- Products
- Learn
- Local User Groups
- Partners
- More
Stop Babysitting Rules.
Go Agentic
Step Into the Future of
AI-Powered Cyber Security
The State of Ransomware Q1 2026
Key Trends and Their Impact
AI Security Masters E8:
Claude Mythos: New Era in Cyber Security
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
CheckMates Go:
CheckMates Fest
Hi All,
I want to grant expert mode access to certain administrators, allowing them to create bulk objects using the mgmt_cli command in expert mode as per SK113078. However, I only want them to have access to the commands for creating objects and making objects members of groups. Is this possible, and if so, how can I achieve it?
Thanks,
Hey bro,
What in particular do you want to allow?
Andy
Hi Andy,
I want this three commands to be allowed
vi <filename>.csv
mgmt_cli add host --batch <filename>.csv
mgmt_cli set group --batch <filename>.csv
K, thats fair, BUT, what sort of access do they need to have?
Andy
Man, I remember this sk back from 2020 when I had TAC case about, when smart-1 cloud was fairly new. Here is what TAC guy told me, he was super nice and helpful about it, see if this helps.
Andy
*********************************************
--->To add address-range via API:
mgmt_cli add address-range --batch address-ranges_full.csv
#cat address-ranges_full.csv
name,ip-address-first,ip-address-last
range1,10.0.0.0,10.0.0.100
---> To add a network via API:
mgmt_cli add network --batch networks.csv
#cat networks.csv
name,subnet,subnet-mask
network1,10.10.10.0,255.255.255.0
network2,20.20.20.0,255.255.255.0
network3,30.30.30.0,255.255.255.0
---> To add a host
mgmt_cli add host --batch test.csv
#cat test.csv
name,ip-address
obj1,192.168.1.1
For more info, please refer the: https://sc1.checkpoint.com/documents/latest/APIs/index.html?#cli/add-host~v1.7%20
@Ihenock1011 Forgot to mention, though it goes without saying, commands will not work, unless you create files first. Do touch, give it a name, then you can vi and keep adding entries, it works 100%, I tested it in the lab few times.
Andy
@the_rock For administrators to execute this task, they must have expert mode access. I want to implement the principle of least privilege, granting administrators only the necessary permissions in expert mode. Specifically, I want to restrict their access to the commands for creating objects and making objects members of groups.
https://sc1.checkpoint.com/documents/latest/GaiaAPIs/#api_access~v1.7%20
@the_rock Granting a user GAIA API access will provide them with broad permissions. Is there a way to restrict this access to specific commands while denying others?
Not sure, I would verify with TAC, as I dont see it in the documentation.
Andy
Similar to the Management API, Gaia has its own Roles that can be assigned to users.
The API permissions follow these same roles, as far as I know.
First of all, limiting access to specific commands in Expert Mode is not possible (e.g. only allowing access to mgmt_cli).
However, to access the management API, you do not need access to Expert Mode at all, you can use the "mgmt" command.
You won't be able to use any shell pipes and such, though, but they will not need access to Expert Mode.
For access to what can be done with the Management API, this is done through Administrator profiles.
Assign the relevant administrator users a permission profile that looks something like the following (with other checkboxes removed):
Consider to move dynamic CLI: https://support.checkpoint.com/results/sk/sk144112
In this way it might you do not need expert mode anymore for certain users and you can run expert mode like commands via normal clish access
Interesting, never seen that before.
Andy
I would suggest creating it as a bash script and run it from SmartConsole
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 22 | |
| 19 | |
| 9 | |
| 9 | |
| 8 | |
| 7 | |
| 7 | |
| 6 | |
| 4 | |
| 4 |
Fri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceTue 02 Jun 2026 @ 10:00 AM (AEST)
The Cloud Architect Series: Check Point WAF. The next generation of AI-Powered Protection - APACTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesTue 02 Jun 2026 @ 10:00 AM (AEST)
The Cloud Architect Series: Check Point WAF. The next generation of AI-Powered Protection - APACTue 02 Jun 2026 @ 06:00 PM (IDT)
Under the Hood | Check Point SASE: Identity Integration & Access Policy Design Best PracticesThu 04 Jun 2026 @ 02:00 PM (CEST)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - EuropeThu 04 Jun 2026 @ 07:00 PM (IDT)
Deep Dive Webinar: New CloudGuard GWLB Deployment Without NAT Gateways - AmericaFri 12 Jun 2026 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 47: Continuous Threat Exposure ManagementFri 29 May 2026 @ 09:00 AM (EDT)
Caracas: Executive Breakfast: Innovación en Ciberseguridad – IA y Threat IntelligenceAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY