>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179271#M29870</link>
      <description>&lt;P&gt;It does apply, I tested this couple of times before.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2023 21:27:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179271#M29870</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-04-26T21:27:23Z</dc:date>
    </item>
    <item>
      <title>Re: GAIA Password Policy - Deny access to unused accounts</title>
      <link>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179272#M29871</link>
      <description>&lt;P&gt;So, if that is the case is there a way around this so it would "not" apply to the admin account. A bit silly to lock out the admin account.&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2023 21:29:32 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179272#M29871</guid>
      <dc:creator>John_Richards</dc:creator>
      <dc:date>2023-04-26T21:29:32Z</dc:date>
    </item>
    <item>
      <title>Re: GAIA Password Policy - Deny access to unused accounts</title>
      <link>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179273#M29872</link>
      <description>&lt;P&gt;Personally, I dont think its silly, because think of it this way...if admin has not logged in for 365 days, chances are they wont log in day 366 either lol&lt;/P&gt;
&lt;P&gt;Anyway, I dont see any option to change that per user, either in web UI or clish&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Wed, 26 Apr 2023 21:39:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179273#M29872</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-04-26T21:39:18Z</dc:date>
    </item>
    <item>
      <title>Re: GAIA Password Policy - Deny access to unused accounts</title>
      <link>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179275#M29873</link>
      <description>&lt;P&gt;If you’re using an external system for authentication (e.g. RADIUS), it’s probably better to enforce this on the authentication server instead of on Gaia.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 00:04:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179275#M29873</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2023-04-27T00:04:07Z</dc:date>
    </item>
    <item>
      <title>Re: GAIA Password Policy - Deny access to unused accounts</title>
      <link>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179283#M29874</link>
      <description>&lt;P&gt;Definitely makes more sense in this case.&lt;/P&gt;</description>
      <pubDate>Thu, 27 Apr 2023 00:50:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/GAIA-Password-Policy-Deny-access-to-unused-accounts/m-p/179283#M29874</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2023-04-27T00:50:28Z</dc:date>
    </item>
  </channel>
</rss>

