- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Management and Gateways are running R81.20.
Currently users are created locally in SmartConsole, for each user a certificate is created. This is only used for RemoteAccess.
A few years ago it was only for a few users. Since everybody is more or less working remotely now we need to do this for every user.
We’d like to investigate the possibility of going from that model to using accounts from Microsoft AD. There wouldn’t be a need to create an account another time in CheckPoint.
We’re using Identity Awareness so LDAP account unit already exist.
Is it only a matter of enabling User Directory components in the properties of the management server?
I thought I had seen somewhere that you couldn’t have an internal user db and an external one at the same time. I can’t find that reference anymore so maybe it doesn’t matter.
thanks
Francis
Correct, there is no migration path to move users in bulk. Most probably, you need to recreate them manually.
Never mind, I see the link. User Directory is a special feature allowing you to manage (create, edit, assign to groups, etc) LDAP users from SmartConsole. The limitation is valid, if you enable User Directory, you won't be able to use local users anymore. However, if you manage your LDAP users via other means, such as AD management tools, you do not need User Directory in the first place.
I read you question as "can I use both local and LDAP user accounts for authentication purposes". The answer is still yes IF you DON'T enable User Directory, which, by the way, requires an additional license.
So in the Admin guide they say this:"
In SmartConsole
, enable the Security Management Server to manage users in the Account Unit. See Working with LDAP Account Units.
|
Note - You cannot use the SmartConsole User Database
when the User Directory LDAP server is enabled. |
"
Does this mean there is no migration possible if we are using local checkpoint accounts to move to LDAP accounts?
Thats the way I understand that statement as well.
Andy
Correct, there is no migration path to move users in bulk. Most probably, you need to recreate them manually.
Thanks that's what I thought. So does it mean as soon as I enable User Directory existing users (local) won't be able to connect?
Of course not. Both locally defined users and those from LDAP can be used in parallel
Thanks. Glad to hear that. It's not that clear when reading this note from the manual:
"Note - You cannot use the SmartConsole User Database when the User Directory LDAP server is enabled."
That's odd. Where do you see it? Can you provide me with an exact reference, please?
Never mind, I see the link. User Directory is a special feature allowing you to manage (create, edit, assign to groups, etc) LDAP users from SmartConsole. The limitation is valid, if you enable User Directory, you won't be able to use local users anymore. However, if you manage your LDAP users via other means, such as AD management tools, you do not need User Directory in the first place.
I read you question as "can I use both local and LDAP user accounts for authentication purposes". The answer is still yes IF you DON'T enable User Directory, which, by the way, requires an additional license.
This is great info. That's correct, I'd like to use both for remote VPN access authentication but only for a transition period going from local to LDAP (MS AD). I thought I needed to enable User Directory for that.
No, you really don't want to do that. Also, you quoted user management from the SmartCenter admin guide. I would suggest looking into RAS VPN admin guide instead
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
9 | |
5 | |
4 | |
4 | |
4 | |
4 | |
3 | |
3 | |
2 | |
2 |
Thu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAMon 22 Sep 2025 @ 02:00 PM (EDT)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security AMERThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY