- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello Everyone,
I recently came across the limitation described in https://support.checkpoint.com/results/sk/sk183201:
After installing JHF96+ for R81.20, a "." (dot) in a username is a problem for WebUI Login and logging in with a username with a dot no longer works (SSH is unaffected of this).
To be fair, I checked the documentation and only "-" and "_" are mentioned as allowed special characters in usernames (I looked in the GAiA Admin Guide R80.40, R81, R81.10 and R81.20), but I know several environments where dots are used in the admin name concept and have worked without problems so far
What are your opinions?
Best Regards
Colin
Hi Colin, the agenda here is enhance the security for GAiA portal
The option for this is the enforce your environment and align the users
Within our environment and our naming convention, we have dots in our admin usernames.
Enforcing and aligning this in an enterprise where 5k+ accounts have this character in the username is easier said than done. So we'll have to figure something out at the moment.. as the naming convention will not change because one vendor decided otherwise.
Hi, denying dots in usernames is really a bad idea. The dot is one of the most used separators in usernames. I know already of some customers, which are affected by this. Implementing 2FA for the Gaia WebUI is great, but I don't see why this limits the set of allowed charcters in the username.
Changing the usernames in a company with thousands of accounts is a major change.
CP RnD could you please check again, if you can remove this limitation? Otherwise there will be issues with a lot of customers in the next months.
BR
joth
I agree with you, for sure. I also believe that limitation should be removed.
Andy
Hi Ambar,
Yes, security is important, but from my point of view, a very widespread username concept (usernames with a dot) was made unusable in favor of a new feature (TOTP 2FA for GAiA) or rather its security.
We know that many of our customers use a dot in their usernames, which is nothing unusual from our point of view.
If I had to guess, this will become a bigger issue in the future, as the installbase of R81.20 JHF 96+ is currently not that big.
Best Regards
Colin
I agree that this is a very bad idea. Using dots in username is typical and widespread. Even though this is obviously limited to Gaia web GUI, it's simply a bad idea. This will affect many environmentsa and they are in for a bad surprise.
Hi, I'll start with that we are taking internally the option for you to enable "."
as this affects only GAiA portal non local users, the affect of modification shouldn't be such extensive as the access to GAiA portal should be limited and not for the entire organization
Just my logical suggestion...I can totally see where @C_H @joth @joerivang are coming from. If you think about it, say company even with 100 users, let alone 1000s, that is a HUMONGOUS change.
If CP could offer customers say custom fix for the time being and then have this corrected in later jumbo, that would probably be okay with clients who have lots of users with . in their Gaia usernames.
Anyway, something to consider...
Andy
I just stumbled across this after updating our lab from Take 92 to Take 99. We also use '.' extensively in our username standard, it is not practical for us to change usernames. Also, just suggesting that people use the default admin account ignores a certain basic security principal - we have individual named administrators/accounts for easy attribution and accountability. Using a shared admin account is bad security practice.
Dave
HI
Has there been any update on the option to enable? This is a stopper in large environments where . has been used for years.
Are you sure that there are so many GAiA WebGUI Admins in large environments ? This is only a limitation for GAiA portal non-local users...
So i should create local users on 120 different firewalls just to mitigate this?
Most of us use radius or some other authentication method so that we don't have to use local accounts on all different systems..
I did not see mention of this in take 99, but lets hope its fixed soon.
I know, just trying to elaborate to @G_W_Albrecht why this an issue. As we have a lot of gaia systems and multiple admins that go into there.
Its huge issue, I totally get it. I would NEVER want to be in that situation myself.
Andy
So what did happen ? Is that option available again ?
I noticed that too when I installed it in the lab, but figured must have been something I did. Glad to know its by design.
Andy
Does someone know in which JHF the fix (PMTR-115412) will be implemented? Didn't see it in JHF 111
Hi Tobi,
PMTR-115412 will be fix in the next upcoming JHF
Gadi
I'm not aware of this ID, will dots in usernames become available again?
According to sk183201 - yes it is planned with PMTR-115412
I installed JHF115 which includes PMTR-115412. Unfortunately I still can't log in with a username that contains "."
Error message on the webgui "Invalid username: Allowed characters are a-z, A-Z, 0-9, -, _ only". Is there an additional configuration that need to be set?
I also checked R82 latest jumbo and this did not work.
Andy
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
17 | |
12 | |
7 | |
6 | |
6 | |
6 | |
6 | |
5 | |
3 | |
3 |
Fri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationTue 16 Sep 2025 @ 02:00 PM (EDT)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - AmericasWed 17 Sep 2025 @ 04:00 PM (AEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - APACWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY