Chatee ahora con Soporte
Chat con el soporte

One Identity Safeguard for Privileged Passwords 7.2 - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Enable or Disable Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions About us

Account Rules tab (add dynamic account group)

Use the rule editor controls on the Account Rules tab of the Dynamic Account Group dialog to define the accounts that are to be included in the dynamic account group.

Table 179: Dynamic Account Group: Asset Account Rules tab
Property Description

Enable rule for this group

Select this check box to include an asset account rule for this dynamic account group. Selecting this check box enables the rule editor controls.

NOTE: You can create a dynamic account group without any rules; however, no accounts will to added to this dynamic account group until you have added a rule.

AND | OR

Click AND to group multiple search criteria together where all criteria must be met in order to be included.

Click OR to group multiple search criteria together where at least one of the criteria must be met in order to be included.

Attribute

In the first query clause box, select the attribute to be searched. Valid attributes include:

  • Name (Default)
  • Description
  • Platform
  • Disabled
  • Tag
  • Service Account
  • Partition Name
  • Asset Name
  • Asset Tag
  • Domain Name
  • NETBIOS Name
  • Distinguished Name (You cannot do a one-level search with this attribute.)
  • SID
  • Discovered Group Name (Use this selection to not specify the domain in the search. To specify the domain, select Discovered Group Distinguished Name.)
  • Discovered Group Distinguished Name (Use this selection to specify the search is for the domain to which the group belongs.)
  • Directory Container (If you use the operator Equal, one level is found.)

Operator

In the middle clause query box, select the operator to be used in the search. The operators available depend upon the data type of the attribute selected.

For string attributes, the operators may include:

  • Contains (Default)
  • Does Not Contain
  • Starts With
  • Ends With
  • Equals
  • Does Not Equal
  • Matches

For boolean attributes (such as Service Account), the operators may include:

  • Is True
  • Is False

Enter condition value

In the last clause query box, enter the search string or value to be used to find a match.

If you selected an attribute of Discovered Group Name, Discovered Group Distinguished Name, or Directory Container:

  1. Click Browse to go to the Select Directory Asset to Search dialog to locate the search string. The Name, Asset Partition, and Description for each directory display.
  2. Choose a directory and click OK.
  3. On the Location dialog, select the location and click OK.

|

Click to the left of a search clause to add an additional clause to the search criteria.

Click to remove the search clause from the search criteria.

Add Grouping | Remove

Click the Add Grouping button to add an additional set of conditions to be met.

A new grouping is added under the last query clause in a group and appears in a bordered pane, showing that it is subordinate to the higher-level query conditions.

Click the Remove button to remove a grouping from the search criteria.

Preview

Click Preview to run the query in order to review the results of the query before adding the dynamic group.

Adding one or more accounts to an account group

From the Account Groups view, you can add one or more accounts to an account group.

To add accounts to an account group

  1. Navigate to Security Policy Management > Account Groups.

  2. Select an account group and click View Details.

  3. Open the Accounts tab.
  4. Click  Add Account.

    NOTE: If you do not see the account you are looking for, depending on your Administrator permissions, you can create it in the New Account dialog (accessed via the  New Account button). (You must have Asset Administrator permissions to create accounts.)

  5. Select one or more accounts from the list in the Select accounts to add to group dialog.
  6. Click Select Accounts to save your selections.

Adding accounts to an access request policy

To add accounts to an access request policy

  1. Navigate to Security Policy Management > Account Groups.
  2. In Account Groups, select an account group from the object list and open the Access Request Policies tab.
  3. Click  Add from the details toolbar above the grid.
  4. Select a policy from the list in the Access Policies dialog and click OK.

Deleting an account group

When you delete an account group, Safeguard for Privileged Passwords does not delete the associated accounts.

To delete an account group

  1. Navigate to Security Policy Management > Account Groups.
  2. In Account Groups, select an account group from the object list.
  3. Click Delete.
  4. Confirm your request.
Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación