It is the responsibility of the Asset Administrator to add SSH key profiles to Safeguard for Privileged Passwords.
To add an SSH key profile
- Navigate to Asset Management | Profiles | SSH Key Profiles.
- Click New Profile from the toolbar.
- In the New SSH Key Profiledialog, enter the following information:
-
Name: Enter a unique name for the partition. Limit: 50 characters.
-
Description: (Optional) Enter information about this partition. Limit: 255 characters.
-
Select a partition for the SSH key profile using the Browse button.
-
The Check SSH Key dialog, Change SSH Key dialog, and Discover SSH Key dialogs rely on configuration currently only available on the desktop client. For more information, see Checking, changing, or setting an SSH key.
-
Click OK to save the SSH key profile. Once saved you can edit the profile to add SSH key sync groups to your SSH key profile.
When you create a new partition, Safeguard for Privileged Passwords creates a corresponding default profile with default schedules and rules.
To set another SSH key profile as the default
- Navigate to Administrative Tools | Profiles.
-
In SSH Key Profiles, select a profile that is not the current default profile for a partition.
-
Click Set as Default from the details toolbar.
It is the responsibility of the Asset Administrator to manage SSH key profiles.
To delete an SSH key profile
- Navigate to Asset Management | Profiles | SSH Key Profiles.
- Select the profile to be deleted.
- Click Delete.
- Confirm your request.
(web client) Settings
In the web client, expand the Appliance Management section in the left navigation pane. Settings are available to Appliance Administrators, Operations Administrators, and the Bootstrap Administrator (Auditors have read-only access).
The following settings are available. See each section for a description of the functions available.
(desktop client) Settings
Using the desktop client, the Settings page in the Administrative Tools is where you configure Safeguard for Privileged Passwords to run backups, install updates, manage clusters, manage certificates, enable event notifications, enable external integration, define profile configuration settings, define user password and SSH key rules, define discovery rules, and run troubleshooting tools.
You must have administrator permissions to access the Settings page and the administrator permissions you have determine what you can do.
Use the Search control at the top of the Settings page to locate a particular setting. For example, if you type password and press the Enter key, a list of all the password settings appears; select an entry from this list to display the selected settings page.
The following Settings are available. See each section for a description of the functions available.