サポートと今すぐチャット
サポートとのチャット

One Identity Safeguard for Privileged Sessions 6.0.3 - Administration Guide

Preface Introduction The concepts of One Identity Safeguard for Privileged Sessions (SPS) The Welcome Wizard and the first login Basic settings
Supported web browsers and operating systems The structure of the web interface Network settings Configuring date and time System logging, SNMP and e-mail alerts Configuring system monitoring on SPS Data and configuration backups Archiving and cleanup Forwarding data to third-party systems Joining to One Identity Starling
User management and access control Managing One Identity Safeguard for Privileged Sessions (SPS)
Controlling One Identity Safeguard for Privileged Sessions (SPS): reboot, shutdown Managing Safeguard for Privileged Sessions (SPS) clusters Managing a high availability One Identity Safeguard for Privileged Sessions (SPS) cluster Upgrading One Identity Safeguard for Privileged Sessions (SPS) Managing the One Identity Safeguard for Privileged Sessions (SPS) license Accessing the One Identity Safeguard for Privileged Sessions (SPS) console Sealed mode Out-of-band management of One Identity Safeguard for Privileged Sessions (SPS) Managing the certificates used on One Identity Safeguard for Privileged Sessions (SPS)
General connection settings HTTP-specific settings ICA-specific settings RDP-specific settings SSH-specific settings Telnet-specific settings VMware Horizon View connections VNC-specific settings Indexing audit trails Using the Search interface Searching session data on a central node in a cluster Advanced authentication and authorization techniques Reports The One Identity Safeguard for Privileged Sessions (SPS) RPC API The One Identity Safeguard for Privileged Sessions (SPS) REST API One Identity Safeguard for Privileged Sessions (SPS) scenarios Troubleshooting One Identity Safeguard for Privileged Sessions (SPS) Using SPS with SPP Configuring external devices Using SCP with agent-forwarding Security checklist for configuring One Identity Safeguard for Privileged Sessions (SPS) Jumplists for in-product help LDAP user and group resolution in SPS Appendix: Deprecated features Glossary

Creating an alias IP address (Linux)

Purpose

The following describes how to assign an alias IP address to a network interface on Linux platforms.

Steps

To assign an alias IP address to a network interface on Linux platforms

  1. Start a terminal console (for example, gnome-terminal, konsole, xterm, and so on).

  2. Issue the following command as root:

    ifconfig <ethX>:0 192.168.1.2

    where <ethX> is the ID of the network interface of the client, usually eth0 or eth1.

  3. Issue the ifconfig command. The <ethX>:0 interface appears in the output, having inet addr:192.168.1.2.

  4. Issue the ping -c 3 192.168.1.1 command to verify that One Identity Safeguard for Privileged Sessions (SPS) is accessible. A similar result is displayed:

    user@computer:~$ ping -c 3 192.168.1.1
    PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data.
    64 bytes from 192.168.1.1: icmp-seq=1 ttl=63 time=0.357 ms
    64 bytes from 192.168.1.1: icmp-seq=2 ttl=63 time=0.306 ms
    64 bytes from 192.168.1.1: icmp-seq=3 ttl=63 time=0.314 ms
    
    --- 192.168.1.1 ping statistics ---
    3 packets transmitted, 3 received, 0% packet loss, time 2013ms
    rtt min/avg/max/mdev = 0.306/0.325/0.357/0.030 ms
  5. Open the page https://192.168.1.1 from your browser and accept the certificate shown. The Welcome Wizard of SPS appears.

Modifying the IP address of One Identity Safeguard for Privileged Sessions (SPS)

Purpose

The following describes how to configure One Identity Safeguard for Privileged Sessions (SPS) to listen for connections on a custom IP address.

Caution:

Use this procedure only before the initial configuration of SPS, that is, before completing the Welcome Wizard. For details on changing the IP address or other network settings of a configured SPS system, see Network settings.

If you change the IP address of SPS, make sure that you use this address as the Physical interface 1 — IP address in the Networking settings section of the Welcome Wizard (see Configuring interface 1).

Steps

To configure SPS to listen for connections on a custom IP address

  1. Access SPS from the local console, and log in with username root and password default.

  2. Select Shells > Core shell in the Console Menu.

  3. Change the IP address of SPS:

    ifconfig eth0 <IP-address> netmask 255.255.255.0

    Replace <IP-address> with an IPv4 address suitable for your environment.

  4. Set the default gateway using the following command:

    route add default gw <IP-of-default-gateway>

    Replace <IP-of-default-gateway> with the IP address of the default gateway.

  5. Type exit, then select Logout from the Console Menu.

  1. Open the page https://<IP-address-you-set-for-SPS> from your browser and accept the certificate shown. The Welcome Wizard of SPS appears.

Accessing the Welcome Wizard from a non-standard interface

The following describes how to complete the Welcome Wizard on an interface other than Physical interface 1.

Caution:

Use this procedure only before the initial configuration of One Identity Safeguard for Privileged Sessions (SPS), that is, before completing the Welcome Wizard. For details on changing the IP address or other network settings of a configured SPS system, see Network settings.

If you change the network configuration of SPS to complete the Welcome Wizard on a non-standard interface, DO NOT use the IP address you use to access the Welcome Wizard as the Physical interface 1 — IP address in the Networking settings section of the Welcome Wizard (see Configuring interface 1). Otherwise, you will not be able to access SPS after the Welcome Wizard is completed.

To complete the Welcome Wizard on an interface other than Physical interface 1

  1. Access SPS from the local console, and log in with username root and password default.

  2. Select Shells > Core shell in the Console Menu.

  3. Change the IP address of SPS:

    ifconfig eth0 <IP-address> netmask 255.255.255.0

    Replace <IP-address> with an IPv4 address suitable for your environment.

  4. Set the default gateway using the following command:

    route add default gw <IP-of-default-gateway>

    Replace <IP-of-default-gateway> with the IP address of the default gateway.

  5. Type exit, then select Logout from the Console Menu.

  1. Open the page https://<IP-address-you-set-for-SPS> from your browser and accept the certificate shown. The Welcome Wizard of SPS appears.

Configuring One Identity Safeguard for Privileged Sessions (SPS) with the Welcome Wizard

Purpose

The Welcome Wizard guides you through the basic configuration steps of One Identity Safeguard for Privileged Sessions (SPS). All parameters can be modified before the last step by using the Back button of the wizard, or later via the web interface of SPS.

Steps

To configure SPS with the Welcome Wizard

  1. Open the https://<IP-address-of-SPS-interface> page in your browser and accept the displayed certificate. The Welcome Wizard of SPS appears.

    TIP:

    The SPS console displays the IP address the interface is listening on. SPS either receives an IP address automatically via DHCP, or if a DHCP server is not available, listens on the 192.168.1.1 IP address.

  2. When configuring SPS for the first time, click Next.

    Figure 18: The Welcome Wizard

    You can import an existing configuration from a backup file. Use this feature to restore a backup configuration after a recovery, or to migrate an existing SPS configuration to a new device.

    Caution:

    Do not export or import configuration between a physical SPS deployment and a virtual one. Because of the differences and limitations between physical and virtual appliances, configure the virtual appliance from scratch to ensure proper functionality. When you migrate a virtual SPS to another one, you can export and import the configuration.

    1. Click Browse and select the configuration file to import.

      NOTE:

      It is not possible to directly import a GPG-encrypted configuration into SPS, it has to be decrypted locally first.

    2. Enter the passphrase used when the configuration was exported into the Encryption passphrase field.

      For details on restoring configuration from a configuration backup, see Restoring One Identity Safeguard for Privileged Sessions (SPS) configuration and data

    3. Click Import.

      Caution:

      If you use the Import function to copy a configuration from one SPS to another, do not forget to configure the IP addresses of the second SPS. Having two devices with identical IP addresses on the same network leads to errors.

  3. Accept the End User License Agreement and install the SPS license.

    Figure 19: The EULA and the license key

    1. Read the End User License Agreement and select I have read and agree with the terms and conditions. The License Agreement covers both the traditional license, and subscription-based licensing as well. Clicking I have read and agree with the terms and conditions means that you accept the agreement that corresponds to the license you purchased. After the installation is complete, you can read the End User License Agreement at Basic Settings > System > License.

    2. Click Browse, select the SPS license file received with SPS, then click Upload.

      NOTE:

      It is not required to manually decompress the license file. Compressed licenses (for example .zip archives) can also be uploaded.

    3. Click Next.

  4. Configure networking. All settings can be modified later using the web interface of SPS.

    Figure 20: Initial networking configuration

    1. Physical interface EXT or 1 — IP address: The IP address of interface 1 (or EXT, for older hardware) of SPS (for example, 192.168.1.1). The IP address can be chosen from the range of the corresponding physical subnet. Clients will connect to this interface, therefore it must be accessible to them.

      Use an IPv4 address.

      NOTE:

      Do not use IP addresses that fall into the following ranges:

      • 1.2.0.0/16 (reserved for communication between SPS cluster nodes)

      • 127.0.0.0/8 (localhost IP addresses)

    2. Physical interface EXT or 1 — Prefix: The IP prefix of the given range. For example, general class C networks have the /24 prefix.

    3. Physical interface EXT or 1 — VLAN ID: The VLAN ID of interface 1 (or EXT). Optional.

      Caution:

      Do not set the VLAN ID unless your network environment is already configured to use this VLAN. Otherwise, your SPS appliance will be unavailable using this interface.

    4. Default GW: IP address of the default gateway.

      Use an IPv4 address.

    5. Hostname: Name of the machine running SPS (for example, SPS).

    6. Domainname: Name of the domain used on the network.

    7. DNS server: The IP address of the name server used for domain name resolution.

      Use an IPv4 address.

    8. NTP server: The IP address or the hostname of the NTP server.

      Use an IPv4 address.

    9. Syslog server: The IP address or the hostname of the syslog server.

      Use an IPv4 address.

    10. SMTP server: The IP address or the hostname of the SMTP server used to deliver e-mails.

      Use an IPv4 address.

    11. Administrator's email: E-mail address of the SPS administrator.

    12. Timezone: The timezone where the SPS is located.

    13. HA address: The IP address of the high availability (HA) interface. Leave this field on auto unless specifically requested by the support team.

    14. Click Next.

  5. Enter the passwords used to access SPS.

    Figure 21: Passwords

    NOTE:

    One Identity Safeguard for Privileged Sessions (SPS) accepts passwords that are not longer than 150 characters. The following special characters can be used: !"#$%&'()*+,-./:;<=>?@[\]^-`{|}

    1. Admin password: The password of the admin user who can access the web interface of SPS.

    2. Root password: The password of the root user, required to access SPS via SSH or from the local console.

      NOTE:

      Accessing SPS using SSH is rarely needed, and One Identity recommends it only for advanced users for troubleshooting situations.

    3. If you want to prevent users from accessing SPS remotely via SSH or changing the root password of SPS, select the Seal the box checkbox. Sealed mode can be activated later from the web interface as well. For details, see "Sealed mode" in the Administration Guide.

    4. Click Next.

  6. Upload or create a certificate for the SPS web interface. This SSL certificate will be displayed by SPS to authenticate HTTPS connections to the web and the REST interface.

    Figure 22: Creating a certificate for SPS

    To create a self-signed certificate, fill the fields of the Generate new self-signed certificate section and click Generate certificate. The certificate will be self-signed by the SPS appliance. The hostname of SPS will be used as the issuer and common name.

    1. Country: Select the country where SPS is located (for example, HU-Hungary).

    2. Locality name: The city where SPS is located (for example, Budapest).

    3. Organization name: The company who owns SPS (for example, Example Inc.).

    4. Organizational unit name: The division of the company who owns SPS (for example, IT Security Department).

    5. State or Province name: The state or province where SPS is located.

    6. Click Generate certificate.

    If you want to use a certificate that is signed by an external Certificate Authority, in the Server X.509 certificate field, click to upload the certificate.

    Figure 23: Uploading a certificate for SPS

    Then in the Server private key field click , upload the private key, and enter the password protecting the private key.

    Figure 24: Uploading a private key

    NOTE:

    SPS accepts private keys in PEM (RSA), and PUTTY format. Password-protected private keys are also supported.

    One Identity recommends using 2048-bit RSA keys (or stronger).

    NOTE:

    One Identity Safeguard for Privileged Sessions (SPS) accepts passwords that are not longer than 150 characters. The following special characters can be used: !"#$%&'()*+,-./:;<=>?@[\]^-`{|}

  7. Review the data entered in the previous steps. This page also displays the certificate generated in the last step, the SSH RSA key of SPS, and information about the license file.

    Figure 25: Review configuration data

    If all information is correct, click Finish.

    Caution:

    The configuration takes effect immediately after clicking Finish. Incorrect network configuration data can render SPS unaccessible.

    SPS is now accessible from the regular web interface via the IP address of interface 1 (or EXT).

  8. Your browser is automatically redirected to the IP address set for interface 1 (or EXT) of SPS, where you can login to the web interface of SPS using the admin username and the password you set for this user in the Welcome Wizard.

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択