- CheckMates
- :
- Products
- :
- Developers
- :
- API / CLI Discussion
- :
- Re: teapi
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
teapi
Hi all,
So, we are trying to connect to the teapi and getting an error on our self-signed certificate is not trusted.
Where do I export my manager's certificate & how can I code this (python) so it is trusted rather than ignored?
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
At least for fresh installs of recent versions (e.g. R81.20), the CA should be valid until end of 2037.
You can verify this by viewing the internal_ca object (under Servers > Trusted CA in the Objects Explorer).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It's not the certificate necessarily, it's the Certificate Authority (which is presumably the ICA).
You might need to use the ICA Management Tool to get it: https://support.checkpoint.com/results/sk/sk30501
Coding acceptance of this in Python is a separate question.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
The developers would prefer to use a wildcard certificate rather than use the CA, becuase they think it will be more of a security risk and harder to manage changes. Is there a way to use my gateway's certificate (signed), https://hostname.my.domain:18194/teapi/etc and force the api to use it instead of the ica reference to my manager?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
It appears the teapi leverages UserCheck, which has a portal certificate you can replace.
See: https://support.checkpoint.com/results/sk/sk113599
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Isn't usercheck exclusively for browser connectivity vs a python script to 18194?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
That makes more sense as UserCheck is used for the "user facing" parts of Threat Emulation/Extraction.
The SK I linked suggests that the relevant Internal CA is what you need to trust as that's how it is configured in SmartEndpoint.
Don't believe there is a supported way to change the API endpoint certificate.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I agree, that I need to trust the ICA. Does that change every year now?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
At least for fresh installs of recent versions (e.g. R81.20), the CA should be valid until end of 2037.
You can verify this by viewing the internal_ca object (under Servers > Trusted CA in the Objects Explorer).
