<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic MFA Behavior on Gaia Portal – R81.20 Jumbo Hotfix Take 118 and 113 in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/261796#M44286</link>
    <description>&lt;P&gt;&lt;STRONG&gt;Hi everyone,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I need some help because I’m experiencing strange behavior on the Gaia portal.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Check Point version: R81.20&lt;/LI&gt;&lt;LI&gt;Jumbo Hotfix: Take 118 and Take 113&lt;/LI&gt;&lt;LI&gt;MFA configured on Gaia portal&lt;/LI&gt;&lt;LI&gt;Browser: Google Chrome&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Issue:&lt;/STRONG&gt; I successfully log in to the Gaia portal using username, password, and MFA token. After finishing my work, I log out from the portal and close the tab, but I do not close the browser. Later, when I reopen the Gaia portal, I log in with username and password and enter a &lt;STRONG&gt;completely incorrect MFA code&lt;/STRONG&gt; (for example: 123456). The login is still &lt;STRONG&gt;successful&lt;/STRONG&gt;. The same happens if I open a new browser tab or even a &lt;STRONG&gt;new browser window&lt;/STRONG&gt; alongside the old one. I tested this on multiple gateways and got the same result.&lt;BR /&gt;Additionally, if the Gaia portal logs me out automatically because the session expired, I can still log in afterward with &lt;STRONG&gt;any MFA code&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My questions:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Did I misconfigure something?&lt;/LI&gt;&lt;LI&gt;Or is this a known issue in these versions?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Thanks in advance for your help!&lt;/P&gt;</description>
    <pubDate>Tue, 04 Nov 2025 20:22:35 GMT</pubDate>
    <dc:creator>ByTi</dc:creator>
    <dc:date>2025-11-04T20:22:35Z</dc:date>
    <item>
      <title>MFA Behavior on Gaia Portal – R81.20 Jumbo Hotfix Take 118 and 113</title>
      <link>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/261796#M44286</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hi everyone,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;I need some help because I’m experiencing strange behavior on the Gaia portal.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Check Point version: R81.20&lt;/LI&gt;&lt;LI&gt;Jumbo Hotfix: Take 118 and Take 113&lt;/LI&gt;&lt;LI&gt;MFA configured on Gaia portal&lt;/LI&gt;&lt;LI&gt;Browser: Google Chrome&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;STRONG&gt;Issue:&lt;/STRONG&gt; I successfully log in to the Gaia portal using username, password, and MFA token. After finishing my work, I log out from the portal and close the tab, but I do not close the browser. Later, when I reopen the Gaia portal, I log in with username and password and enter a &lt;STRONG&gt;completely incorrect MFA code&lt;/STRONG&gt; (for example: 123456). The login is still &lt;STRONG&gt;successful&lt;/STRONG&gt;. The same happens if I open a new browser tab or even a &lt;STRONG&gt;new browser window&lt;/STRONG&gt; alongside the old one. I tested this on multiple gateways and got the same result.&lt;BR /&gt;Additionally, if the Gaia portal logs me out automatically because the session expired, I can still log in afterward with &lt;STRONG&gt;any MFA code&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;My questions:&lt;/STRONG&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;Did I misconfigure something?&lt;/LI&gt;&lt;LI&gt;Or is this a known issue in these versions?&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Thanks in advance for your help!&lt;/P&gt;</description>
      <pubDate>Tue, 04 Nov 2025 20:22:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/261796#M44286</guid>
      <dc:creator>ByTi</dc:creator>
      <dc:date>2025-11-04T20:22:35Z</dc:date>
    </item>
    <item>
      <title>Re: MFA Behavior on Gaia Portal – R81.20 Jumbo Hotfix Take 118 and 113</title>
      <link>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/261825#M44287</link>
      <description>&lt;P&gt;A TAC case is probably in order here.&lt;/P&gt;</description>
      <pubDate>Wed, 05 Nov 2025 00:08:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/261825#M44287</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-11-05T00:08:14Z</dc:date>
    </item>
    <item>
      <title>Re: MFA Behavior on Gaia Portal – R81.20 Jumbo Hotfix Take 118 and 113</title>
      <link>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/262110#M44324</link>
      <description>&lt;P&gt;Is it same issue with a different browser?&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 02:59:13 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/262110#M44324</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-07T02:59:13Z</dc:date>
    </item>
    <item>
      <title>Re: MFA Behavior on Gaia Portal – R81.20 Jumbo Hotfix Take 118 and 113</title>
      <link>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/262135#M44326</link>
      <description>&lt;P&gt;Same result here, tested with multiple browsers.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Additional information:&lt;/STRONG&gt;&lt;BR /&gt;At no point is the correct token required for login; even the first attempt accepts an invalid token. SSH also does not request any verification code.&lt;BR /&gt;Gateways were upgraded from R81.10 to R81.20 using Gaia Fresh Install + upgrade. Open servers are running a completely fresh R81.20 installation.&lt;/P&gt;&lt;P&gt;I noticed that on the tested gateways, under &lt;STRONG&gt;User Management → Roles&lt;/STRONG&gt;, the &lt;EM&gt;adminRole&lt;/EM&gt; group has &lt;STRONG&gt;203 features&lt;/STRONG&gt;. There is another gateway that was delivered later with R81.20 pre-installed – MFA works correctly on both the web and SSH interfaces there, and its &lt;EM&gt;adminRole&lt;/EM&gt; contains &lt;STRONG&gt;214 features&lt;/STRONG&gt;.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Audit log snippet with invalid token:&lt;BR /&gt;&lt;/STRONG&gt;type=LOGIN msg=audit(1762336201.069:613): pid=9951 uid=0 subj=kernel old-auid=4294967295 auid=0 tty=(none) old-ses=4294967295 ses=88 res=1&lt;BR /&gt;type=USER_START msg=audit(1762336201.069:614): pid=9951 uid=0 auid=0 ses=88 subj=kernel msg='op=PAM:session_open grantors=pam_loginuid,pam_keyinit,pam_limits acct=root exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)'&lt;BR /&gt;type=CRED_DISP msg=audit(1762336201.092:615): pid=9951 uid=0 auid=0 ses=88 subj=kernel msg='op=PAM:setcred grantors=pam_rootok acct=root exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)'&lt;BR /&gt;type=USER_END msg=audit(1762336201.092:616): pid=9951 uid=0 auid=0 ses=88 subj=kernel msg='op=PAM:session_close grantors=pam_loginuid,pam_keyinit,pam_limits acct=root exe="/usr/sbin/crond" (hostname=?, addr=?, terminal=cron res=success)'&lt;BR /&gt;type=USER_AUTH msg=audit(1762336304.985:617): pid=10906 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='op=PAM:authentication grantors=pam_dof_tally,cp_pam_tally,pam_unix acct="userxxx" exe="/usr/sbin/sshd" hostname=10.10.0.100 addr=10.10.0.100 terminal=ssh res=success'&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 08:13:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/262135#M44326</guid>
      <dc:creator>ByTi</dc:creator>
      <dc:date>2025-11-07T08:13:19Z</dc:date>
    </item>
    <item>
      <title>Re: MFA Behavior on Gaia Portal – R81.20 Jumbo Hotfix Take 118 and 113</title>
      <link>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/262147#M44328</link>
      <description>&lt;P&gt;&lt;STRONG&gt;I found the root cause of the issue.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;On the non-working gateway, in Expert mode, the /etc/pam.d/system-auth file looks like this:&lt;/P&gt;&lt;PRE&gt;#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authselect is run.
auth        required      pam_env.so
auth        required      pam_dof_tally.so deny=10 unlock_time=1200 even_deny_root_account onerr=fail file=/etc/loginhist/%u nop
auth        required      cp_pam_tally.so
auth        [success=done new_authtok_reqd=done auth_err=ignore perm_denied=ignore conv_err=die default=ignore]    pam_radius_auth.so
&lt;STRONG&gt;auth        sufficient    pam_unix.so try_first_pass nullok
auth        required      pam_deny.so&lt;/STRONG&gt;

account     required      cp_pam_tally.so
account     required      pam_unix.so
account     required      pam_nonuse.so

password    sufficient    pam_unix_passwd.so try_first_pass nullok sha512 shadow
password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
-session     optional      pam_systemd.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session     required      pam_unix.so&lt;/PRE&gt;&lt;P&gt;And on the working gateway, it looks like this:&lt;/P&gt;&lt;PRE&gt;#%PAM-1.0
# This file is auto-generated.
# User changes will be destroyed the next time authselect is run.
auth        required      pam_env.so
auth        required      pam_dof_tally.so deny=10 unlock_time=1200 even_deny_root_account onerr=fail file=/etc/loginhist/%u nop
auth        required      cp_pam_tally.so
auth        [success=done new_authtok_reqd=done auth_err=ignore perm_denied=ignore conv_err=die default=ignore]    pam_radius_auth.so
&lt;STRONG&gt;auth        required      pam_unix.so try_first_pass nullok
auth        required      pam_google_authenticator.so nullok noskewadj secret=/etc/2fa_keys/${USER}/.google_authenticator user=0&lt;/STRONG&gt;

account     required      cp_pam_tally.so
account     required      pam_unix.so
account     required      pam_nonuse.so

password    sufficient    pam_unix_passwd.so try_first_pass nullok sha512 shadow
password    required      pam_deny.so

session     optional      pam_keyinit.so revoke
session     required      pam_limits.so
-session     optional      pam_systemd.so
session     [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid
session     required      pam_unix.so&lt;/PRE&gt;&lt;P&gt;&lt;STRONG&gt;The correct configuration exists on the problematic gateways as well, but only in temporary files that were never activated. I still need to test whether a reboot will revert to the incorrect settings.&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 10:12:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/262147#M44328</guid>
      <dc:creator>ByTi</dc:creator>
      <dc:date>2025-11-07T10:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: MFA Behavior on Gaia Portal – R81.20 Jumbo Hotfix Take 118 and 113</title>
      <link>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/262195#M44333</link>
      <description>&lt;P&gt;The difference in PAM configuration would definitely cause the issue.&lt;BR /&gt;Why it happened is a different question.&lt;/P&gt;</description>
      <pubDate>Fri, 07 Nov 2025 17:53:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/262195#M44333</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2025-11-07T17:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: MFA Behavior on Gaia Portal – R81.20 Jumbo Hotfix Take 118 and 113</title>
      <link>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/262245#M44336</link>
      <description>&lt;P&gt;Here is what it looks like in my lab. Just run chattr +i on the file, will survive the reboot.&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;[Expert@CP-GW:0]#&lt;BR /&gt;[Expert@CP-GW:0]# more /etc/pam.d/system-auth&lt;BR /&gt;#%PAM-1.0&lt;BR /&gt;# This file is auto-generated.&lt;BR /&gt;# User changes will be destroyed the next time authselect is run.&lt;BR /&gt;auth required pam_env.so&lt;BR /&gt;auth required pam_dof_tally.so deny=10 unlock_time=1200 even_deny_root_account onerr=fail file=/etc/loginhi&lt;BR /&gt;st/%u nop&lt;BR /&gt;auth required cp_pam_tally.so&lt;BR /&gt;# aaa placeholder - start&lt;BR /&gt;auth [success=done new_authtok_reqd=done auth_err=ignore perm_denied=ignore conv_err=die default=ignore] pam_&lt;BR /&gt;radius_auth.so&lt;BR /&gt;auth [success=ok new_authtok_reqd=ok ignore=ignore default=2] pam_unix.so try_first_pass nullok&lt;BR /&gt;auth required pam_google_authenticator.so nullok noskewadj secret=/etc/2fa_keys/${USER}/.google_authenticato&lt;BR /&gt;r user=0&lt;BR /&gt;auth sufficient pam_permit.so&lt;BR /&gt;# aaa placeholder - end&lt;BR /&gt;auth required pam_deny.so&lt;/P&gt;
&lt;P&gt;account required cp_pam_tally.so&lt;BR /&gt;account required pam_unix.so&lt;BR /&gt;account required pam_nonuse.so&lt;/P&gt;
&lt;P&gt;password sufficient pam_unix_passwd.so try_first_pass nullok sha512 shadow&lt;BR /&gt;password required pam_deny.so&lt;/P&gt;
&lt;P&gt;session optional pam_keyinit.so revoke&lt;BR /&gt;session required pam_limits.so&lt;BR /&gt;-session optional pam_systemd.so&lt;BR /&gt;session [success=1 default=ignore] pam_succeed_if.so service in crond quiet use_uid&lt;BR /&gt;session required pam_unix.so&lt;BR /&gt;[Expert@CP-GW:0]#&lt;/P&gt;</description>
      <pubDate>Sat, 08 Nov 2025 13:36:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/MFA-Behavior-on-Gaia-Portal-R81-20-Jumbo-Hotfix-Take-118-and-113/m-p/262245#M44336</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2025-11-08T13:36:27Z</dc:date>
    </item>
  </channel>
</rss>

