Chat now with support
Chat with Support

One Identity Safeguard for Privileged Passwords 7.3 - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Global Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions About us

Task delegation in a cluster

A Safeguard for Privileged Passwords' cluster delegates platform management tasks (such as password and SSH key check and password and SSH key change) to appliances based on platform task load. The primary appliance performs delegation and evaluates cluster member suitability using an internal fitness score that is calculated by dividing the number of in-use platform task threads by the maximum number of allowed platform task threads.

The maximum number of allowed platform task threads can be adjusted using the Appliance/Settings API and adjusting the MaxPlatformTaskThreads value. By adjusting this number, you can tune task distribution.

IMPORTANT: Adjusting the MaxPlatformTaskThreads will impact SPP's available resources for handling access requests and may impact user experience. Best practice is to engage Professional Services if the value may need to be changed.

Increasing the maximum number of allowed platform task threads will decrease the fitness score thus increasing the number of tasks passed to that appliance.

The fitness score is cached and is recalculated in 8-minute intervals when the scheduler is not busy. When the scheduler is running tasks, the fitness score is calculated more frequently so the scheduler can dynamically adjust.

The selection of a Safeguard for Privileged Sessions Appliance is primarily dependent on managed network rules. However, if there aren't any managed network rules or if the managed network rules result in more than one Safeguard for Privileged Sessions appliances selected, a fitness score is used as the tie breaker. The fitness score is calculated based on the percentage of disk available minus the overall load average of the Safeguard for Privileged Sessions appliance. (Load average is a Linux metric which provides a numerical indication of the overall resource capacity in use on the server.) The higher the fitness score, the more likely that the corresponding appliance will be selected.

Password distribution in a cluster

The Primary coordinates all password changes across the cluster. When the scheduler decides it is time to change a password, it will choose whichever node is least busy (based on a fitness score and part of the Managed Network) and assign the task to that cluster member. When the cluster member is done and the change is successful, the password change is written immediately from that replica into the distributed database. It has consensus (quorum) which means that all nodes that are part of that quorum will immediately receive the password.

The same is true for a session. If the Primary schedules a password change, and someone attempts to use a session, it should have the correct password.

There is a potential scenario where the password or session request has already been initiated and the Primary schedules a change during the request. In this case, the user will have to check out the password anew, but an existing session that is live should not be interrupted. If they attempt to initiate the session at the exact moment that the password change has happened, they may get an error about the session.

Password distribution changes when Offline Workflow is enabled on a node that has lost consensus (quorum). For more information, see About Offline Workflow Mode.

Managed Networks

Managed networks are named lists of network segments serviced by a specific Safeguard for Privileged Passwords (SPP) or Safeguard for Privileged Sessions (SPS) appliance in a clustered environment. Managed networks are used for scheduling tasks, such as password or SSH key change, account discovery, sessions recording, and asset discovery to distribute the task load. Using managed networks, you can:

  • Distribute the load so there is minimal cluster traffic.
  • Specify to use the appliances that are closest to the target asset to perform the actual task.

A Safeguard for Privileged Passwords cluster has a default managed network that consists of all cluster members. Other managed networks can be defined.

CAUTION: If the role of a managed host that belongs to a linked Safeguard for Privileged Sessions cluster is changed or if a managed host is added or removed from the cluster, Safeguard for Privileged Passwords will detect the change by querying each Central Management node and attempt to stay in sync with the Safeguard for Privileged Sessions cluster topology. If the Central Management node is down, Safeguard for Privileged Passwords warns the administrator there may be invalid policies with a message like: The session connection policy was not found, in addition to flagging each broken Access Request Policy with an Invalid notation (Security Policy Management > Entitlements > Access Request Policies tab). Based on the size of your network and other factors, this will take one to 10 minutes and, during this time window, an unavailable managed host may continue to appear on the Managed Networks page. Any requests made will be invalid and will not be able to be launch sessions.

Precedence

The selection made on the Entitlement > Access Request Policy tab takes precedence over the selections on Appliance Management > Cluster > Managed Networks page. If a Managed Networks rule includes nodes from different Safeguard for Privileged Sessions clusters, Safeguard for Privileged Passwords will only select the nodes from the same cluster that was assigned on the Session Settings page of the Access Request Policy tab.

IMPORTANT: Discovery, password and SSH key check and change will not work if a managed network has been configured with a subnet but is not assigned to an appliance (the appliance is blank). If the managed network does not have an assigned appliance, a message like the following displays: No appliances in network '<NameOfEmptyNetwork>' available to execute platform task request. To resolve the issue, assign at least one appliance to manage the passwords, SSH key, and/or sessions or delete the managed network entry.

Go to Managed Networks:

  • web client: Navigate to Appliance Management > Cluster > Managed Networks.

The Managed Networks page displays the following information about previously defined managed networks. Initially, this page contains the properties for the Default Managed Network, which implicitly includes all networks and is served by all appliances in the cluster.

Table 38: Managed Networks: Properties
Property Description

Name

The name assigned to the managed network when it was added to Safeguard for Privileged Passwords.

Subnets

A list of subnets included in the managed network.

Double-click an entry in the Managed Networks grid to display details about the subnets associated with the selected managed network.

If you have linked Safeguard for Privileged Sessions, the following apply:

  • Passwords Managed By: The Safeguard for Privileged Passwords appliance ID, which includes the MAC address followed by the IP address of the node.
  • Sessions Managed By: If applicable, the Safeguard for Privileged Sessions appliance host name followed by the IP address of the Safeguard for Privileged Sessions node.

Passwords Managed By

The host name and IP address of the appliances and the MAC address assigned to manage the specified subnets.

Sessions Managed By

The host name and IP address of the cluster nodes.

Description

The descriptive text entered when defining the managed network.

Use these toolbar buttons to define and maintain your managed networks.

Table 39: Managed Networks: Toolbar
Option Description
New Add a managed network. For more information, see Adding a managed network.
Delete Selected

Remove the selected managed network from Safeguard for Privileged Passwords. You cannot delete the Default Managed Network.

Refresh Update the list of managed networks.
Edit

Modify the selected managed network configuration. You can not modify the Default Managed Network.

Resolve Network text box

Locate an IP address in a managed network's list of subnets. For more information, see Resolving IP address.
Related Topics

Adding a managed network

Use the Managed Networks page on the Cluster settings view to add managed networks, which can be used to distribute the task load in a clustered environment. It is the responsibility of the Appliance Administrator to define and maintain managed networks.

To add a managed network

  1. Go to Managed Networks:
    • web client: Navigate to Cluster > Managed Networks.
  2. Click Add.
  3. In the Managed Network dialog, provide the following information:
    1. Name: Enter the display name for the managed network. This may be the name of the Safeguard for Privileged Sessions Appliance used to authenticate the linked Safeguard for Privileged Sessions session connection.

      Limit: 50 characters

    2. Description: (Optional) Enter information about the managed network.

      Limit: 255 characters

    3. Subnets: Click Add to specify the subnets, or group of hosts, to be managed.

      Enter each subnet using CIDR notation. For example, 0.0.0.0/0.

      NOTE: You can add a subnet to only one managed network. You will receive an error if you attempt to add the same subnet to another managed network. If you are unsure if an IP address has already been associated with a managed network, use the Resolve Network search box. For more information, see Resolving IP address.

    4. Passwords Managed By: Select the appliances to be used to manage the specified subnets.

      NOTE: You do not need to specify an appliance when you initially define a managed network. You can use the Edit button to specify the managing appliance at a later time.

    5. Sessions Managed By: If applicable, select the Safeguard for Privileged Sessions appliance to associate with the managed network.
  4. Click OK to save your selections and add the managed network.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating