Chatta subito con l'assistenza
Chat con il supporto

One Identity Safeguard for Privileged Passwords 8.0 LTS - Administration Guide

Introduction System requirements Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home page Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Global Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms Importing objects
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Vaults Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions

Creating an access request policy

It is the responsibility of the Security Policy Administrator to define access request policies in Safeguard for Privileged Passwords.

A policy defines:

  • The scope, which may be assets, asset groups, accounts, or account groups.
  • The access type, which may be a:

    • Credential access type:

      • Password Release

      • SSH Key

      • API Key

      • File

    • Session access type:

      • RDP (Remote Desktop Protocol)

      • RDP Application

      • SSH (Secure SHell)

      • Telnet

  • The rules for checking out passwords, such as the duration, how many approvals are required, and so on.

Considerations
  • An access request policy is only assigned to one cluster.
  • An access request policy is only used in the entitlement in which it is created. If you delete an entitlement, all access request policies associated with that entitlement are deleted.

To add an access request policy to an entitlement

  1. Navigate to Entitlements.
  2. In Entitlements, select to edit an entitlement from the list and open the Access Request Policies tab.
  3. Click New Access Policy from the details toolbar.
  4. In the Create Access Request Policy dialog, provide information in each of the tabs:

    General tab (create access request policy)

    Where you add general information about the access request policy as well as specify the type of access being requested.

    Security tab (create access request policy)

    Where you define the access settings for the selected type of request including allowing users to request passwords from their respective linked accounts.

    Scope tab (create access request policy)

    Where you assign assets, asset groups, accounts, or account groups to an access request policy.

    Workflow tab (create access request policy)

    Where you configure the access request policy requester, approver, reviewer settings.

General tab (create access request policy)

On the General tab, enter the following information for the access request policy.

Navigate to:

  • web client: Security Policy Management > Entitlements > Access Request Policies > (create or edit a policy)
Table 205: Access Request Policy: General tab properties
Property Description
Name

Enter a unique name for the access request policy.

Limit: 50 characters

Description

Enter descriptive text that explains the access request policy.

Limit: 255 characters

Priority

The priority of this policy compared to other policies in this entitlement.

If a user desires to access an account in the scope of two different request polices within an entitlement, then the policy with the highest priority (that is, the lowest number) takes precedence. For more information, see How Safeguard for Privileged Passwords evaluates policy when a user submits an access request..

Choose Request Policy Type

Specify the type of request policy:

  • Credential

    • Password

    • SSH Key

    • API Key

    • File

  • Session

    • RDP (Remote Desktop Protocol)
    • RDP Application
    • SSH (Secure SHell)
    • Telnet
Have the Access Policy Expire on Date and Time Select this to enforce an expiration date for the policy. Enter the expiration date and time.

Use Time Windows

Select this option to enforce time windows.

Select and drag to highlight the hours you want to allow. Colored tiles are blocked times . Clear are available times.

Security tab (create access request policy)

To configure the access settings for the type of access that is requested based on the access type specified on the General tab., use the Security tab.

Navigate to:

  • web client: Security Policy Management > Entitlements > Access Request Policies > (create or edit a policy)
Table 206: Access Request Policy: Security tab properties

Property

Description

Include Password Release with Requests

If Access Type is set to File, and the access request also contains a password for the account, then to include the password release with session access requests or access requests (making it immediately available for checkout along with the rest of the request), select this check box. This setting is cleared by default.

This is useful for file release access requests where the file might be an encrypted ZIP file, so the user does not need to make a separate access request for the password.

NOTE: If the account does not allow explicit Password Requests, but this check box is selected, the password will still be released.

Include SSH Key Release with Requests

If Access Type is set to File, and the access request also contains an SSH key for the account, then to include the SSH key release with session access requests or access requests (making it immediately available for checkout along with the rest of the request), select this check box. This setting is cleared by default.

This is useful for file release access requests where the file might be an encrypted ZIP file, so the user does not need to make a separate access request for the SSH key.

NOTE: If the account does not allow explicit SSH Key Requests, but this check box is selected, the password will still be released.

Include Password Release with Sessions Requests

If Access Type is RDP, SSH, or Telnet, select this check box to include a password release with session access requests.

Include SSH Key Release with Sessions Requests

If Access Type is RDP, SSH, or Telnet, select this check box to include an SSH Key release with session access requests.

Close Expired Sessions

If Access Type is RDP, SSH, or Telnet, select this check box to close sessions that have expired.

Change Password After Check-in

Select this check box if the password is to be changed after the user checks it back in. This check box is selected by default.

Change SSH Key After Check-in

Select this check box if the SSH key is to be changed after the user checks it back in. This check box is selected by default.

Passphrase Protect SSH Key

If Access Type is SSH Key, select this check box to require a passphrase for the SSH key.

Allow Simultaneous Access

Select this check box to allow multiple users access to the accounts and assets governed by this policy. Use the next check box to identify how many users can have access at once.

Maximum Users at One Time

When the Allow Simultaneous Access option is selected, enter the maximum number of users that can request access at one time.

Show Remote Desktop Wallpaper Background

Select this check box to have Remote Desktop (RDP) session requests include a client setting allowing for desktop wallpaper to be displayed. This check box is cleared by default.

NOTE: This option affects the client side RDP setting only. The server may have a Group Policy Object (GPO) that overrides the client setting. Other things may also override the result, depending on how the RDP connection information is used and made.

Asset-Based Session Access

If Access Type is RDP, RDP Application, SSH, or Telnet, select one of the following options to define the type of account credentials to be used to access any of the assets defined in the policy scope, in addition to the accounts defined in the policy scope when a session is requested:

  • None: (Default) The credentials are retrieved from the vault when the session is requested.
  • User Supplied: (Only RDP, SSH, or Telnet) The requester user must provide the credentials when the session is requested.
  • Linked Account: The requester user's account is linked to a directory account that will be used when the session is requested.
    • Enable scope filtering for linked accounts: When selected, this setting allows you to limit the number of requestable accounts to linked accounts that are also defined in the policy scope.

      NOTE: If the policy scope includes only assets/asset groups and no accounts, then the scope filtering setting has no effect, and the policy is available to all of the linked directory accounts on each scoped policy asset.

  • Directory Account: Use the Browse button to select one or more directory accounts to be used when the session is requested.

    If the Directory Account was migrated from an SPP version prior to 2.7, the directory account identifier may be blank, because earlier SPP versions understood only one assignment and version 2.7 results in multiple assignments.

Allow Password Access to Linked Accounts

If Access Type is Password Release, select this check box to allow users to request passwords for their respective linked account. Access to each user’s linked account is governed by the other configurations defined in this policy.

Additionally, Enable scope filtering for linked accounts can be selected in order to limit the number of requestable accounts to linked accounts that are also defined in the scope.

SPS Connection Policy

Use this drop-down to select a SPS connection policy to use with the access request policy.

RDP Host Asset

If Access Type is RDP Application, use the Browse button associated with this field to select the asset configured to connect with the Windows Application Server.

Require Host Account

If Access Type is RDP Application, select this checkbox and then click Browse to locate the host account to use. When deselected, you will be prompted for the information when the session is initialized.

Application Display Name

If Access Type is RDP Application, this is the display name for the application that was provided when the remote application was published on the Windows application server.

Use Application Alias

If Access Type is RDP Application, this is the alias name defined when the remote application was published on the Windows application server. Ensure the full alias path is used, including the two vertical bars before the alias name (for example, ||OISGRemoteAppLauncher).

If this option is used, the Use Application Path and Command Line option will not be available.

Use Application Path and Command Line

If Access Type is RDP Application, this option contains the following 2 fields:

  • Application Path (path to the remove application): Enter the full path of an application program relative to the Windows host it will be running on.

  • Application Command Line (parameters for the remote application): The Application Command Line contains the command line parameters to the application specified in the Application Path. The command line depends on the application. For example, some applications may require a set command line that will include the full path of the remote application along with its command line parameters while other applications may not require a set command line at all.

If this option is used, the Use Application Alias field will not be available.

Use Alternate Login Name

If this option is selected, the alternate login name for the account will be used.

Scope tab (create access request policy)

Use the Scope tab in the web client to assign accounts, account groups, assets, and asset groups to an access request policy.

To assign accounts, account groups, assets, and asset groups to an access request policy

  1. In the web client, navigate to Security Policy Management > Entitlements > Access Request Policies, then create or edit a policy.

  2. On the Scope tab:

    1. Click Add from the details toolbar and select one of the following options:

      • Add accounts to this policy

      • Add account groups to this policy

      • Add an asset to this policy

      • Add an asset group to this policy

    2. In the dialog, make a selection, and click OK.

      If you do not see the selection you are looking for, depending on your Administrator permissions, you can create it in the dialog. (You must have Asset Administrator permissions to create accounts and assets. You must have Security Policy Administrator permissions to create account groups and asset groups.)

  3. Repeat step one to make additional selections. You can add multiple types of objects to a policy; however, you can only add one type of object, like an accounts or account group, at a time.

All of the selected objects appear on the Scope tab in the Access Request Policy dialog. To remove an object from the list, select the object and click Delete.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione