Before you add systems to Safeguard for Privileged Passwords (Adding an asset), you must ensure they are properly configured.
Generally, to prepare an asset for Safeguard for Privileged Passwords:
-
Create a functional account (called a "service" account in Safeguard for Privileged Passwords) on the asset and assign it a password or an SSH key, if the platform supports SSH keys.
- Grant the service account sufficient permissions.
- Test the service account connectivity.
- Configure the security protocol.
-
For platforms that support SSL server certificate validation, add the server’s signing authority certificate to the Trusted Certificates store in Safeguard for Privileged Passwords. For more information, see Trusted CA Certificates.
The following topics can help you prepare your hosts for management by Safeguard for Privileged Passwords:
Safeguard for Privileged Passwords supports a variety of platforms. For more information, see Supported platforms.
This applies to both ACF2 - Mainframe and ACF2 - Mainframe LDAP platforms.
To prepare IBM ACF-mainframe systems for Safeguard for Privileged Passwords
- Create a service account on the asset and assign it a password. The service account must have the SECURITY attribute enabled for ACF2 ChangePassword to work properly.
- Grant the service account the privileges required to use the ALTERUSER command on other profiles.
-
If not already installed, install a telnet server on the z/OS system. If required, secure telnet with SSL.
NOTE: Please refer to your IBM z/OS system documentation for details on installing and configuring the telnet server (and SSL).
- Test the telnet server using a Windows-based 3270 emulator or on Linux, use the telnet-ssl or x3270 programs to test SSL and non-SSL connections to an z/OS system.
- In Safeguard for Privileged Passwords, create the asset and accounts for the z/OS system using password authentication.
About certificate support for the telnet protocol
Safeguard for Privileged Passwords automatically accepts any server certificate that the connection offers and does not verify the trust chain on the telnet certificate. In addition, Safeguard for Privileged Passwords does not support client certificate selection, so if telnet requires that the client present a certificate that is signed by a recognized authority, Safeguard for Privileged Passwords cannot support that configuration.
Safeguard for Privileged Passwords supports Amazon Web Services (AWS), a secure cloud services platform.
When adding an Amazon Web Services asset, the Network Address must contain the AWS Account ID or Alias.
To prepare Amazon Web Services platforms for Safeguard for Privileged Passwords
-
In Safeguard for Privileged Passwords:
-
Ensure the latest Amazon's certificate and AWS certificate's root certificate authority (CA) are in the Trusted Certificates store in Safeguard for Privileged Passwords.
-
Configure an Identity and Access Management (IAM) user to use as a service account.
-
Assign the IAM service account to the AdministratorAccess security policy.
-
In Amazon:
- Create an access key for the IAM service account. Amazon creates a pair of data items called a Secret Key and a public Access Key ID. Take a note of both the Access Key ID and Secret Key. You will need them when you add the Amazon Web Services asset to Safeguard for Privileged Passwords.