- Products
- Learn
- Local User Groups
- Partners
- More
The Great Exposure Reset
24 February 2026 @ 5pm CET / 11am EST
CheckMates Fest 2026
Watch Now!AI Security Masters
Hacking with AI: The Dark Side of Innovation
CheckMates Go:
CheckMates Fest
We are starting a centralized config backups project, using a configuration management product called Unimus. They list Check Point appliances under their supported products list. The product works based on a discovery process using credentials and it sucks the configs off of the devices using sftp/ssh/scp.
I do not have any experience configuring "outside-in" backups like this. Anyone have any tips or documentation regarding this type of config? Specifically, what level of access to give to the "backup user" account?
https://wiki.unimus.net/pages/viewpage.action?pageId=10092755
Thank you,
Michael
If their product runs a Gaia backup then I imagine their login will need to be a full bash login, but if they're just scraping the clish config out then it probably just needs a read only clish login. From a very quick poke around their wiki there it seems like it's more of a clish config thing than a full backup thing, so I guess keep that in mind if you do any config changes that aren't in clish.
FWIW, I ran the exact question you had through fully licensed MS Copilot AI and below is what it came up with...
**********************************
Hi Michael — great question, and you’re right to think about least-privilege up front.
A key first point (because it influences permissions): Unimus primarily backs devices up by logging in (SSH/Telnet) and running the vendor-appropriate “show/export config” CLI commands, using the credentials discovered during its discovery phase.
So in many environments, Unimus does not actually need SCP/SFTP to pull configs (unless you build a custom flow that generates a file and then transfers it, or you’re using a product/driver that works that way). Unimus also supports overriding the built‑in driver behavior with Custom Backup Flows, and you can enable debug logging to see exactly which commands it runs during backup. [wiki.unimus.net] [wiki.unimus.net]
Below is a practical way to think about permissions for Check Point Gaia appliances.
Unimus will happily collect device configuration text, which for Gaia commonly means the Gaia OS configuration (interfaces, routing, etc.).
However, for Security Management Servers, the “important backup” is often the management database/policy export (e.g., migrate tools), which is a different workflow from “show configuration.” Check Point’s own upgrade/backup guidance distinguishes these (e.g., migrate exports for Management Server, snapshots/backups for gateways). [wiki.unimus.net] [sc1.checkpoint.com]
Why this matters:
Gaia has a Role Based Administration (RBA) system with predefined roles:
Check Point also explicitly calls out “power features” that effectively elevate privileges (even if assigned read-only). These include:
configuration) – show/save/load Gaia OS configurationbackup) – create/restore backupsexpert), cron, etc. [support.ch...kpoint.com]There’s even a documented warning that adding some of these features to a role can present as “equivalent to adminRole” (cosmetic warning, but still a strong hint to treat these as high-impact). [support.ch...kpoint.com], [support.ch...kpoint.com]
Bottom line: if Unimus’ Check Point driver uses show configuration, you will likely need the configuration feature, which Check Point considers sensitive. [support.ch...kpoint.com], [support.ch...kpoint.com]
Check Point’s Gaia documentation shows the syntax pattern for roles like:
Example from Check Point docs:add rba role NewRole domain-type System readonly-features vpn,ospf,rba readwrite-features snmp [sc1.checkpoint.com]
For Unimus, start with CLI-only + read-only, and include only the minimum features required for config retrieval, typically:
configuration (only if your backup method requires show configuration) [support.ch...kpoint.com], [support.ch...kpoint.com]version or asset if discovery/driver needs those (you’ll confirm via Unimus debug logs) [wiki.unimus.net]⚠️ Note: assigning
configurationis powerful in Gaia’s model. Treat this account as privileged and protect it accordingly. [support.ch...kpoint.com], [support.ch...kpoint.com]
Gaia roles can restrict which access mechanisms a user can use (Gaia Portal vs Gaia Clish).
So make the Unimus user CLI-only unless you have a specific reason for Web UI access. [sc1.checkpoint.com], [sc1.checkpoint.com]
Expert mode exists because clish is intentionally restrictive; Check Point notes clish is a restrictive shell and Expert mode provides broader low-level command access.
Check Point also recommends that to block Expert mode, don’t include “power features” like expert in the role. [sc1.checkpoint.com] [support.ch...kpoint.com]
If your design is “generate a file on the appliance, then pull it via SCP/SFTP,” Check Point’s guidance for SCP connectivity includes:
/bin/bash for SCP clients in their documented approach [sc1.checkpoint.com]There’s also a community best-practice pattern to create a dedicated “scpuser” instead of changing the admin shell (example uses /usr/bin/scponly for tighter file transfer posture). [community....kpoint.com]
✅ Best practice here is two accounts:
This separation prevents your config-backup process from also becoming a general-purpose file transfer foothold.
Because Unimus’ exact behavior can vary by driver/version and by what it discovers, the fastest way to nail permissions is:
This avoids over-granting permissions “just in case.”
expert) to the backup user. [support.ch...kpoint.com], [sc1.checkpoint.com]configuration / backup are considered “power features” in Gaia—treat credentials like privileged secrets. [support.ch...kpoint.com], [support.ch...kpoint.com]If you have test devices or a lab of some kind, the easiest way to find out is to just test it! 🙂
Downloads | Unimus by NetCore j.s.a.
I dont see Check Point listed in the first link you provided. If this is supported, I would give it full permissions.
Sorry, my bad...I thought it was alphabetically listed, did not notice they had Cisco listed before Check Point.
If their product runs a Gaia backup then I imagine their login will need to be a full bash login, but if they're just scraping the clish config out then it probably just needs a read only clish login. From a very quick poke around their wiki there it seems like it's more of a clish config thing than a full backup thing, so I guess keep that in mind if you do any config changes that aren't in clish.
FWIW, I ran the exact question you had through fully licensed MS Copilot AI and below is what it came up with...
**********************************
Hi Michael — great question, and you’re right to think about least-privilege up front.
A key first point (because it influences permissions): Unimus primarily backs devices up by logging in (SSH/Telnet) and running the vendor-appropriate “show/export config” CLI commands, using the credentials discovered during its discovery phase.
So in many environments, Unimus does not actually need SCP/SFTP to pull configs (unless you build a custom flow that generates a file and then transfers it, or you’re using a product/driver that works that way). Unimus also supports overriding the built‑in driver behavior with Custom Backup Flows, and you can enable debug logging to see exactly which commands it runs during backup. [wiki.unimus.net] [wiki.unimus.net]
Below is a practical way to think about permissions for Check Point Gaia appliances.
Unimus will happily collect device configuration text, which for Gaia commonly means the Gaia OS configuration (interfaces, routing, etc.).
However, for Security Management Servers, the “important backup” is often the management database/policy export (e.g., migrate tools), which is a different workflow from “show configuration.” Check Point’s own upgrade/backup guidance distinguishes these (e.g., migrate exports for Management Server, snapshots/backups for gateways). [wiki.unimus.net] [sc1.checkpoint.com]
Why this matters:
Gaia has a Role Based Administration (RBA) system with predefined roles:
Check Point also explicitly calls out “power features” that effectively elevate privileges (even if assigned read-only). These include:
configuration) – show/save/load Gaia OS configurationbackup) – create/restore backupsexpert), cron, etc. [support.ch...kpoint.com]There’s even a documented warning that adding some of these features to a role can present as “equivalent to adminRole” (cosmetic warning, but still a strong hint to treat these as high-impact). [support.ch...kpoint.com], [support.ch...kpoint.com]
Bottom line: if Unimus’ Check Point driver uses show configuration, you will likely need the configuration feature, which Check Point considers sensitive. [support.ch...kpoint.com], [support.ch...kpoint.com]
Check Point’s Gaia documentation shows the syntax pattern for roles like:
Example from Check Point docs:add rba role NewRole domain-type System readonly-features vpn,ospf,rba readwrite-features snmp [sc1.checkpoint.com]
For Unimus, start with CLI-only + read-only, and include only the minimum features required for config retrieval, typically:
configuration (only if your backup method requires show configuration) [support.ch...kpoint.com], [support.ch...kpoint.com]version or asset if discovery/driver needs those (you’ll confirm via Unimus debug logs) [wiki.unimus.net]⚠️ Note: assigning
configurationis powerful in Gaia’s model. Treat this account as privileged and protect it accordingly. [support.ch...kpoint.com], [support.ch...kpoint.com]
Gaia roles can restrict which access mechanisms a user can use (Gaia Portal vs Gaia Clish).
So make the Unimus user CLI-only unless you have a specific reason for Web UI access. [sc1.checkpoint.com], [sc1.checkpoint.com]
Expert mode exists because clish is intentionally restrictive; Check Point notes clish is a restrictive shell and Expert mode provides broader low-level command access.
Check Point also recommends that to block Expert mode, don’t include “power features” like expert in the role. [sc1.checkpoint.com] [support.ch...kpoint.com]
If your design is “generate a file on the appliance, then pull it via SCP/SFTP,” Check Point’s guidance for SCP connectivity includes:
/bin/bash for SCP clients in their documented approach [sc1.checkpoint.com]There’s also a community best-practice pattern to create a dedicated “scpuser” instead of changing the admin shell (example uses /usr/bin/scponly for tighter file transfer posture). [community....kpoint.com]
✅ Best practice here is two accounts:
This separation prevents your config-backup process from also becoming a general-purpose file transfer foothold.
Because Unimus’ exact behavior can vary by driver/version and by what it discovers, the fastest way to nail permissions is:
This avoids over-granting permissions “just in case.”
expert) to the backup user. [support.ch...kpoint.com], [sc1.checkpoint.com]configuration / backup are considered “power features” in Gaia—treat credentials like privileged secrets. [support.ch...kpoint.com], [support.ch...kpoint.com]Thanks all. Much appreciated.
Glad we can help.
If you have test devices or a lab of some kind, the easiest way to find out is to just test it! 🙂
Downloads | Unimus by NetCore j.s.a.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 54 | |
| 41 | |
| 15 | |
| 14 | |
| 12 | |
| 11 | |
| 11 | |
| 11 | |
| 10 | |
| 8 |
Thu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesTue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANThu 19 Feb 2026 @ 03:00 PM (EST)
Americas Deep Dive: Check Point Management API Best PracticesTue 24 Feb 2026 @ 11:00 AM (EST)
Under The Hood: CloudGuard Network Security for Azure Virtual WANAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY