- Products
- Learn
- Local User Groups
- Partners
- More
Call For Papers
Your Expertise, Our Stage
Ink Dragon: A Major Nation-State Campaign
Watch HereAI Security Masters E5:
Powering Prevention: The AI Driving Check Point’s ThreatCloud
The Great Exposure Reset
AI Security Masters E4:
Introducing Cyata, Securing the Agentic AI Era
CheckMates Go:
CheckMates Fest
Hi,
I am looking for a way to find out if the fingerprint on an LDAPS server has changed (an LDAP account unit).
Currently when the fingerprint is changed authentication stops working since the management server notices that the fingerprint has changed and one have to manually fetch and install the gateways so it reflects the new changes.
So i am looking for a way to detect this, for example where can i find the current fingerprint so i can compare ?
Management server is running R80.30
Thanks in advance
you can try to connect to the DC and check if it has a "new" certificate issued to it
cpopenssl s_client -connect <IP>:636
if you have some other monitoring systems, then you can raise an event on the DC by monitoring the event log to see if a new certificate was enrolled
i am also looking for a solution for next re-authentication, not sure why CP uses the server's fingerprint and not just relaying on the PKI infrastructure
The certificate on the LDAP has to be changed by someone - it is not done automatically. Someone responsible for LDAP should (or have to ?) inform all consumers (firewall team) that the certificate is going to be changed.
Yes that is if routines is working as it should. But in a larger enterprise it can be a challenge.
If the ca is an enterprise ca and the dc has permissions this procedure happanes automaticly with auto enrollment.
I still dont understand why they are using certificate pinning and not just trusting a root ca as pki is designed to.work.
I'm not sure that this doesn't happen automatically. I had a customer who had an ISP scheduled outage last night. When it came back up, they had intermittent issues which we ended up solving by refreshing the DCs fingerprints in the LDAP Account Unit in SmartConsole. I've had this issue come up several times with different customers in the past year, and never had it happen before. In every case, it doesn't seem like anyone updated this manually. I'm trying to find out why it changes, if there's a way to monitor it, and if there's a way to make it not break all authentication on the firewall when it does change?
You can also leave the fingerprint for all DCs blank. With that, the Check Point will not check the fingerprints, instead will accept everything. It is not the best security solution, but some organizations can accept that risk.
With R82 version, following feature should be available:
You can also let the fingerprint field empty. Then it doesn´t matter, if the fingerprint changes.
and if i remove the fingerprint, does the FW perform validity checks on the certificate ?
if the CA is an internal CA.. where do i put it's certificate to be trusted?
The way to do so is:
cpopenssl s_client -connect <host>:<port> < /dev/null 2>/dev/null | cpopenssl x509 -fingerprint -md5 -noout -in /dev/stdin
(found here and just adapted to cpopenssl)
You can also use the "test_ad_connectivity" command (at least in R80.40, I assume it is available in R80.30). Details are in the Identity Awareness Administration Guide in the Command Line Reference section. You can specify the fingerprint in the test. I used this to verify which DCs in our environment had different fingerprints than what I had configured in SmartConsole.
Dave
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 33 | |
| 21 | |
| 18 | |
| 12 | |
| 9 | |
| 9 | |
| 9 | |
| 8 | |
| 8 | |
| 7 |
Tue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 17 Mar 2026 @ 03:00 PM (CET)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - EMEATue 17 Mar 2026 @ 02:00 PM (EDT)
From SASE to Hybrid Mesh: Securing Enterprise AI at Scale - AMERWed 18 Mar 2026 @ 10:00 AM (CET)
The Cloud Architects Series: An introduction to Check Point Hybrid Mesh in 2026 - In Seven LanguagesThu 19 Mar 2026 @ 11:00 AM (EDT)
Tips and Tricks 2026 #2: AI Security Challenges and SolutionsTue 24 Mar 2026 @ 04:00 PM (CET)
Maestro Masters EMEA: Hyperscale Firewall Architectures and OptimizationTue 24 Mar 2026 @ 06:00 PM (COT)
San Pedro Sula: Spark Firewall y AI-Powered Security ManagementThu 26 Mar 2026 @ 06:00 PM (COT)
Tegucigalpa: Spark Firewall y AI-Powered Security ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY