Chatta subito con l'assistenza
Chat con il supporto

One Identity Safeguard for Privileged Passwords 7.4.1 - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home page Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Global Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms Importing objects
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions

Adding an entitlement

It is the responsibility of the Security Policy Administrator to add entitlements to SPP.

To add an entitlement

  1. Navigate to Security Policy Management > Entitlements.
  2. Click  New Entitlement from the toolbar.
  3. In the New Entitlement dialog, provide the following information on the General tab:

    • Name: Enter a unique name for the entitlement. Limit: 50 characters.

    • Description: Enter descriptive text about the entitlement. Limit: 255 characters.

    • Priority: Enter the priority of this entitlement compared to other entitlements.

      If a user desires to access an account in the scope of two different entitlements, then the entitlement with the highest priority (that is, the lowest number) takes precedence. For more information, see How SPP evaluates policy when a user submits an access request..

    • Have the Entitlement Expire on Date and Time: Select this option to enforce an expiration date, then enter the date and time.

      When an entitlement expires, all the access request policies associated with the entitlement also expire. To set an expiration date on a policy, see Creating an access request policy.

      NOTE:

      An entitlement's time restrictions enforce when SPP uses a policy. A policy's time restrictions enforce when a user can access the account passwords. If the entitlement and the policy both have time restrictions, the user can only check out the password for the overlapping time frame.

      Time restrictions control when the entitlement or policy is in effect relative to a user's time zone. Although SPP Appliances run on Coordinated Universal Time (UTC), the user's time zone enforces the time restrictions set in the entitlement or policy. This means that if the appliance and the user are in different time zones, SPP enforces the policy in the user's time zone set in their account profile.

      User can change their time zone, by default. Or, the User Administrator can prohibit a user from changing the time zone, possibly to ensure adherence to policy. For more information, see Time Zone.Time Zone in the Safeguard for Privileged Passwords Administration Guide.

    • Use Time Windows: Select this option to enforce time windows.

      Select and drag to highlight the hours you want to allow. Colored tiles are blocked times. Clear are available times.

  4. Select one of the following save options:

    • Save & Close: This option saves the entitlement then returns you to the Entitlements page.

    • Save & Continue: This option saves the entitlement then sends you to the Access Request Policies tab (entitlements) for further configuration options. These settings are also available when selecting to edit an entitlement.

Related Topics

How SPP evaluates policy when a user submits an access request

Adding users or user groups to an entitlement

How SPP evaluates policy when a user submits an access request

An entitlement defines which users are authorized to check out passwords for accounts in the scope of the account's policies. A policy defines scope (that is, which accounts) and the rules for checking out passwords, such as the duration, how many approvals are required, and so on.

It is possible for an account to be governed by more than one entitlement, or is in the scope of more than one policy within an entitlement. When evaluating which policy governs a request to grant access, SPP first determines if the request has Emergency Access and evaluates against only those policies which permit Emergency Access. It then considers the time for which the request is being made and further evaluates against only those policies which have Time Restrictions that permit the request. Finally, if there is a conflict between the remaining policies, it uses Priority to determine which policy should govern the request.

Example scenario:
  • Entitlement A (priority 1)
    • Policy: Week Day Policy.
      • Policy time restrictions: Monday through Friday 08:00 to 17:00.
      • Scope: AccountX
  • Entitlement B (priority 2)
    • Policy 1: Sunday AM (priority 1)
      • Policy time restrictions: Sunday 08:00 to 12:00.
      • Scope: AccountX
    • Policy 2: Sunday PM (priority 2)
      • Policy time restrictions: Sunday 13:00 to 17:00.
      • Scope: AccountX

Notice that AccountX is in the scope of all three of these policies.

If a user requests the password for AccountX for Sunday at 16:00, SPP first considers Entitlement A because it is priority 1. When it determines that the policy time restrictions prevent the password release, it then considers Entitlement B.

SPP first considers Entitlement B's priority 1 policy. When it determines that the time restrictions prevent the password release, it then considers Policy 2. Once the request is satisfied, SPP grants the request.

However, if the hours in Entitlement B's Policy 1 were instead 08:00 to 17:00 then Policy 1 would be preferred because it has a higher priority. And if Entitlement B's Policy 2 was instead configured to allow Emergency Access, and the request being made had Emergency Access, then Policy 1 (though it has a higher priority of 1) would be eliminated from the selection and Policy 2 would again be preferred.

Creating an access request policy

It is the responsibility of the Security Policy Administrator to define access request policies in SPP.

A policy defines:

  • The scope, which may be assets, asset groups, accounts, or account groups.
  • The access type, which may be a:
    • Credential access type:

      • Password Release
      • SSH Key
      • API Key
    • Session access type:

      • RDP (Remote Desktop Protocol)
      • RDP Application
      • SSH (Secure SHell)
      • Telnet
  • The rules for checking out passwords, such as the duration, how many approvals are required, and so on.
Considerations
  • An access request policy is only assigned to one cluster.
  • An access request policy is only used in the entitlement in which it is created. If you delete an entitlement, all access request policies associated with that entitlement are deleted.

To add an access request policy to an entitlement

  1. Navigate to Entitlements.
  2. In Entitlements, select to edit an entitlement from the list and open the Access Request Policies tab.
  3. Click New Access Policy from the details toolbar.
  4. In the Create Access Request Policy dialog, provide information in each of the tabs:

    General tab (create access request policy)

    Where you add general information about the access request policy as well as specify the type of access being requested.

    Security tab (create access request policy)

    Where you define the access settings for the selected type of request including allowing users to request passwords from their respective linked accounts.

    Scope tab (create access request policy)

    Where you assign assets, asset groups, accounts, or account groups to an access request policy.

    Workflow tab (create access request policy)

    Where you configure the access request policy requester, approver, reviewer settings.

General tab (create access request policy)

On the General tab, enter the following information for the access request policy.

Navigate to:

  • web client: Security Policy Management > Entitlements > Access Request Policies > (create or edit a policy)
Table 207: Access Request Policy: General tab properties
Property Description
Name

Enter a unique name for the access request policy.

Limit: 50 characters

Description

Enter descriptive text that explains the access request policy.

Limit: 255 characters

Priority

The priority of this policy compared to other policies in this entitlement.

If a user desires to access an account in the scope of two different request polices within an entitlement, then the policy with the highest priority (that is, the lowest number) takes precedence. For more information, see How SPP evaluates policy when a user submits an access request..

Choose Request Policy Type

Specify the type of request policy:

  • Credential

    • Password

    • SSH Key

    • API Key

  • Session

    • RDP (Remote Desktop Protocol)
    • RDP Application
    • SSH (Secure SHell)
    • Telnet

Choose Credential Type

Specify the type of credential:

  • Password

  • SSH Key

  • API Key

NOTE: You can configure an access request policy for a password, SSH key, or API key request; however, if the Privileged Passwords module license is not installed, you will not be able to submit a password, SSH key, or API key release request.

Similarly, you can configure an access request policy for a session request; however, if the Safeguard for Privileged Sessions server is not joined to SPP, you will be unable to submit a session request.

NOTE: When checking out API keys, since multiple API keys may be associated with an account it will check out all the API Keys.

Have the Access Policy Expire on Date and Time Select this to enforce an expiration date for the policy. Enter the expiration date and time.

Use Time Windows

Select this option to enforce time windows.

Select and drag to highlight the hours you want to allow. Colored tiles are blocked times . Clear are available times.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione