Both Authorizer Administrator and User Administrator can delete local and directory user groups. A Security Policy Administrator can only delete local groups without permissions on them.
When you delete a user group, Safeguard for Privileged Passwords does not delete the users associated with it.
To delete a user group
-
Navigate to:
- web client: Security Policy Management > User Groups or User Management > User Groups.
- In User Groups, select a user group from the list.
- Click Delete.
- Confirm your request.
In the web client, Security Policy Management has a settings page used to manage Sessions Password Access and the Audit Log Stream Service. You can also manage the reasons for requesting access to a password, SSH key, or session.
Navigate to Security Policy Management > Settings to manage the settings listed below.
Table 215: Security Policy Settings
Maximum Notification Recipients |
Set the maximum number of notification recipients. |
Expiration Warning Duration |
Enter the number of days for the warning to expire. |
Show User Name in Access Request Conflict Messages |
When the check box is selected, if there is a conflicting access request for the time period a user wants to request, the error message will include the name of the user who requested the conflicting access request. When the check box is cleared, the error message will show the access request id instead. This check box is cleared by default. |
Session Password Access Enabled |
Use this to enable or disable session password access. This feature is disabled by default. |
Audit Log Stream Service |
Use this to send Safeguard for Privileged Passwords data to Safeguard for Privileged Sessions to audit the Safeguard privileged management software suite. The feature is disabled by default.
To accept Safeguard for Privileged Passwords data, the Safeguard for Privileged Sessions Appliance Administrator must turn on audit log syncing. For information, see the Safeguard for Privileged Sessions Administration Guide.
Safeguard for Privileged Passwords and Safeguard for Privileged Sessions must be linked to use this feature. For more information, see Safeguard for Privileged Passwords and Safeguard for Privileged Sessions appliance link guidance.
While the synchronization of Safeguard for Privileged Passwords and Safeguard for Privileged Sessions is ongoing, Safeguard for Privileged Sessions is not guaranteed to have all of the audit data at any given point due to some latency.
NOTE: This setting is also available under Appliance Management. For more information, see Global Services. |
Reasons |
From this pane you can manage the reasons for requesting access to a password, SSH key, or session. For more information, see Reasons. |
In an access request policy, a Security Policy Administrator can require that a requester provide a reason for requesting access to a password, SSH key, or session. Then, when requesting access, the user can select a predefined reason from a list. For example, you might use these access request reasons:
- Software Updates
- System Maintenance
- Hardware Issues
- Problem Ticket
To configure access request reasons
- Navigate to Security Policy Management > Settings > Reasons.
- Click Add to add a new reason.
- In the New Reason dialog, enter the following:
-
Name: Enter a name for the reason. Limit: 50 characters
-
Description: Enter a description for the reason. Limit: 255 characters
- Click Save.
To edit a reason, select a previously configured reason and click Edit.
To delete a reason, select a previously configured reason and click Delete.
In the web client, expand the User Management section in the left navigation pane.
The following pages are available. See each section for a description of the functions available.
Topics: