- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters E7:
How CPR Broke ChatGPT's Isolation and What It Means for You
Blueprint Architecture for Securing
The AI Factory & AI Data Center
Call For Papers
Your Expertise. Our Stage
Good, Better, Best:
Prioritizing Defenses Against Credential Abuse
Ink Dragon: A Major Nation-State Campaign
Watch HereCheckMates Go:
CheckMates Fest
Version R88.X
Looking for a CLI command to display the list of SMART center users currently configured as well privilege (read, read/write). Thank you.
Probably the easiest way to do it:
mgmt_cli -r true --domain "System Data" --format json show administrators details-level full | jq -r '.objects[] | [.name, ."permissions-profile".name] | @csv '
This will show you the username and Permission Profile name in CSV format.
This assumes the Permission Profile name is meaningful as it has a bunch of different permissions associated with it.
The command provided works. TYVM!!!
Hi,
One follow up question. The output appears to be truncated to 50 entries. Can you please advise how to expand the output to exceed 50 entries?
Hello PhoneBoy,
your answer is helpful - thank you for that.
However let me please extend that question a bit.
I am wondering if there is any unified way how to extract those user from all versions of Checkpoints?
As far as I understand there are different methods used in versions 80.x and higher ... and older type 77.x
What I have found for older versions 77.x there is a solution shortly described here: http://expert-mode.blogspot.com/2011/11/checkpoint-how-to-export-list-of-vpn.html (using command: fwm dbexport -f /tmp/users_dump.xls and then cat /tmp/users_dump.xls)
Honestly it's a bit clumsy to work with such data since further delimitation and some polishing in Excel is needed, but still better than check it out manually in GUI.
My question is if there exists a solution to extract those users in the same way like for 80.x also for older versions.
We just simply need to extract those locally configured IDs and their privileges in order to run the outcome through a script to obtain results of periodical user access re-validation.
Your expertise can be greatly helpful!
Thank you in advance for your answer!
Sorry, could not resist 🙂
Wow, how is it there in the future? Did we win against coronavirus yet? In my reality, it is still a bunch of R80.x releases in 2020.
😳oops, sorry for the typo.
No worries, we all need a little joke one in a while, especially now 🙂
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 66 | |
| 19 | |
| 13 | |
| 12 | |
| 11 | |
| 9 | |
| 9 | |
| 7 | |
| 7 | |
| 7 |
Tue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementTue 28 Apr 2026 @ 06:00 PM (IDT)
Under the Hood: Securing your GenAI-enabled Web Applications with Check Point WAFTue 12 May 2026 @ 10:00 AM (CEST)
The Cloud Architects Series: Check Point Cloud Firewall delivered as a serviceThu 30 Apr 2026 @ 03:00 PM (PDT)
Hillsboro, OR: Securing The AI Transformation and Exposure ManagementAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY