Tchater maintenant avec le support
Tchattez avec un ingénieur du support

One Identity Safeguard for Privileged Passwords 7.0 LTS - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Enable or Disable Services External Integration Real-Time Reports Safeguard Access
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings Reasons
User Management Reports Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions About us

General tab (entitlements)

To access General:

  • web client: Navigate to Security Policy Management | Entitlements | (New Entitlement) or (Edit) | General.

The General tab lists information about the selected entitlement.

  • Name: The entitlement name.

  • Description: Information about the selected entitlement.

  • Priority: A unique number that determines the processing order of the entitlement in relation to other entitlements. For more information, see How Safeguard for Privileged Passwords evaluates policy when a user submits an access request.

  • Have the Entitlement Expire on Date and Time: Select this option to enforce an expiration date, then enter the date and time.

    When an entitlement expires, all the access request policies associated with the entitlement also expire. To set an expiration date on a policy, see Creating an access request policy.

  • Use Time Windows: Select this option to enforce time windows.

    Select and drag to highlight the hours you want to allow. Colored tiles are blocked times. Clear are available times.

Users tab (entitlements)

The Users tab displays the users and user groups who are authorized to request access for the accounts and assets in the scope of the selected entitlement's policies. Certificate users are included in the display if the user was created during a Safeguard for Privileged Sessions link and was assigned and used by a Sessions Appliance. The certificate users created during the link can be added to the Users tab but are not there by default.

To access General:

  • web client: Navigate to Security Policy Management | Entitlements | (edit) | Users.

Click Add Users or Add User Groups from the details toolbar to add one or more requester users or user groups to the selected entitlement.

Table 188: Entitlements: User tab properties
Property Description
Type

Type of member:

  • Group
  • User
Display Name Display name of the user or user group included in the selected entitlement.

Username

Name of the user or user group included in the selected entitlement.

Provider

The name of the authentication provider:

  • Local
  • Certificate
  • The name of an external provider such as a Microsoft Active Directory domain name.

Use these buttons on the details toolbar to manage the requester users associated with the selected entitlement.

Table 189: Entitlements: Users tab toolbar
Option Description

Add Users or Add User Groups

Add a requester user group or requester user to the entitlement. For more information, see Adding users or user groups to an entitlement.

Delete

Remove the selected user or user group from the entitlement.

Export

Use this button to export the listed data as either a JSON or CSV file. For more information, see Exporting data.

Search (case sensitive)

To locate a specific user (or user group) or set of users (or user groups) in this list, enter the character string to be used to search for a match. For more information, see Search box.

Access Request Policies tab (entitlements)

The Access Request Policies tab displays the password and SSH key request policies that govern the accounts in the selected entitlement.

To access Access Request Policies:

  • web client: Navigate to Security Policy Management | Entitlements | (Edit) | Access Request Policies.

IMPORTANT: The selection made on the Entitlement | Access Request Policy tab takes precedence over the selections on Appliance Management | Cluster | Managed Networks page. If a Managed Networks rule includes nodes from different SPS clusters, SPP will only select the nodes from the same cluster that was assigned on the Session Settings page of the Access Request Policy tab.

Click New Access Policy from the details toolbar to add a policy to the selected entitlement.

Use these buttons on the details toolbar to manage your access request policies.

Table 190: Entitlements: Access Request Policies tab toolbar
Option Description

New Access Policy

Add an access request policy to the selected entitlement. For more information, see Creating an access request policy.

Delete

Remove the selected policy from the selected entitlement. For more information, see Deleting an access request policy.

Edit

Modify the selected policy. For more information, see Modifying an access request policy.

Create a New Access Policy from the Selected Row

Make a copy of the selected policy. For more information, see Copying an access request policy.

Import Access Policies from Other Entitlements

Import an access policy that was configured for a different entitlement.

Export

Use this button to export the listed data as either a JSON or CSV file. For more information, see Exporting data.

Search (case insensitive)

To locate a specific policy or set of policies in this list, enter the character string to be used to search for a match. For more information, see Search box.

History tab (entitlements)

The History tab allows you to view or export the details of each operation that has affected the selected entitlement.

To access History:

  • web client: Navigate to Security Policy Management | Entitlements | (Edit) | History.

    The top of the History tab contains the following information:

    • Date Range: By default, the history details are displayed for the last 24 hours. From the drop-down, select one of the time intervals to display history details for that time frame.

    • Export: Use this button to export the listed data as either a JSON or CSV file. For more information, see Exporting data.

    • Refresh: Update the list displayed.

    • Search: For more information, see Search box.

Table 191: Entitlements: History tab properties
Property Description
Date/Time The date and time of the event.
User The display name of the user that triggered the event.
Source IP The network DNS name or IP address of the managed system that triggered the event.
Object Name The name of the selected entitlement.
Event

The type of operation made to the selected entitlement:

  • Create
  • Delete
  • Update
  • Add Membership
  • Remove Membership

NOTE: A membership operation indicates a relationship change with a related or parent object such as a user or user group was added or removed from the membership of an entitlement.

Related Object The name of the related object.
Related Object Type The type of the related object.
Parent The name of the object to which the selected entitlement is a child.
Parent Object Type The parent object type.
Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation