Setting up Application to Application
In order to use Application to Application integration with Safeguard for Privileged Passwords, you must perform the following tasks:
-
Prepare third-party application for integration with Safeguard for Privileged Passwords.
-
Appliance Administrator enables Application to Application service in Safeguard for Privileged Passwords. Use one of the following methods:
-
Using the web client, navigate to Security Policy Management | Application to Application. In the Enabled column for the service, move the toggle to the right to enable the service.
-
Use the following URL: https://appliance/service/appliance/v3/A2AService/Enable.
-
Asset Administrator adds assets and accounts to Safeguard for Privileged Passwords. For more information, see Adding an asset and Adding an account
-
User Administrator adds certificate users to Safeguard for Privileged Passwords. For more information, see Adding a user.
-
Security Policy Administrator adds application registration to Safeguard for Privileged Passwords. For more information, see Adding an application registration.
-
Get the API key and copy/paste it into the third-party application in order to make requests from the third-party application. For more information, see Making a request using the Application to Application service.
Adding an application registration
To allow a third-party application to perform one of the tasks provided by the Application to Application service, you must register the third-party application with Safeguard for Privileged Passwords.
Prerequisites
- User Administrator adds certificate users to Safeguard for Privileged Passwords.
- Asset Administrator adds assets and accounts to Safeguard for Privileged Passwords.
To add an application registration
- Log in to the Safeguard for Privileged Passwords web client as a Security Policy Administrator.
- Navigate to Security Policy Management | Application to Application.
-
Click Add. The New Registration dialog displays.
- Specify the following information:
- Name: Enter a name for the application registration.
- Description: Enter information about the application registration.
-
Certificate User: Click Browse to select a certificate user who is associate with the third-party application being registered.
A certificate user must be specified. If not specified when you initially add an application registration, click Edit on the Application to Application page to specify the certificate user.
-
Visible To Certificate Users: Select this check box to make the registration, including the API keys, visible by the certificate user that is configured for the A2A registration.
- Click OK. This will save the initial application registration information and open a new dialog with additional settings.
-
The Access Request Broker tab displays a list of users for which the third-party application can create an access request on behalf of.
- Click to add a user or user group to the list.
-
Click Edit Restrictions to specify IP address restrictions for all of the users and user groups in the list.
A restriction is a list of IP addresses or range of IP addresses that are allowed to call the Application to Application service to perform this task. That is, if a restriction is added to a Credential Retrieval or Access Request Broker task, the service will only allow requests that initiate from the IP addresses specified in the restriction list.
The IP address notation can be:
- An IPv4 or IPv6 address (for example, 10.5.32.4)
- An address range in CIDR notation (for example, 10.5.0.0/16)
- Click to remove the selected user from the list.
-
The Credential Retrieval tab displays a list for which the third-party can retrieve credentials from Safeguard for Privileged Passwords without going through the normal workflow process.
- Click to add an account to the list.
-
Click Restrictions in the Restrictions column to specify IP address restrictions for the selected account.
A restriction is a list of IP addresses or range of IP addresses that are allowed to call the Application to Application service to perform this task. That is, if a restriction is added to a Credential Retrieval or Access Request Broker task, the service will only allow requests that initiate from the IP addresses specified in the restriction list.
The IP address notation can be:
- An IPv4 or IPv6 address (for example, 10.5.32.4)
- An address range in CIDR notation (for example, 10.5.0.0/16)
- Click to remove the selected account from the list.
- Click OK to save and close the dialog.
Once an application registration is added to Safeguard for Privileged Passwords, the third-party application can authenticate with Safeguard for Privileged Passwords using the API key that was generated and the certificate that was associated with the registration. To make a request, you must retrieve the relevant API key for the application using an authorized account (that is, using bearer token authentication) and install the correct certificate on the host that will make the request. For more information, see Making a request using the Application to Application service.
Deleting an application registration
You can delete a previously configured application registration from Safeguard for Privileged Passwords.
To delete an application registration
- Navigate to Security Policy Management | Application to Application.
- Select the application registration to be deleted.
- Click the toolbar button.
- Confirm your request.
Regenerating an API key
If, as the Security Policy Administrator, you discover that the API key has been stolen or misplaced, you can regenerate the API key at any time. When you regenerate an API key, it invalidates the old API key and prevents any services from using that key to access the Application to Application service.
To regenerate an API key
- Log in to the Safeguard for Privileged Passwords web client as a Security Policy Administrator.
- Navigate to Security Policy Management | Application to Application.
- Select an application registration from the list and click (Edit).
-
On the Access Request Broker tab, click (Regenerate).
You can now view or copy the new API key to the clipboard and use this new API key in your third-party application to access the Application to Application interfaces. See Making a request using the Application to Application service.