Chat now with support
Chat mit Support

One Identity Safeguard for Privileged Passwords 6.0.6 LTS - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Getting started with the desktop client Using the desktop client Search box Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Discovery Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Safeguard Access settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP 2.7 or later migration guidance Appendix C: SPP and SPS join guidance Appendix D: Regular Expressions SPP glossary

About time restrictions

An entitlement's time restrictions enforce when Safeguard for Privileged Passwords uses a policy; a policy's time restrictions enforce when a user can access the account passwords. If the entitlement and the policy both have time restrictions, the user can only check out the password for the overlapping time frame.

Time restrictions control when the entitlement or policy is in effect relative to a user's time zone. Although Safeguard for Privileged Passwords Appliances run on Coordinated Universal Time (UTC), the user's time zone enforces the time restrictions set in the entitlement or policy. This means that if the appliance and the user are in different time zones, Safeguard for Privileged Passwords enforces the policy in the user's time zone set in his account profile.

Creating an access request policy

It is the responsibility of the Security Policy Administrator to define access request policies in Safeguard for Privileged Passwords.

A policy defines:

  • The scope, which may be assets, asset groups, accounts, or account groups.
  • The access type, which may be password, SSH, RDP (remote desktop), or telnet.
  • The rules for checking out passwords, such as the duration, how many approvals are required, and so on.
Considerations
  • An access request policy is only assigned to one cluster.
  • An access request policy is only used in the entitlement in which it is created. If you delete an entitlement, all access request policies associated with that entitlement are deleted. You cannot copy an access request policy and add it to another entitlement; access request policies are entitlement-specific.

To add an access request policy to an entitlement

  1. Navigate to Administrative Tools | Entitlements.
  2. In Entitlements, select an entitlement from the object list and open the Access Request Policies tab.
  3. Click Create Access Policy from the details toolbar.
  4. In the Access Request Policy dialog, provide information in each of the tabs:

    General tab

    Where you add general information about the access request policy as well as specify the type of access being requested

    Scope tab

    Where you assign assets, asset groups, accounts, or account groups to an access request policy

    Requester tab

    Where you configure the access request policy requester settings

    Approver tab

    Where you configure the access request policy approver settings

    Reviewer tab

    Where you configure the access request policy reviewer settings

    Access Config tab

    Where you define the access settings for the selected type of request including allowing users to request passwords from their respective linked accounts

    Session Settings tab

    Where you configure the recording settings for session access requests

    Time Restrictions tab

    Where you indicate policy time restrictions

    Emergency tab

    Where you enable emergency access for the accounts governed by the access request policy

Related Topics

Deleting an access request policy

Modifying an access request policy

Copying an access request policy

Viewing and editing policy details

Reasons

General tab

On the General tab, enter the following information for the access request policy.

Navigate to Administrative Tools | Entitlements | Access Request Policies | (create or edit a policy).

Table 90: Access Request Policy: General tab properties
Property Description
Name

Enter a unique name for the access request policy.

Limit: 50 characters

Description

Enter descriptive text that explains the access request policy.

Limit: 255 characters

Priority

The priority of this policy compared to other policies in this entitlement.

If a user desires to access an account in the scope of two different request polices within an entitlement, then the policy with the highest priority (that is, the lowest number) takes precedence. For more information, see About priority precedence.

Access Type

Specify the type of access being requested:

  • Password
  • RDP
  • SSH
  • Telnet

NOTE: You can configure an access request policy for a password release, however, if the Privileged Passwords module license is not installed, you will not be able to submit a password release request.

Similarly, you can configure an access request policy for a session request.

Have the Policy Expire on Date and Time If applicable, select this check box to enforce an expiration date for the policy. Enter the expiration date and time.

Scope tab

Use the Scope tab to assign accounts, account groups, assets, and asset groups to an access request policy.

Navigate to Administrative Tools | Entitlements | Access Request Policies | (create or edit a policy).

  1. On the Scope tab:

    1. Click Add from the details toolbar and select one of the following options:

      • Add Account Group
      • Add Account
      • Add Asset Group: Only available for a session access request (that is, when access type RDP, SSH, or Telnet is selected on the General tab.
      • Add Asset: Only available for a session access request (that is, when access type RDP, SSH, or Telnet is selected on the General tab.
    2. In the selection dialog, make a selection then click OK.

      If you do not see the selection you are looking for, depending on your Administrator permissions, you can create it in the selection dialog. (You must have Asset Administrator permissions to create accounts and assets. You must have Security Policy Administrator permissions to create account groups and asset groups.)

  2. Repeat step one to make additional selections. You can add multiple types of objects to a policy; however, you can only add one type of object, like an accounts or account group, at a time.

All of the selected objects appear on the Scope tab in the Access Request Policy dialog. To remove an object from the list, select the object and click Delete.

Verwandte Dokumente

The document was helpful.

Bewertung auswählen

I easily found the information I needed.

Bewertung auswählen