You must configure One Identity Safeguard for Privileged Passwords properly for users to receive email notifications:
- For Local users, you must set your email address correctly in My Settings. For more information, see My Settings.
- For Directory users, set your email correctly in the directory where your user resides.
- The Security Policy Administrator must configure the access request policies to notify people of pending access workflow events (that is, pending approvals and pending reviews). For more information, see Creating an access request policy.
- Contact your Security Policy Administrator to ensure the access request policies are configured to notify people of pending access workflow events.
- The Appliance Administrator must configure the SMTP server. For more information, see Enabling email notifications.
- Contact your Appliance Administrator to ensure the SMTP server is configured for email notifications.
Role-based email notifications generated by default
One Identity Safeguard for Privileged Passwords can be configured to send email notifications warning you of operations that may require investigation or action. Your administrative permissions determine which email notifications you will receive by default.
NOTE: Safeguard for Privileged Passwords administrators can use the following API to turn off these built-in email notifications:
POST /service/core/v3/Me/Subscribers/{id}/Disable
In addition, Safeguard for Privileged Passwords administrators can subscribe to additional events based on their administrative permissions using the following API:
POST /service/core/v3/EventSubscribers
One Identity Safeguard for Privileged Passwords provides secure control of managed accounts by storing account passwords until they are needed, and releases them only to authorized persons. Then, Safeguard for Privileged Passwords automatically updates the account passwords based on configurable parameters.
Typically, a password release request follows this workflow.
- Request: Users that are designated as an authorized user of an entitlement can request passwords for any account in the scope of that entitlement's policies.
- Approve: Depending on how the Security Policy Administrator configured the policy, a password release request will either require approval by one or more Safeguard for Privileged Passwords users, or be auto-approved. This process ensures the security of account passwords, provides accountability, and provides dual control over the system accounts.
- Review: The Security Policy Administrator can optionally configure an access request policy to require a review of completed password release requests for accounts in the scope of the policy.
If you are designated as an authorized user of an entitlement, you can request passwords for any account in the scope of the entitlement's policies.
You can configure One Identity Safeguard for Privileged Passwords to notify you of pending password release workflow events, such as when a password release request is pending, denied, or revoked, and so forth. For more information, see Configuring alerts.
To request a password release
-
Click Home then New Request or open the My Requests page then click New Request.
NOTE: You can also submit an access request from your Favorites pane, if you previously saved it as a favorite.
-
On the New Access Request page, select the accounts to be included in the access request and the type of access being requested for each selected account. You can search for accounts based on asset information. The assets available for selection are based on the scope defined in the entitlement's access request policies.
NOTE: Use the button to select the columns to display.
-
Asset: The display name of the managed system.
-
Account: All available accounts will be listed in the Account column.
If Show Account Availability is enabled, you can identify if a privileged account is available or not. Accounts display a warning badge if in use by a request. An account's status is updated immediately after being changed in order to avoid overlapping account requests from multiple users.
Hover over the badge to display <X> of <X> accounts in use. Showing account availability requires additional API queries that may impact performance. This toggle is set by the user, not an administrator. There is no global toggle.
NOTE: When the policy that is governing the request has enabled Allow simultaneous access for multiple user access, the request may still be available even though Show Account Request Availability indicates it is in use.
-
Access Type: The type of access request appears in the Access Type column. If the type is a drop-down, multiple access request types are available. Open the drop-down and select the access type, for example, Password, RDP, SSH, SSH Key, or Telnet.
- Account Description: (When applicable) The description of the account.
-
Asset Description: (When applicable) The description of the asset.
You can remove an account from the list by clearing the check box associated with an entry in the grid.
-
Click Next.
- On Request Details, configure the following settings, which will apply to all of the selected assets and accounts:
-
Emergency Access: If the policy has emergency access enabled, select this option to gain immediate emergency access to this password. When you use Emergency Access, the request requires no approval. For more information, see Creating an access request policy.
-
When: Select one of the following options:
-
Now: If selected, the request is immediately created.
-
Later: If selected, fields will appear allowing you to enter a specific date and time for the request in the user's local time.
- How Long: Based on the policy, do one of the following:
- View the Checkout Duration.
- If the Allow Requester to Change Duration option is enabled in the policy, you can set the days, hours, and minutes that you want to use the password. This overrides the Checkout Duration set in the access request policy. For more information, see Creating an access request policy.
-
Ticket Number: If the policy requires a ticket number, enter a ticket number. If multiple accounts are in the request and one or more require a ticket number, the ticket number is applied to all of the requests associated with this access request. For more information, see Ticket systems.
-
Reason: If the policy requires a reason, enter a reason. If multiple accounts are in the request and one or more require a reason. The reason is applied to all of the requests associated with this access request. For more information, see Reasons.
Select the Description down arrow to view the description defined for the selected reason.
-
Comment: If required, enter information about this request. When multiple accounts are specified in the request, if any of the selected accounts require a comment, you must enter a comment. The comment will be applied to all of the requests associated with this access request. The limit is 1000 characters.
-
To save the access request as a favorite, select the Save this request as a favorite check box and enter a name for the request.
This access request is then added to your Favorites. In the web client, favorites are displayed on the Home page and the My Requests page.
-
After entering the required information, click Submit Request.
Additional information displays if the access requests submitted were unsuccessful with information on how to address the issues. Once they have been addressed, you can resubmit the request.
When the request has been approved, you can use the password. For more information, see Taking action on a password release request.
The actions that can be taken on a password release request depends on the state of the request.
To take action on a password release request
-
From the web client, click My Requests. Use any of the following methods to control the request displayed:
- You can take any of the following actions on the password release request:
- Available Password request:
- The name, account, and remaining time is displayed.
- If your browser allows, click Copy to check out the password. This puts the password onto your clipboard, ready for you to use. Or, click Show to check out the password and view the password. A password displays on your screen for 20 seconds. The web client displays up to 10,000 characters before truncating the password, however the API allows any set password payload below 1MB. If the password changes while you have it checked out, and your current request is still valid, select either Copy or Show again to obtain the new password.
- Select Hide to conceal the information from view.
- Once you are done working, click Check-In Request to complete the password check out process.
- Available Password Request with time-based one-time password (TOTP) configured (for more information, see Setting a TOTP authenticator):
-
Approved request: Select Cancel Request to remove the request.
A password release request changes from Approved to Available when the requested time is reached. It stays available until you either cancel the request or it reaches the end of the duration period.
- Pending request: Select Cancel Request to remove the request.
- Revoked request: Select Resubmit to request the password again.
- Expired request: Select Remove Request to delete the request from the list.
-
Denied request: Select Resubmit to request the password again.
Select Remove Request to delete the request from the list.