Manually adding a tag to an asset
Asset Administrators can manually add and remove static tags to an asset using the Tags pane, which is located at the bottom of the General tab when an asset is selected on the Assets view.
You cannot manually remove dynamically assigned tags which are defined by rules and indicated by a lightening bolt icon. You must modify the rule associated with the dynamic tag if you want to remove it. For more information, see Modifying an asset or asset account tag.
To manually add a tag to an asset
- Navigate to Asset Management > Assets.
- Select an asset and click View Details.
- Under Tags, click Edit. Existing tags are displayed.
-
Use one of the following methods to assign tags to the asset:
- To assign a previously created tag:
- Click Add Tag.
- In the Select Tags dialog, select the tag(s) to add to the asset.
- Click Select Tags to save your selection.
- To create a new tag:
- Click Add Tag.
- In the Select Tags dialog, click New Tag.
- Enter the requested information for the tag and click OK.
- Once finished adding any new tags, select the tag(s) to add to the asset.
- Click Select Tags to save your selection.
-
Click OK.
Adding an account to an asset
Use the Accounts tab on the Assets view to add an account to an asset.
You can manage tasks and services on a domain controller (DC) asset. For more information, see Using a domain controller (DC) asset.
You can add an account to an asset or add a directory account to a directory asset. Steps for both follow.
To add an account to an asset
-
Navigate to Asset Management > Assets.
-
Select an asset and click View Details.
-
Open the Accounts tab.
- Click New Account from the details toolbar.
- On the General tab, enter the following information:
-
On the Management tab, enter the following information:
-
Enable Password Request: This check box is selected by default, indicating that password release requests are enabled for this account. Clear this option to prevent someone from requesting the password for this account. By default, a user can request the password for any account in the scope of the entitlements in which they are an authorized user.
-
Enable Session Request: This check box is selected by default, indicating that session access requests are enabled for this account. Clear this option to prevent someone from requesting session access using this account. By default, a user can make an access request for any account in the scope of the entitlements in which they are an authorized user.
-
Password Profile: Browse to select a profile to govern this account.
By default an account inherits the profile of its associated asset, but you can assign it to a different profile for this partition. For more information, see Assigning assets or accounts to a password profile and SSH key profile.
-
Available for use across all partitions (For directory accounts only): When selected, any partition can use this account and the password is given to other administrators. For example, this account can be used as a dependent account or a service account for other assets. Potentially, you may have assets that are running services as the account, and you can update those assets when the service account changes. If not selected, partition owners and other partitions will not know the account exists. Although archive servers are not bound by partitions, this option must be selected for the directory account for the archive server to be configured with the directory account.
-
Click OK to save the account to the asset..
Directory assets
If you add directory user accounts to a directory asset, Safeguard for Privileged Passwords will automatically change the user passwords according to the profile schedule you set, which could prevent a directory user from logging into Safeguard for Privileged Passwords. For information about how to set up directory users as Safeguard for Privileged Passwords users, see Adding a user.
For Active Directory, the standard global catalog port, 3268 (LDAP), must be open on the firewall for every Windows global catalog server in the environment and SPP Appliance to communicate for directory management tasks (for example, adding a directory account, a directory user account, or a directory user group). LDAP uses port 389 for unencrypted connections. For more information, see the Microsoft publication How the Global Catalog Works.
To add a directory account to a directory asset
-
Navigate to Asset Management > Assets.
-
Select a directory asset and click View Details.
-
Open the Accounts tab.
- Click New Account from the details toolbar.
- In the New Account dialog, click Select Account.
- In the Account Search Options dialog:
- Starts With (Active Directory ANR Search): Use this field to enter a full or partial account name.
- Search Location: Use the Browse button to select a container within the directory as the Search Location.
- The Include objects from sub containers check box is selected by default, indicating that child objects will be included in your search. Clear this check box to exclude child objects from your search.
- Click Find Account to search for the account.
- The results of the search displays in the Select Account grid. Select an account to add to Safeguard for Privileged Passwords.
- To save the selected accounts, click Select Account.
- Click OK to save the directory account to the directory asset.
Adding account dependencies
One or more Windows servers can use a directory account (such as an Active Directory account) to run hosted services and/or tasks. The Asset Administrator can configure a dependency relationship between the directory account and the Windows servers. Safeguard for Privileged Passwords performs dependent system updates to maintain the passwords for dependent accounts on all the systems that use them. For example, when Safeguard for Privileged Passwords changes the directory account password, it updates the credentials on all the Windows server's dependent accounts so that the services or tasks using this account are not interrupted. Also see KB article 312212.
You can manage tasks and services on a domain controller (DC) asset. For more information, see Using a domain controller (DC) asset.
Configuring account dependencies on an asset
- Directory accounts:
- You must add directory accounts before you can set up account dependency relationships. For more information, see Adding an account.
- From the directory account, select the Available for use across all partitions option so it can be used outside its domain partition. For more information, see Adding an account.
-
Assets: You must add the target directory account as a dependent account for the asset. The service account can be a domain account (to look up domain information) or a local account if the asset is a Windows Server platform. The service account can be a domain or local account if the asset is a Windows Server platform. If the asset is a Windows SSH platform, then the service account must be a domain account in order to update dependent accounts.
IMPORTANT: For Windows SSH assets, a local account does not have the access necessary to discover services running as domain accounts. So if a local account is used, Safeguard for Privileged Passwords will only discover services running as local accounts, and domain account dependencies will not be updated.
Follow these steps:
- Navigate to:
- web client: Asset Management > Assets.
- Select the asset (such as a Windows server) from the object list and open the Account Dependencies tab.
- Click New Account from the details toolbar and select one or more directory accounts. Safeguard for Privileged Passwords only allows you to select directory accounts.
-
Profiles:
- The target directory account must be in the same profile as the dependent asset.
- You must configure the dependent asset's profile in the Change Password tab to perform the required updates on the asset. For example, select the Update Service on Password Change check box and so on. For more information, see Creating a password profile.
Adding users or user groups to an asset
When you add users to an asset, you are specifying the users or user groups that have ownership of an asset.
It is the responsibility of the Asset Administrator (or delegated partition owner) to add users or user groups to assets. The Security Policy Administrator only has permission to add groups, not users. For more information, see Administrator permissions.
To add users to an account
- Navigate to Asset Management > Assets.
- In Assets, select an asset from the object list and click View Details.
- Open the Owners tab.
- Click Add.
- Select one or more users or user groups from the list in the Select users and groups dialog.
- Click Select Owners to save your selection.