Chat now with support
Chat mit Support

One Identity Safeguard for Privileged Passwords 6.0 LTS - Administration Guide

Introduction System requirements Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Search box Using the web client Installing the desktop client Using the desktop client Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Discovery Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Safeguard Access settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP 2.7 or later migration guidance Appendix C: SPP and SPS join guidance Appendix D: Regular Expressions Appendix E: Historical changes by release Glossary

Reports

 Reports allows the Auditor and Security Policy Administrators to view and export entitlement reports that show which assets and accounts a selected user is authorized to access. Reports may be exported in .csv or .json format.

Reports toolbar

The toolbar at the top of Reports contains these options.

  • Refresh: Updates the entitlement report.
  • Export: Used to create a .csv or a .json file of the report. Different information may be returned based on whether you select CSV or JSON. For example, JSON includes details of accounts discovered and CSV includes only the count of accounts.

Once the report is exported, you can convert timestamps to local time, if necessary. For more information, see Converting time stamps.

Entitlement reports

One Identity Safeguard for Privileged Passwords provides these entitlement reports.

  • User: Lists information about the accounts a selected user is authorized to request.
  • Asset: Lists information about the accounts associated with a selected asset and the users who have authorization to request those accounts.
  • Account: Lists detailed information about the users who have authorization to request a selected account including: Entitlement, Policy, Access Type, Password Included, Password Change, Time Restrictions, Expiration Date, Group, From Linked Account, and Last Accessed.

Running an entitlement report

You can run an entitlement report.

To run an entitlement report

  1. From the Safeguard for Privileged Passwords desktop Home page, select  Reports.
  2. In the first drop-down, choose a type of report: User, Asset, or Account.
  3. In the second drop-down, you can select All or you can select Browse to select one or more objects for the report. If you select multiple objects, the selected objects display in the center of the page. Click a selected object to display the object's information at the bottom of the page.
  4. The top of the report displays the following information.

    User:

    • Name: The name of the user.
    • Username: The user name used for authentication.
    • Domain name: The name of the domain of the user.
    • Accounts: Number of accounts each user is allowed to access.
      If an access request policy allows password access to linked accounts, an account may display twice: once based on the policy scope and a second time because it is a linked account. In the bottom grid, see the From Linked Account column. For more information, see Access Config tab.

    Asset:

    • Name: The name of the asset.
    • Accounts: Number of accounts on this asset that can be accessed.
    • Requesters: Number of users allowed to request access to the asset's accounts.
    • Partition: The name of the partition to which the asset belongs.
    • Users: The name of the requesters allowed to request access.

    Account:

    • Name: Name of the account.
    • Asset: Name of the asset associated with the account.
    • Domain Name: If applicable, the domain of the account.
    • Requesters: Number of requesters allowed to access an account.
  5. Select an item from the top pane to view additional detail in the lower pane.
    For entitlements by assets, you can continue to drill down into the details of an item. For example, you can view both the Total Accounts tab and the People tab to see more details about the users that can request the accounts on an asset. Select an item from the results to drill down further into the details about the users and the accounts.
  6. To filter the results, use the filter control in the column heading. For more information, see Filtering report results.

To export the report

  1. To export, select Export and then select Export as CSV or Export as JSON. Save the file to the location desired. Different information may be returned based on whether you select CSV or JSON. For example, JSON includes details of accounts discovered and CSV includes only the count of accounts.

  2. Once the report is exported, you can convert time stamps to local time, if necessary. For more information, see Converting time stamps.

To run the report

Click the Run button to generate the report.

Converting time stamps

When you export .csv or .json files, the time stamp will be in UTC/GMT time. You can convert the time to your local time.

.csv opened in Excel

  1. Identify how many hours different your local time is from the UTC or GMT exported by googling "UTC to my time." The value will be within the -12 to 12 range.

  2. In the column to the right of the time stamp, enter one of the following formulas. These examples assume the exported time is in cell J1 and the exported time is -7 hours after the current local time.

    • =J1-TIME(7,0,0)
    • =J1+(-7 / 24)

    Below, the exported time stamp is 17:55:59 GMT (5:55:59 p.m.).

    The formula converts the time to the local time stamp of 10:55:59 p.m.

.json

You can find code to convert JSON UTC time to local time. One

possible source:

https://stackoverflow.com/questions/42376914/json-utc-time-to-local-time

Administrative Tools

The  Administrative Tools allow you to add all the objects you need to write access request policies, such as users, accounts, and assets. From this view, you can also configure all of the Safeguard for Privileged Passwords settings.

Note: You must have administrator permissions to use the  Administrative Tools and the administrator permissions you have determine what you can view and modify.

The navigation pane along the left side of the console gives you access to these administrative tools.

Table 11: Administrative Tools
Administrative Tools Description Administrator permissions
Toolbox Where you can gain quick access to all the tasks you can perform from a single portal Users with any Safeguard administrator privileges
Accounts Where you associate account identities with managed systems Asset Administrator or Auditor
Account Groups Where you define sets of accounts that you can add to the scope of an access request policy Auditor or Security Policy Administrator
Assets Where you add computers, servers, network devices, or applications to be managed by a Safeguard for Privileged Passwords Appliance Asset Administrator or Auditor
Asset Groups Where you define sets of assets that you can add to the scope of an access request policy Auditor or Security Policy Administrator
Discovery Where you configure asset and account discovery jobs which apply a set of rules to discover and automatically add assets and accounts to Safeguard for Privileged Passwords Auditor or Asset Administrator
Entitlements Where you specify the access request policies that restrict system access to authorized users Auditor or Security Policy Administrator
Partitions Where you define collections of assets that can be used to segregate assets for delegation Asset Administrator, Auditor, or delegated partition owner
Settings

Where you configure Safeguard for Privileged Passwords to run backups, install updates, manage clusters, manage certificates, enable event notifications, configure external integration, define profile configurations settings, define user password rules, define discovery rules, and run troubleshooting tools.

Users with any Safeguard administrator privileges; however, the settings available depend on the administrative permissions assigned.

Users Where you set up users who can log in to Safeguard for Privileged Passwords.

Bootstrap, Asset Administrator, Auditor, Authorizer Administrator, Help Desk Administrator, Security Policy Administrator, or User Administrator

User Groups Where you define sets of Safeguard for Privileged Passwords users that you can add to an entitlement.

Bootstrap, Auditor, Authorizer Administrator, Security Policy Administrator, or User Administrator

All of the Administrative Tools views have the following components, except for the Toolbox and Settings:

  • Toolbar options across the top of the view.
  • Object list (left pane)
  • Search box at the top of the object list.
  • Details pane (right pane)
Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen