Chatee ahora con Soporte
Chat con el soporte

One Identity Safeguard for Privileged Sessions 8.0 LTS - Administration Guide

Preface Introduction The concepts of One Identity Safeguard for Privileged Sessions (SPS)
The philosophy of One Identity Safeguard for Privileged Sessions (SPS) Policies Credential Stores Plugin framework Indexing Supported protocols and client applications Modes of operation Connecting to a server through One Identity Safeguard for Privileged Sessions (SPS) Archive and backup concepts Maximizing the scope of auditing IPv6 in One Identity Safeguard for Privileged Sessions (SPS) SSH host keys Authenticating clients using public-key authentication in SSH The gateway authentication process Four-eyes authorization Network interfaces High Availability support in One Identity Safeguard for Privileged Sessions (SPS) Versions and releases of One Identity Safeguard for Privileged Sessions (SPS) Accessing and configuring One Identity Safeguard for Privileged Sessions (SPS)
Cloud deployment considerations The Welcome Wizard and the first login Basic settings
Supported web browsers The structure of the web interface Network settings Configuring date and time System logging, SNMP and e-mail alerts Configuring system monitoring on SPS Data and configuration backups Archiving Cleaning up audit data Using plugins Forwarding data to third-party systems Starling integration
User management and access control
Login settings Managing One Identity Safeguard for Privileged Sessions (SPS) users locally Setting password policies for local users Managing local user groups Managing One Identity Safeguard for Privileged Sessions (SPS) users from an LDAP database Handling user names in User Principal Name (UPN) format Authenticating users to a RADIUS server Authenticating users with X.509 certificates Authenticating users with SAML2 Managing user rights and user groups Creating rules for restricting access to search audit data Displaying the privileges of users and user groups Listing and searching configuration changes
Managing One Identity Safeguard for Privileged Sessions (SPS)
Controlling One Identity Safeguard for Privileged Sessions (SPS): reboot, shutdown Managing One Identity Safeguard for Privileged Sessions (SPS) clusters Managing a High Availability One Identity Safeguard for Privileged Sessions (SPS) cluster Upgrading One Identity Safeguard for Privileged Sessions (SPS) Managing the One Identity Safeguard for Privileged Sessions (SPS) license Accessing the One Identity Safeguard for Privileged Sessions (SPS) console Sealed mode Out-of-band management of One Identity Safeguard for Privileged Sessions (SPS) Managing the certificates used on One Identity Safeguard for Privileged Sessions (SPS)
General connection settings HTTP-specific settings ICA-specific settings MSSQL-specific settings RDP-specific settings SSH-specific settings Using Sudo with SPS Telnet-specific settings VMware Horizon View connections VNC-specific settings Indexing audit trails Using the Sessions interface Advanced authentication and authorization techniques Reports The One Identity Safeguard for Privileged Sessions (SPS) REST API One Identity Safeguard for Privileged Sessions (SPS) scenarios Troubleshooting One Identity Safeguard for Privileged Sessions (SPS)
Network troubleshooting Gathering data about system problems Viewing logs on One Identity Safeguard for Privileged Sessions (SPS) Changing log verbosity level of One Identity Safeguard for Privileged Sessions (SPS) Collecting logs and system information for error reporting Collecting logs and system information of the boot process for error reporting Support hotfixes Status history and statistics Troubleshooting a One Identity Safeguard for Privileged Sessions (SPS) cluster Understanding One Identity Safeguard for Privileged Sessions (SPS) RAID status Restoring One Identity Safeguard for Privileged Sessions (SPS) configuration and data VNC is not working with TLS Configuring the IPMI from the BIOS after losing IPMI password Incomplete TSA response received
Using SPS with SPP Configuring external devices Using SCP with agent-forwarding Security checklist for configuring One Identity Safeguard for Privileged Sessions (SPS) Jumplists for in-product help Configuring SPS to use an LDAP backend Glossary

Navigating on the SPS UI

A quick navigation and search function has been introduced to improve the navigation experience and to provide a quick and efficient way to navigate to an SPS UI page.

This option has a keyboard-first design, aiming primarily at users who use the keyboard rather than the mouse cursor. However, you can use the mouse cursor as well.

To navigate on the SPS UI

  1. To access the search field of the quick navigation function, select one of the following options:

    • Navigate to the SPS Home page by clicking on the logo.

    • In a Windows or Linux environment, press Ctrl+K.

    • On Mac OS, press Command+K.

  2. (Optional) Insert question mark (?) in the search field to display the Help menu at the bottom of the search window.

  3. Type a keyword in the search field. As you type, a drop-down dynamically provides you a list of search results.

  4. (Optional) To use autocomplete to complete the keywords while typing, press Tab.

  5. (Optional) To clear the content of the search field, press Esc.

  6. (Optional) To close the search window, press Esc.

  7. To navigate between the search results, use the up and down arrow buttons.

  8. Press Enter to navigate to the page that corresponds to the highlighted search result.

Multiple users and locking

Multiple administrators can access the One Identity Safeguard for Privileged Sessions (SPS) web interface simultaneously, but only one of them can modify the configuration. This means that the configuration of SPS is automatically locked when the first administrator who can modify the configuration opens a configuration page (for example the Basic Settings or the Users & Access Control menu).

The warning message displays the username of the administrator locking the configuration as shown in the image below:

Figure 38: Configuration lock by remote administrator

Other administrators can continue as read-only but must wait until the locking administrator navigates to an SPS page that does not require locking, the administrator logs out, or the session of the administrator times out. However, it is possible to access the Sessions and Reporting menus, and to perform gateway authentication and 4-eyes authorization or browse the configuration with only View rights (for details, see Managing user rights and user groups).

NOTE: If an administrator logs in to SPS using the local console or a remote SSH connection, the configuration is also locked. Inactive local and SSH connections timeout just like web connections. For details, see Accessing the One Identity Safeguard for Privileged Sessions (SPS) console.

Preferences

To configure your preferences about the web interface, navigate to User Menu > Preferences.

Figure 39: User Menu > Preferences

  • Audit trail filename template:

    To change the filename of the audit trails, navigate to User menu > Preferences and change the Audit trail filename template. The default template is {protocol}-{starttime}-{gw-username}-{remote-username}-{dst-ip}.zat. The template can include anything, the keys (inside {} brackets) are replaced with their actual values. These keys are the following:

    • connection-policy: The connection policy

    • dst-ip: Destination IP address

    • dst-port: Destination port

    • gw-username: Gateway username

    • protocol: Protocol

    • remote-username: Remote username

    • session-id: Session ID

    • src-ip: Source IP address

    • starttime: Start time of the session

  • Autoclose successful commit messages: General confirmation windows will not appear. (For example, Configuration saved successfully that appears after successfully committing a change). As a result, pop-up windows appear only for failed actions or errors.

  • Confirmation before deleting policies: Display a pop-up window when you attempt to delete policies to prevent deleting policies accidentally.

  • Confirmation before deleting entries: Display a pop-up window when you attempt to delete entries to prevent deleting entries accidentally.

  • Warn when unsaved changes may be lost: Display a pop-up window to warn when you navigate to another window without committing your changes to prevent losing unsaved changes.

  • Show tooltips: Display tooltips for user interface elements to help using the product.

Search page settings
  • Automatic refresh:If you select this option, the content of the details view on the Sessions page is refreshed automatically to provide up-to-date information about the sessions. On the Sessions page, you can open the details view of a session by clicking the icon. Automatic refresh refreshes the content of all the tabs (Overview, Details, Timeline, Analytics) in the details view.

    If you select Automatic refresh, for example, if there is an active connection, the list of events is refreshed dynamically and the buttons are displayed according to the available options for a given session. For example, while a session is active, is displayed, and and are displayed. After the session is closed, the buttons dynamically change to and .

What's New settings
  • Show 'Changes in this release' dialog on login: If you select this option, the Changes in this release dialog pops up every time you log in to SPS.

Appearance
  • Light: Light mode is the default setting of the user interface. If this option is enabled, the user interface appears in light mode.

  • Dark (High contrast): If you select this option, the user interface appears in dark, high contrast mode.

  • Auto: If you select this option, SPS detects the dark or light theme setting of your operating system, and displays the SPS login page according to the theme setting of your operating system.

Change password

If you are a local user or an administrator, you can change your password for the web interface using the User menu > Change password option.

To change the password for SPS

  1. Navigate to User menu > Change password.

    Figure 40: User menu > Change password — Changing the password

  2. Enter your current password in the Current password field.

  3. Create a new, strong password and enter it in the New password field.

    NOTE: SPS accepts passwords that are not longer than 150 characters and supports the following characters:

    • Letters A-Z, a-z

    • Numbers 0-9

    • The space character

    • Special characters: !"#$%&'()*+,-./:;<>=?@[]\^-`{}_|

    NOTE: If possible, use a random password generator.

    To create a strong password:

    • Use special characters

    • Use long passwords

    • Mix uppercase and lowercase letters

    For strong passwords, do not use:

    • Personal information in the passwords

    • Sequential letters or numbers

    • The word password as the password

    • Keyboard paths (for example, qwerty)

  4. Enter your new password again in the Confirm new password field.

  5. Click Save.

Documentos relacionados

The document was helpful.

Seleccionar calificación

I easily found the information I needed.

Seleccionar calificación