Anmeldeanforderung

Continue

Support-Formulare werden derzeit überarbeitet

Die Funktion zum Senden von Formularen auf der Support-Website ist aufgrund planmäßiger Wartungsarbeiten vorübergehend nicht verfügbar. Wenn Sie sofort Unterstützung benötigen, wenden Sie sich an den technischen Support. Wir bitten, jegliche Unannehmlichkeiten zu entschuldigen.

Weiter
Chat now with support
Chat mit Support
  • Live-Hilfe anfordern

  • Registrierung abschließen

    Anmelden

    Preisinformationen anfragen

    Vertrieb kontaktieren

Bitte wählen Sie Ihr Produkt aus:

Sie haben ein Produktpaket ausgewählt. Bitte wählen Sie ein einzelnes Produkt aus, damit wir Ihre Anfrage besser bearbeiten können. *

Derzeit steht kein Support-Techniker für einen Chat zur Verfügung. Um unverzüglich Support zu erhalten, übermitteln Sie uns bitte eine Anforderung. Verwenden Sie dafür unser Formular für Support-Anforderungen.

Damit wir Ihnen besser helfen können, geben Sie den Grund Ihres Chats an:
2000 Zeichen verbleibend

Empfohlene Lösungen für Ihr Problem

Die folgenden Artikel lösen möglicherweise das von Ihnen beschriebene Problem.

Keine Ergebnisse gefunden
Schließen Chat starten
image.logo.print
image.logo
  • Produkte
    • Alle Produkte anzeigen
    • Kostenlose Testversionen
    • ActiveRoles
    • Cloud Access Manager
    • Defender
    • Enterprise Single Sign-on
    • Identity Manager
    • Identity Manager Data Governance
    • Log Management
    • One Identity Safeguard
    • Password Manager
    • Privileged Access Suite for Unix
    • Starling Connect
    • Starling Two Factor Authentication
    • Starling Identity Analytics & Risk Management
  • Lösungen
    • Lösungen im Überblick
    • Identitätsverwaltung
    • Identity Governance
    • Verwaltungslösungen für privilegierten Zugriff
    • Lifecycle-Management für AD Konten
    • Zugriffssteuerung
    • Cloud
    • Branchen
      • Finanzdienstleistern
      • Behörden
      • Hochschulen
      • Gesundheitswesen
      • Einzelhandel
    • Plattformen
      • SAP
  • Dienstleistungen
    • Professionelle Services
    • One Identity University
    • Support-Services
  • Support
    • By Product
      • Alle Produkte
      • Active Roles
      • Safeguard Authentication Services
      • Cloud Access Manager
      • Defender
      • Identity Manager
      • Password Manager
      • Safeguard
      • Starling Identity Analytics & Risk Intelligence
      • Starling Two-Factor Authentication
      • TPAM
    • Support kontaktieren
      • Kunden-Support
      • Unterstützung bei der Lizenzierung
      • Unterstützung für Verlängerungen
      • Technischen Support
      • Alle
    • Software-Downloads
    • Knowledge Base
    • Mein Konto
      • Meine Produkte
      • Meine Serviceanfrage
      • Meine Lizenzen
      • Meine Gruppen
      • Mein Profil
    • Richtlinien und Verfahren
    • Beratungsleistungen
    • Technische Dokumentationen
    • One Identity University
    • Benutzerforen
    • Videoanleitungen
    • Support Home
  • Testversionen
  • Partner
  • Communities
Anmelden
  • Drucken
  • Meine Downloads ()
  • Support
  • Technische Dokumentation
  • One Identity Safeguard for Privileged Passwords 6.0.10 LTS
  • One Identity Safeguard for Privileged Passwords 6.0.10 LTS - Administration Guide

One Identity Safeguard for Privileged Passwords 6.0.10 LTS - Administration Guide

Inhaltsnavigation  
Introduction
Introduction to One Identity Safeguard for Privileged Passwords
Overview of the entities Key features
Appliance specifications
System requirements and versions
Desktop client system requirements Web client system requirements Web management console system requirements Supported platforms
Setting up the virtual appliance
License: hardware, virtual, expiration Long Term Support (LTS) and Feature Releases
Using API and PowerShell tools
Using the API
Customize the response using API query parameters
Safeguard PowerShell
Using the virtual appliance and web management console
Virtual appliance backup and recovery Support Kiosk
Cloud deployment considerations
AWS deployment Azure deployment Virtual appliance backup and recovery
Setting up Safeguard for Privileged Passwords for the first time
Step 1: Create the Authorizer Administrator Step 2: Authorizer Administrator creates administrators Step 3: Appliance Administrator configures the appliance Step 4: User Administrator adds users Step 5: Asset Administrator adds managed systems Step 6: Security Policy Administrator adds access request policies
Using the web client
Home My Requests (web client) Approvals (web client) Reviews (web client) Favorites (web client) Settings, version, and desktop Windows client (web client) Change password (web client) FIDO2 keys (web client) Log out (web client)
Getting started with the desktop client
Installing the desktop client Starting the desktop client Uninstalling the desktop client
Using the desktop client
Settings (desktop client) User information and log out Desktop client favorite request Desktop client navigation pane
Home Dashboard
Access Requests
Viewing details
Account Automation
Activity Center
Applying search criteria Saving search criteria Generating an activity audit log report Scheduling an activity audit log report Editing or deleting a saved search or scheduled report Viewing event details Auditing request workflow Filtering report results Sorting report results
Reports
Running an entitlement report Converting time stamps
Administrative Tools
Toolbar options
Search box
Search by attribute Select a drop-down to sort
Privileged access requests
Configuring alerts
Toast notifications Email notifications
Password release request workflow
Requesting a password release
Taking action on a password release request
Approving a password release request Reviewing a completed password release request
Session request workflow
About sessions and recordings Requesting session access
Taking action on a session request
Approving a session request Launching the SSH client Launching an RDP session Reviewing a session request Replaying a session Following and terminating a "live" session
Toolbox
Viewing task status Stopping a task
Accounts
General tab (account) Access Request Policies tab (account) Account Groups tab (account) Dependent Assets (account) Check and Change Log tab (account) History tab (account) Managing accounts
Adding an account Adding a cloud platform account Manually adding a tag to an account Adding an account to one or more account groups Modifying an account Deleting an account Importing objects
Creating an import file
Checking, changing, or setting an account password Viewing password archive
Account Groups
General tab (account group) Accounts tab (account group) Access Request Policies tab (account group) History tab (account group) Managing account groups
Adding an account group Adding a dynamic account group
General tab (add dynamic account group) Account Rules tab (add dynamic account group) Summary tab (add dynamic account group)
Adding one or more accounts to an account group Adding accounts to an access request policy Modifying an account group Deleting an account group
Assets
General tab (asset) Accounts tab (asset) Account Dependencies tab (asset) Access Request Policies tab (asset) Asset Groups tab (asset) Discovered Services tab (asset) History tab (asset) Managing assets
Adding an asset
General tab (add asset) Management tab (add asset) Account Discovery tab (add asset) Connection tab (add asset)
About service accounts About Test Connection SSH Key
Importing an SSH key
Directory Account Local System Account Password (local service account) Access Key None
Attributes tab (add asset)
Checking an asset's connectivity Assigning an asset to a partition Assigning a profile to an asset Manually adding a tag to an asset Adding an account to an asset Adding account dependencies Adding an asset to asset groups Modifying an asset Deleting an asset Importing objects Downloading a public SSH key
Asset Groups
General tab (asset group) Assets tab (asset group) Access Request Policies tab (asset group) History tab (asset group) Managing asset groups
Adding an asset group Adding a dynamic asset group
General tab (add dynamic asset group) Asset Rules tab (add dynamic asset group) Summary tab (add dynamic asset group)
Adding assets to an asset group Modifying an asset group Deleting an asset group
Discovery
Asset Discovery
Asset Discovery job workflow Adding an Asset Discovery job
General tab (asset discovery) Information tab (asset discovery) Rules tab (asset discovery)
Add Condition (asset discovery) Edit Connection Template (asset discovery) Add Asset Profile (asset discovery)
Schedule tab (asset discovery) Summary tab (asset discovery)
Editing an Asset Discovery job Deleting an Asset Discovery job
Asset Discovery Results Account Discovery
Account Discovery job workflow Adding an Account Discovery job
Adding an Account Discovery rule
Editing an Account Discovery job Deleting an Account Discovery job
Account Discovery Results Discovered Accounts Service Discovery Results Discovered Services
Entitlements
General tab Users tab Access Request Policies tab History tab Managing entitlements
Adding an entitlement
General tab
About priority precedence
Time Restrictions tab
About time restrictions
Creating an access request policy
General tab Scope tab Requester tab Approver tab Reviewer tab Access Config tab Session Settings tab Time Restrictions tab Emergency tab
Adding users or user groups to an entitlement Deleting an access request policy Modifying an access request policy Copying an access request policy Viewing and editing policy details Modifying an entitlement Deleting an entitlement
Partitions
About partition profiles General tab (partitions) Assets tab (partitions) Accounts tab (partitions) Profiles tab (partitions) History tab (partitions) Managing partitions
Adding a partition Adding assets to a partition Removing assets from a partition Creating a profile Modifying a profile Setting a default partition Setting a default partition profile Assigning assets or accounts to a profile Modify a partition Delete a partition
Settings
Access Request settings
Enable or Disable Services Reasons
Appliance settings
Appliance Diagnostics Appliance Information
Setting the appliance name Shutting down the appliance Restarting the appliance
Enable or Disable Services Factory Reset from the desktop client Licensing Lights Out Management (BMC) Network Diagnostics
Ping NS Lookup Trace Route Telnet Show Routes
Networking Operating system licensing Support Bundle Time Updates
Asset Management settings
Custom platforms
Creating a custom platform script Adding a custom platform
Tags
Adding a tag for dynamic tagging of assets or asset accounts Deleting an asset or asset account tag Modifying an asset or asset account tag Copying an asset or asset account tag to another partition Viewing asset and asset account tag assignments
Backup and Retention settings
About backups Archive servers
Adding an archive server
Audit Log Management Backup and restore
Run Now Backup settings Download Upload Restore Archive backup
Backup retention
Certificate settings
About certificates Audit Log Signing Certificate
Installing an audit log signing certificate Creating a Certificate Signing Request for audit logs
Certificate Signing Request SSL Certificates
Installing an SSL certificate Creating a Certificate Signing Request (CSR) Assigning a certificate to appliances
Trusted Certificates
Adding a trusted certificate Removing a trusted certificate
Cluster settings
Cluster Management
Cluster view pane Appliance details and cluster health pane
Managed networks
Adding a managed network Deleting a managed network Resolving IP address
Offline Workflow (automatic)
Enable automatic Offline Workflow Manually override automatic Offline Workflow
Session Appliances with SPS join
External Integration settings
Application to Application
About Application to Application functionality Setting up Application to Application Adding an application registration Deleting an application registration Regenerating an API key Making a request using the Application to Application service
Approval Anywhere
Adding authorized user for Approval Anywhere
Email
Enabling email notifications Modifying an email template
Identity and Authentication
Authentication provider combinations Adding identity and authentication providers
SNMP
Configuring SNMP subscriptions Verifying SNMP configuration
Starling
Join Starling
Syslog
Configuring a syslog server Verifying syslog server configuration
Ticketing system
Messaging settings
Login Notification Message of the Day
Profile settings
Account Password Rules
Adding an account password rule
Change Password
Adding change password settings
Check Password
Adding check password settings
Password sync groups
Adding a password sync group Modifying a password sync group
Safeguard Access settings
Login Control Password Rule
Modifying user password requirements
Time Zone
Users
General tab (user) User Groups tab (user) Partitions tab (user) Entitlements tab (user) Linked Accounts tab (user) History (user) Managing users
Adding a user
Identity tab (add user) Authentication tab (add user) Location tab (add user) Permissions tab (add user)
Requiring secondary authentication log in
Configuring user for Starling Two-Factor Authentication when logging in to Safeguard
Adding a user to user groups Assigning a user to partitions Adding a user to entitlements Linking a directory account to a user Modifying a user Enabling or disabling a user Deleting a user Importing objects Setting a local user's password Unlocking a user's account
User Groups
General tab (user groups) Users tab (user groups) Entitlements tab (user groups) History tab (user groups) Managing user groups
Adding a user group Adding a directory user group Adding users to a user group Adding a user group to an entitlement Modifying a user group Deleting a user group
Disaster recovery and clusters
Enrolling replicas into a cluster Unjoining replicas from a cluster Maintaining and diagnosing cluster members
About Offline Workflow Mode
Manually control Offline Workflow Mode
Failing over to a replica by promoting it to be the new primary Activating a read-only appliance Diagnosing a cluster member Patching cluster members
About cluster patching
Using a backup to restore a clustered appliance Resetting a cluster that has lost consensus Performing a factory reset Unlocking a locked cluster
Troubleshooting tips
Appliance states
Administrator permissions
Appliance Administrator permissions Asset Administrator permissions Auditor permissions Authorizer Administrator permissions Help Desk Administrator permissions Operations Administrator permissions Security Policy Administrator permissions User Administrator permissions
Preparing systems for management
Preparing ACF - Mainframe systems Preparing Amazon Web Services platforms Preparing Cisco devices Preparing Dell iDRAC devices Preparing VMware ESXi hosts Preparing Fortinet FortiOS devices Preparing F5 Big-IP devices Preparing HP iLO servers Preparing HP iLO MP (Management Processors) Preparing IBM i (AS/400) systems Preparing JunOS Juniper Networks systems Preparing MongoDB Preparing MySQL servers Preparing Oracle databases Preparing PAN-OS (Palo Alto) networks Preparing PostgreSQL Preparing RACF mainframe systems Preparing SAP HANA Preparing SAP Netweaver Application Servers Preparing Sybase (Adaptive Server Enterprise) servers Preparing SonicOS devices Preparing SonicWALL SMA or CMS appliances Preparing SQL Servers Preparing Top Secret mainframe systems Preparing Unix-based systems Preparing Windows systems
Minimum required permissions for Windows assets
Preparing Windows SSH systems
Troubleshooting
Anti-CSRF (cross-site request forgery) token error Connectivity failures
Change password fails Incorrect authentication credentials Missing or incorrect SSH host key No cipher supported error Service account has insufficient privileges
Cannot connect to remote machine through SSH or RDP Cannot delete account Cannot play session message Domain user denied access to Safeguard for Privileged Passwords LCD status messages
Appliance LCD and controls
My Mac keychain password was lost Password fails for Unix host Password is pending review Password is pending a reset Profile did not run Recovery Kiosk (Serial Kiosk)
Appliance information (Recovery Kiosk) Power options
Rebooting the appliance Shutting down the appliance
Admin password reset Factory reset from the Recovery Kiosk Support bundle
Replica not adding System services did not update or restart after password change Test Connection failures
Test Connection failures on archive server Certificate issue Cipher support Domain controller issue Networking issue Windows WMI connection failure
Timeout errors causing operations to fail User locked out User not notified
Frequently asked questions
How do I audit transaction activity How do I configure external federation authentication
How do I add an external federation provider trust How do I create a relying party trust for the STS How do I add an external federation user account
How do I manage accounts on unsupported platforms How do I modify the appliance configuration settings How do I prevent Safeguard for Privileged Passwords messages when making RDP connections How do I set up telnet and TN3270/TN5250 session access requests How do I set the appliance system time How do Safeguard for Privileged Passwords database servers use SSL What are the access request states What do I do when an appliance goes into quarantine When does the rules engine run for dynamic grouping and tagging Verifying syslog server configuration Why did the password change during an open request
Appendix A: Safeguard ports Appendix B: SPP 2.7 or later migration guidance Appendix C: SPP and SPS join guidance Appendix D: Regular Expressions SPP glossary
  • Viewing Topics 517 - 517 of 517

SPP glossary

access request
Rule-based password request and/or session request for an account. Access can be automatically approved or require one or more approvals. Email or toast notifications can be set.
access request broker
With the Application to Application service, a third-party application can create an access request on behalf of another user.
access request policy
Settings that restrict system access. Used to manage access (for example, to a password release request policy or session request policy). Defines the scope (assets, asset groups, accounts, or account groups), the access type (password, SSH, RDP, or telnet), and the rules for password check out (duration and number of approvals). Entitlements are sets of access request policies.
access request policy time restrictions
Enforce when a user can access the account passwords. If there are entitlement and policy time restrictions, the overlapping period is valid.
account
May be a directory account or service account associated with an asset. An account can only be associated with one asset. Accounts are added to policies for management (for example, to a password release request policy or session request policy). An account may be associated with an entitlement, account group, or both. Also see user.
account dependency
SPP maintains the passwords for dependent accounts on all the systems that use them (for example, one or more Windows servers use a directory account, such as an Active Directory account, to run services or tasks).
Account Discovery job
Job with rule-based settings to discover all accounts assigned to the assets in a selected partition, are made available globally, or only the accounts that match the rules criteria. You can automatically manage the found accounts and automatically discover and configure dependent systems. Or, you can manually add the discovered accounts.
account group
A set of accounts that can be added to the scope of an access request policy, which in turn can be associated with an entitlement. See dynamic account group.
AD (Active Directory)
Microsoft AD consists of services running on a Windows Server to manage permissions and access to networked resources. AD stores data as objects.
AD FS (Active Directory Federated Services)
A software component developed by Microsoft that runs on a Windows Server operating systems to provide users with single sign-on access to systems and applications located across organizational boundaries.
appliance
The SPP appliance is hardware with pre-installed software to for easy installation. The appliance is hardened to ensure security at the hardware, operating system, and software levels.
Appliance Administrator
Responsible for configuring and maintaining the SPP appliance.
Application to Application (A2)
An SPP service where third-party applications can retrieve a credential from SPP to 1) perform automated functions or 2) allow a user to log in to SPP to retrieve a password or start a session.
Approval Anywhere
SPP feature where an approver can approve (or deny) access requests through their mobile device.
archive servers
External physical servers where you store backup files.
asset
A computer, server, network device, directory, or application managed by Safeguard for Privileged Passwords. You can log in to an asset with more than one account, but an account (user, group, or service) can only be associated with one asset. All assets must be governed by a partition profile. Assets may be subdivided into subsets for management. For example, a directory asset can manage a subset of the forest.
Asset Administrator
Manages all partitions, assets, and accounts.
Asset Discovery job
Job with rule-based settings to discover and add assets that are not in SPP. A job can be run against a directory or network (IP range).
asset group
A set of assets that can be added to the scope of an access request policy, which in turn is associated with an entitlement. See dynamic asset group.
asset tag rules
Can be set to dynamically add tags to assets and asset accounts so the assets and asset accounts can be identified and added to dynamic groups.
audit log management
Tasks defined and scheduled to purge audit logs from the SPP Appliance and archive older audit logs to a designated archive server.
audit log signing certificate
Used to sign the audit log files saved to an archive server. Proves that the audit logs were created by and came from a particular SPP cluster.
Auditor Administrator
Role with read-only access to all features to review all access request activity.
authentication
Authentication is the process of validating an identity provided to a system. For example, a system checks the user’s login name and password. In SPP, a user’s identity provider and authentication provider can be the same or different.
authentication provider
In SPP, any mechanism that a user enters credentials into to prove they are acting on behalf of a specific user or system, but does not necessarily contain any personal information of the user. An authentication provider can be the same as the identity provider (such as Active Directory). See identity provider.
Authorizer Administrator
Creates and maintains users, directory groups, directory users, password rules, and passwords. Unlocks and enables or disables local and directory user accounts. Typically unlocks administrator accounts.
auto-login
Automatic login that never exposes the account credentials to the user.
backup and retention settings
Used to manage SPP backups and archive servers. SPP encrypts and signs the data before the data is made available for downloading to an off-appliance storage.
Bootstrap Administrator
A built-in account to use to start up the appliance for the first time. The account is used to create other administrators. The Bootstrap Administrator default password should be changed. All actions are audited.
CA (certificate authority)
The authority that issues SSL certificates that are publicly trusted by web browsers. Anyone can issue SSL certificates but the certificates are not automatically trusted by web browsers.
certificate (SSL certificate)
A small file installed on a secure server that digitally binds a cryptographic key to a computer, device, individual, or organization. A certificate is used to establish trust for communication. Certificates contain information identifying the owner of the certificate, the public key, the expiration date of the certificate, the name of the CA that signed the certificate, and some other data.
certificate settings
Used to manage the certificates that are used to secure SPP. Some SPP certificates are default and need to be replaced and others are user-supplied certificates.
certificate store
A special key database file that Digital Certificate Manager (DCM) uses to store digital certificates. In SPP, the certificate store is owned by the cluster. SSL certificates in the store can be added to any appliance in the clustered environment.
change password
For user and service accounts, the rules and process to reset and synchronize the user or service account password with the SPP database. For directory accounts, SPP synchronizes the directory account password provided by an external identity provider, such as Active Directory. Also see check password and set password.
check password
For user and service accounts, the rules and process to verify the account password is in sync with the SPP database. If the password verification fails, you can change the password. Check passwords is associated with a partition. For directory accounts, the rules and process to verify the directory account passwords (such as Active Directory) and synchronize with SPP. Also see change password and set password.
CIDR (Classless Inter-Domain Routing)
Allows flexible allocation of Internet Protocol (IP) addresses. A CIDR network address under IPv4 looks like: 192.20.250.00/18. The network address is 192.20.250.00 and the 18 indicates that the first 18 bits are the network part of the address that leaves the last 14 bits for specific host addresses.
clone of VM
A copy of an existing virtual machine (the parent) that is a separate virtual machine which may share virtual disks with the parent virtual machine.
cloud platform account
SPP can manage cloud platform accounts such as Amazon Web Services (AWS).
cluster
A set of computers that work together where each replica (node) can perform the same task to enable high availability and load distribution.
consensus (quorum)
A cluster has consensus (quorum) when the majority of the members (primary or replica appliances) are online and able to communicate.
credential retrieval
With the SPP (Application to Application service), a third-party application can retrieve credentials from SPP outside the normal workflow.
CSR (certificate signing request)
A CSR is submitted to a certificate authority (CA) to obtain a digitally signed certificate.
CSS (cascading style sheet)
A .css file that describes how HTML elements display on screen, paper, or other media. See HTML5.
csv
A file format used with programs that store data in tables, such as Microsoft Excel. CSV stands for Comma-Separated Values.
custom platform
Platform added to SPP via uploading a custom platform script. The script may be selected when adding or updating an asset. Custom platforms are global across all partitions.
DCM (Digital Certificate Manager)
Used to manage digital certificates on a network and use Secure Sockets Layer (SSL) to enable secure communications for applications.
default gateway
The access point or IP router that sends information to a computer in another network when no other route specification matches the destination IP address of a packet.
default SSL certificate
SPP provides a default self-signed SSL certificate for HTTPS assigned to the appliance. This certificate is not a trusted certificate and should be replaced.
delegated owner
One or more users that the Asset Administrator selected to manage the assets and accounts in a partition.
deny
An active access request can be either denied or approved. An approved active access request can be revoked.
directory
A structure to catalog files and, possibly, other directories. In SPP, the structure and objects from a directory service, such as Active Directory or OpenLDAP, can be imported and synchronized.
directory account
An account from an external identity store, such as Microsoft Active Directory, used to authenticate to a managed system (asset).
DNS (Domain Name System)
System to translate human readable information (such as a domain name, web site, or other internet-based resource) to the addressing protocols (IP address).
DNS server (domain name server)
Contains a database of public IP addresses and their associated hostnames and translates the common names to IP addresses.
domain name
The name of a network (for example, oneidentity.com).
dynamic account group
Account group made up of systematically identified accounts that meet asset account rules, directory account rules, or both. The rules engine runs when you add or change an asset account or an asset account rule.
dynamic asset group
Asset group made up of systematically identified assets that meet identified rules.
dynamic disk
Fault-tolerant volumes that may span multiple disks; flexible volume management with database tracking and replica storage of the dynamic disk database.
entitlement
A set of access request policies that restrict system access (including rules and schedules), typically by job role. Entitlements are used to authorize users or user groups for accounts in the scope of the access request policies. Entitlements can be associated with one or more profiles.
entitlement time restrictions
Controls identifying when an entitlement is in effect (user's time zone). If there are both entitlement and policy time restrictions, the overlapping period is valid.
explicit association (explicit assignment)
You can explicitly add an asset to a profile. This overrides the implicit inheritance from the partition so the asset’s profile is no longer determined by the partition. You can explicitly assign an account to a profile the account’s profile is no longer determined the asset.
factory reset
Operation to recover from major problems or clear appliance data and configuration settings. All data and audit history are removed.
federation metadata
The data format for communicating configuration information between an identity (claims) provider and a relying party. The data format is defined in Security Assertion Markup Language (SAML) 2.0, and it is extended in WS-Federation.
federation provider
Service provider that mediates between two or more trust domains so users can access applications and services using the same digital identity.
FIDO2 (Fast ID Online)
A set of security specifications for strong authentication. FIDO2 supports multifactored authentication, public key cryptography, biometric authentication, and other personally identifying information (PII).
forest
Network logical division that may contain one or more trees and in turn domains made up of objects (computers, users, devices) sharing the same database. The first domain in the forest is called the forest root domain.
FQDN (fully qualified domain name)
A domain name that specifies its exact location in the tree hierarchy of the Domain Name System (DNS). For example, given a device with a local hostname myhost and a parent domain name example.com, the fully qualified domain name is myhost.example.com.
gateway
A device that connects two or more parts of the network. For example, the device may connect your local intranet and the external network (the internet). Gateways act as entrances to other networks.
GMT (Greenwich Meridian Time)
GMT is never out of sync with UTC (Coordinated Universal Time) by more than nine tenths of a second so UTC and GMT are virtually equivalent in common usage.
HA (high availability)
A system that is resilient and likely to operate continuously without failure for a long period of time.
Help Desk Administrator
Sets passwords for non-administrative user accounts and unlocks user accounts. The Authorizer Administrator typically unlocks administrator accounts.
host
A computer connected to the network. A host may offer resources, services, and applications to users or nodes on the network. May have virtualization software (such as ESX or ESXi) to run virtual machines (VMs).
hostname
A label assigned a device connected to a network and that is used to identify the device.
HTML5
Hypertext Markup Language version 5 is the code that describes web pages and includes HTML for structure, Cascading Style Sheets (CSS) for presentation, and JavaScript (processing).
identification
Identification happens when a user claims to be a specific system user. For example, a user’s login name and password are used to establish identity. In SPP, a user’s identity provider and authentication provider can be the same or different.
identity provider
In SPP, the source from which the user’s personal information comes from and is synchronized with. See authentication provider.
implicit association (implicit assignment)
When an asset is added, it is added to the default partition and default profile (implicit association/assignment). Accounts inherit the parent asset’s profile. This can be overridden by explicitly assigning an asset to a profile; the asset’s associated accounts are also assigned to the new profile.
import
Accounts, assets, or users in a Comma Separated Values (.csv) file can be added to SPP’s database. Objects must pass validity tests. Default values may be added during the import.
IP address (Internet Protocol address)
Unique internet number assigned to each device communicating across the internet. The IP address provides location and identification. See DNS.
IPv6 (Internet Protocol version 6)
The most recent version of the Internet Protocol (IP). See IP address.
JavaScript
A computer programming language commonly used for processing on the web. See HTML5.
json
A language-independent data format. Code for parsing and generating JSON data is readily available in many programming languages. JSON stands for "JavaScript Object Notation".
key pair
A private key and its related public key. The private key is known only to the owner, while the public key can be freely distributed. Information encrypted with the private key can only be decrypted using the public key.
KMS (Key Management Service)
Used to activate systems in the organization’s network so that individual computers do not have to connect to Microsoft for product activation.
KMS Server (Microsoft Key Management Server)
A Microsoft Volume Activation 2.0 solution service used to activate volume licensed Microsoft products.
LDAP (Lightweight Directory Access Protocol)
An application protocol for querying and modifying data using directory services running over TCP/IP.
lights out management (via BMC/baseboard management controller)
Feature to manage the SPP power state and serial using BMC. This feature is used to power on an appliance remotely or to interact with the Recovery Kiosk.
MAC (Media Access Control) address
An identifier assigned to a network adapter or any device with built-in networking capability (such as a printer). A MAC address is burned into the device at the factory (versus an IP address that is assigned later). Also called a hardware address or physical address.
Mac keychain
The Apple password management system in Macintosh OS X.
managed networks
Named lists of network segments serviced by specific SPP Appliances in a clustered environment. Used to distribute the task load by scheduling tasks (for example, password change or asset discovery).
MSI
MSI is an installer package file format used to launch Windows-based software installations.
netmask
For IPV4, a 32-bit mask used to divide an IP address into subnets and specify the network's available hosts.
network interface and proxy server
Network interface X0 is the primary interface. Proxy server X0 is for relaying web traffic if the devices don't connect to the web.
NS lookup (named service lookup)
Network utility program to obtain information about internet servers. It finds name server information for domains by querying the domain name server (DNS).
NTP (Network Time Protocol)
Protocol to synchronize computer clock times in a network.
Offline Workflow Mode
Appliance state when the appliance no longer has consensus (quorum) and has been enabled to process access requests using cached policy data. The appliance operates in isolation from the remainder of the cluster.
Operations Administrator
Monitors the status of the appliance and can reboot the appliance. This role can be a script or external monitoring system.
OU (Organizational Unit)
A subdivision within an Active Directory into which you can place users, groups, computers, and or any other organizational units (for example, functional or business hierarchy.
OVA (Open Virtualization Appliance)
An OVA file contains a compressed version of a virtual machine (VM) to be installed. When you open an OVA file, the VM is extracted and imported into the virtualization software installed on your computer.
partition
A group of assets (and the assets’ associated accounts) governed by a partition profile and used for delegate asset management. An asset can only be in one partition at a time. All accounts associated with that asset are automatically added to the partition but can be reassigned.
partition profile
The schedules and rules that are required to govern a partition’s assets and the assets’ accounts. You can set a default partition profile to assign to assets and assets’ accounts. You can manually assign a partition profile to an asset or account.
password rules
The requirements for user password authentication, such as uppercase and lowercase letters, numerics, and special characters. Password rules set in SPP apply to local users not users from external providers such as Active Directory.
password sync groups
Used to control password validation and reset across all associated accounts.
ping
A command that sends a message from a host to another host over a network to test connectivity and packet loss.
port
A number from 1 to 65,535 for the destination application of the transmitted data. For example, SSH commonly uses port 22 and web servers (HTTP) commonly use port 443.
primary appliance
One appliance in a cluster where vital data stored on the primary is also stored on replica appliances.
primary authentication
The first authenticating factor for a remote user when two-factor authentication (2FA) is enabled.
priority precedence
In authorizing password check-out, SPP first considers the entitlement priority then considers the priorities of access request policies in the entitlement.
profile
See partition profile and directory profile.
PuTTY
A free and versatile terminal tool for remote access to another computer.
RBAC (role-based access control)
The role-based access control model restricts system access to authorized users based on roles. SPP supports this model.
RDP (Remote Desktop Protocol)
A Microsoft proprietary protocol that provides graphical user interface to connect to another computer over a network connection.
regular expression
A string that describes or matches a set of strings.
relying party
A service or application, like Safeguard, that receives and accepts a SAML assertion issued by a SAML authority.
REST
Architecture that allows other applications and systems to integrate with diverse systems and applications. SPP’s API is based on a REST architecture.
revoke
An approved active access request can be revoked.(An active access request can be either denied or approved.)
root SSL certificate (trusted certificate)
A certificate issued by a trusted certificate authority (CA) at the top of the trust chain and used to issue intermediate SSL certificates to ensure the security of the system.
SAML (Security Assertion Markup Language)
An open standard for sharing security information about identity, authentication and authorization across systems. SAML is implemented with the XML standard for sharing data. SAML provides a framework for implementing single sign-on and other federated identity systems.
scope
An access request policies assets, asset groups, accounts, or account groups assignments.
Secure Shell (SSH)
A security protocol for logging in to a remote server.
security key
A small physical device that is inserted into a USB drive. Typically, you will enter your password then insert the security key as a required second form of authentication. You can use one security key with more than one account. You can have multiple security keys registered on an account. Activating the registration of a security key varies with the key (for example, press a button or tap). Security keys must be U2F or WebAuthn capable.
Security Policy Administrator
Creates account groups, asset groups, and user groups. Creates entitlements and adds users or user groups to entitlements. Configures access request policies.
service account
Used by an application or service to interact with the operating system or configuration.
service account domain name
The name of the domain where the service account resides. SPP uses DNS-SRV to resolve domain names to actual domain controllers.
Service Discovery job
Scans Windows assets and automatically discovers Windows services and tasks. If the directory accounts are managed by SPP, the service or task is automatically associated with the managed account. Administrators can identify unmanaged accounts to potentially manage.
sessions
SPP issues privileged access to users for specific periods, called sessions.
set password
Rules and process to manually set or randomly generate the user or service account passwords in the SPP database. The process does not change the account password on the asset. For directory accounts, SPP synchronizes the directory account password provided by an external identity provider, such as Active Directory. Also see check password and change password.
SID (Security IDentifier)
An alphanumeric name used to identify user, group, and computer accounts in Windows. SIDs are created an account is first created in Windows and no two SIDs on a computer are ever the same.
SMTP server (Simple Mail Transfer Protocol server)
Protocol server that handles email delivery process (for example, smtp.gmail.com).
snapshot of VM
The state of a computer system at a point in time. Snapshots are not enough to restore a virtual machine and do not replace backukps.
SNMP (Simple Network Management Protocol)
An industry standard protocol for network management. SNMP alerts are sent to a central SNMP server.
SPA
One Identity Safeguard for Privileged Analytics solution to monitor behavior and identify threats.
split brain
A split brain situation occurs when for some reason (for example, the loss of connection between the nodes) both nodes of a cluster become active as the primary. New data (for example, audit trails) may be created on both nodes without being replicated to the other node. Thus, it is likely in this situation that two diverging sets of data are created that cannot be easily merged.
SPP
One Identity Safeguard for Privileged Passwords solution to secure privileged credentials.
SPS
One Identity Safeguard for Privileged Sessions solution to control, monitor, and record privileged sessions.
SSH (Secure Shell) key
An access credential in the SSH protocol. The function is similar to a user name and passwords, but SSH keys are primarily used for automated processes and for implementing single sign-on to an SSH server by system administrators and power users.
SSH authorized key
The public key from an SSH identity key pair.
SSH banner
Contains security warning information or general information.
SSH host key
Used for authentication. Host keys are pairs. Public host keys are stored on or distributed to SSH clients. Private keys are stored on SSH servers.
SSH identity key
An SSH key pair used for SSH 'publickey' authentication. The private key is required to prove identity and log in wherever the key is authorized.
SSH key
An access credential in the SSH protocol. Functionally similar to a user name and password, but primarily used for automated processes and single sign-on by system administrators and power users.
SSH settings
Parameters of the connection on the protocol level, including timeout value and greeting message of the connection, as well as the encryption algorithms used.
SSL
Secure Sockets Layer (SSL) is a cryptographic protocol that provides secure communications on the internet.
SSL certificate store
Contains uploaded or enrolled SSL certificates owned by a cluster. Any SSL certificate in the store can be assigned to any appliance in the clustered environment.
SSO (single sign-on)
User logs in with a single ID and password per session to gain access to multiple services within a single organization.
STS (Security Token Service)
A third-party servce responsible for issuing, validating, renewing, and cancelling security tokens. The tokens are used to identify the holder of the token to services that adhere to the WS-Trust standard.
support bundle
System and configuration information sent to One Identity Support to analyze and diagnose issues.
syslog
Protocol to produce and send log and event information from Unix/Linux and Windows systems and devices over UDP port 514 to a centralized syslog server.
tags
Can be assigned manually (static) or dynamically set through tagging rules (identified by a lightning bolt icon). Tags are helpful in searches. Dynamic tags are updated when the rules engine runs when you add or change an asset account or an asset account rule.
TCP/IP (Transmission Control Protocol/Internet Protocol)
A set of networking protocols that allows two or more computers to communicate.
telnet
A terminal emulation protocol that enables a user to connect to a remote host or device using a telnet client.
thumbprint
A unique hash value that identifies the certificate.
ticketing feature
SPP can be integrated with a company's external ticket system, such as ServiceNow or Remedy.
TLS (Transport Layer Security)
TLS and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols that provide secure communications on the internet. The application can encrypt the communication between the clients and the server using TLS to prevent unauthorized access to sensitive log messages.
toast notifications
A small, auto-expiring alert that displays when the desktop client application is not the active foreground application.
traceroute
A command that shows all routing steps (the path of a message) between two hosts.
traffic shaping (packet shaping)
Manipulates and prioritizes network traffic to reduce the impact of heavy use cases from effecting other use cases.
two-factor authentication (2FA)
A user is required to provide two different authentication factors to verify themself. Provides a higher level of security than one factor and protects the user's credentials and the resources accessed.
UNC (Universal Naming Convention) path
Used to access network resources and contains two or more of the following components: \\<servername>. <share>.<filename>
user
A person who can log in to SPP. A user can be local or can be a directory user from an external identity store such as Microsoft Active Directory. A user may be associated with user groups, partitions, entitlements, and linked accounts. A user may or may not have administrator permissions.
User Administrator
Creates (or imports) users. Sets passwords, unlocks accounts, and enables or disables non-administrator user accounts. Adds directory groups to directories, including directory users. Grants Help Desk Administrator permissions. The Authorizer Administrator typically unlocks administrator accounts.
user group
A set of local users or directory users that can be added to an entitlement to use the entitlement’s access request policies restricting system access.
UTC (Coordinated Universal Time)
UTC is never out of sync with GMT (Greenwich Meridian Time) by more than nine-tenths of a second, so UTC and GMT are virtually equivalent in common usage.
virtual machine (VM)
A software computer that runs an operating system and applications and acts as an isolated computing environment. One host computer may have multiple virtual machines.
web console
A web-based application that allows you to execute shell commands on a server directly from a browser (web-based SSH).
WMI (Windows Management Instrumentation)
The infrastructure for accessing management data in an enterprise environment. You can write WMI scripts or applications to automate administrative tasks on remote computers. WMI also supplies management data to other parts of the operating system and products.
workflow engine
Directs workflow and may include time restrictions, reviewers, approvers, emergency access, and policy expiration. May integrate with a ticketing system and have reason codes.
  •  Zurück
  • Viewing Topics 517 - 517 of 517
  • Weiter 

 Willkommen beim Support!

Online-Support-Hilfe für *Produkt* finden Sie auf einer zugehörigen Support-Seite. Klicken Sie auf "Weiter", um zum entsprechenden Support-Inhalt und zur entsprechenden Unterstützung für *Produkt* weitergeleitet zu werden.

Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen

Unternehmen
  • Über uns
  • Kaufen
  • Kontakt
  • Karriere
  • Neuigkeiten
Ressourcen
  • Knowledge Base
  • Software herunterladen
  • Technische Dokumentation
  • One Identity University
  • Professionelle Services
Verwandte Themen
  • Support verlängern
  • Unterstützung bei der Lizenzierung
Soziale Netzwerke
  • Facebook
  • Twitter
  • LinkedIn
Websiteversion Germany  ist ausgewählt
  • Albania
  • Angola
  • Anguilla
  • Antigua & Barbuda
  • Argentina
  • Aruba
  • Australia
  • Austria
  • Azerbaijan
  • Bahamas
  • Bahrain
  • Barbados
  • Belgium
  • Belize
  • Benin
  • Bermuda
  • Bolivia
  • Bosnia-Herzegovina
  • Botswana
  • Brazil
  • British Virgin Islands
  • Bulgaria
  • Burkina Faso
  • Burundi
  • Cameroon
  • Canada
  • Cape Verde
  • Cayman Islands
  • Central African Republic
  • Chad
  • Chile
  • 中国
  • Colombia
  • Comros
  • Congo
  • Costa Rica
  • Croatia (Hrvatska)
  • Cyprus
  • Czech Republic
  • Democratic Republic of Congo
  • Denmark
  • Djibouti
  • Dominica
  • Dominican Republic
  • Ecuador
  • Egypt
  • El Salvador
  • Estonia
  • Ethiopa
  • Finland
  • France
  • French Guiana
  • French Overseas Territories
  • French Polynesia
  • Gabon
  • Gambia
  • Germany
  • Ghana
  • Greece
  • Grenada
  • Guadeloupe
  • Guatemala
  • Guinea
  • Guyana
  • Haiti
  • Honduras
  • Hong Kong
  • Hungary
  • Iceland
  • India
  • Ireland
  • Israel
  • Italy
  • Ivory Coast
  • Jamaica
  • 日本
  • Jordan
  • Kenya
  • 대한민국
  • Kuwait
  • Latvia
  • Lesotho
  • Liberia
  • Libya
  • Lithuania
  • Luxembourg
  • Macedonia
  • Madagascar
  • Malawi
  • Malaysia
  • Mali
  • Malta
  • Martinique
  • Mauritania
  • Mauritius
  • Mayotte
  • Mexico
  • Monaco
  • Montenegro
  • Montserrat
  • Mozambique
  • Namibia
  • Netherlands
  • New Caledonia
  • New Zealand
  • Nicaragua
  • Niger
  • Nigeria
  • Norway
  • Oman
  • Panamá
  • Paraguay
  • Peru
  • Philippines
  • Poland
  • Portugal
  • Puerto Rico
  • Qatar
  • Reunion
  • Romania
  • Russian Federation
  • Rwanda
  • Saudi Arabia
  • Senegal
  • Serbia
  • Seychelles
  • Sierra Leone
  • Singapore
  • Slovakia
  • Slovenia
  • Somalia
  • South Africa
  • Spain
  • St. Kitts & Nevis
  • St. Lucia
  • St. Vincent & Grenadines
  • Suriname
  • Swaziland
  • Sweden
  • Switzerland
  • Taiwan
  • Tanzania
  • Thailand
  • Togo
  • Trinidad y Tobago
  • Turkey
  • Turks & Caicos Islands
  • Uganda
  • Ukraine
  • United Kingdom
  • United States
  • Uruguay
  • US Virgin Islands
  • Venezuela
  • Yemen
  • Zambia
  • Zimbabwe
Germany
Deutsch | English

© 2025 One Identity LLC. ALL RIGHTS RESERVED. Nutzungsbedingungen Datenschutz Cookie Preference Center

OK Zu "Mein Konto" wechseln

Die Internet Explorer Versionen 8, 9 und 10 werden nicht mehr unterstützt.

Die Internet Explorer Versionen 8, 9 und 10 werden vom One Identity Portal nicht mehr unterstützt. Wir empfehlen Ihnen, Ihren Browser auf die neueste Version von Internet Explorer oder Chrome zu aktualisieren.

Zum Upgraden auf Internet Explorer 11 hier klicken

Zum Upgraden auf Chrome hier klicken

Wenn Sie weiterhin Internet Explorer 8, 9 oder 10 verwenden, können Sie nicht alle unsere großartigen Self-Service-Funktionen in vollem Umfang nutzen.

Close