Typically, it is the responsibility of the Authorizer Administrator to enable or disable administrator user accounts and the User Administrator to enable or disable non-administrator user accounts. You can modify the information for a user with a disabled account. If a directory user account is disabled in the directory asset, the user account cannot be enabled in Safeguard.
Disabling the account of a user prevents from logging in to Safeguard for Privileged Passwords; however, if you disable a directory user account, that does not prevent that user account from logging in to the directory.
When re-enabling a disabled account, the Authorizer Administrator must reset the user account's password. Simply enabling the user account does not permit the user account to log in with the previous password.
You configure the number of days you want Safeguard for Privileged Passwords to wait before automatically disabling an inactive user account in the Disable After Login Control Setting. For more information, see Local Login Control.
To activate or disable a user account
- Navigate to Administrative Tools | Users.
- In Users, select a user from the object list.
- In the upper-right corner of the window, click Activated (
toggle on) or Disabled (
toggle off) to toggle to the setting.
Typically, it is the responsibility of the Authorizer Administrator to delete administrator users and the User Administrator to delete non-administrator users.
IMPORTANT: When you delete a local user, Safeguard for Privileged Passwords deletes the user permanently. If you delete a directory user that is part of a directory user group, the next time it synchronizes its database with the directory, Safeguard for Privileged Passwords will add it back in. As a best practice, disable the directory user instead of deleting the account. For more information, see Activating or disabling a user account.
To delete a user
- Navigate to Administrative Tools | Users.
- In Users, select a user from the object list.
- Click
Delete Selected.
- Confirm your request.
Safeguard for Privileged Passwords allows you to import a .csv file containing a set of accounts, assets, or users. A .csv template for import can be downloaded when you click
Import from the toolbar then click CSV Template Assistant for the dialog. For more information, see Creating an import file.
Once an import is completed, you can navigate to the Tasks pane in the Toolbox for details about the import process and invalid data messages. For more information, see Viewing task status.
To import objects
- In Administrative Tools, click Assets, Accounts, or Users based on what data you are importing.
- Click
Import from the toolbar.
- In the Import dialog, Browse to select an existing .csv file containing a list of objects to import.
- When importing assets, the Discover SSH Host Keys option is selected by default indicating that Safeguard will retrieve the required SSH host key for the assets specified in the .csv file.
- Click OK. Safeguard for Privileged Passwords imports the objects into its database.
Considerations for valid and invalid data
Safeguard for Privileged Passwords does not add an object if any column contains invalid data in the .csv file, with the following exceptions:
- Assets PlatformDisplayName property:
- If Safeguard for Privileged Passwords does not find an exact match, it looks for a partial match. If it finds a partial match, it supplies the <platform> Other platform, such as Other Linux.
- If it does not find a partial match, it supplies the Other platform type.
- Users TimeZoneId property: If Safeguard for Privileged Passwords does not find a valid TimeZoneId property (that is, does not find an exact match or no time zone was provided), it uses the local workstation's current time zone. Do not enter numbers or abbreviations for the TimeZoneId.
- Users Password property: Safeguard for Privileged Passwords adds a user without validating the password you provide.
Details for importing directory assets, service accounts, users, and user groups
You can use the steps like those above to import your existing directory infrastructure (such as Microsoft Active Directory). Managed account users cannot be members of the Protected Users AD Security Group.
Additional information specific to directory import follows.
-
Import the directory (and service account) via Administrative Tools | Assets |
Import Asset and browse to select the .csv file. Safeguard for Privileged Passwords imports the directory as an asset.
The directory's service account is automatically added to the list of accounts you can viewed via the Assets | Accounts tab.
- Import users and user groups.
- Import directory users via Administrative Tools | Users |
Import Users and browse to select the .csv file.
- Assign to user groups via Administrative Tools | Users Groups | Users (select one or multiple users).
- Automatic synchronization: Once you import directory users and directory groups, Safeguard for Privileged Passwords automatically synchronizes the objects in its database with the directory schema attributes. User and group membership changes in the directory are reflected in Safeguard for Privileged Passwords. Directory users authenticate to Safeguard for Privileged Passwords with their directory credentials.
Active Directory and LDAP synchronization
Active Directory and LDAP data is automatically synchronized by asset or identity and authentication providers schema as shown in the following lists.
Asset schema list
- Users
- Username
- Password (modifiable in LDAP and not modifiable in Active Directory)
- Description
- Groups
- Computer
- Name
- Network Address
- Operating System
- Operating System Version
- Description
Identity and Authentication Providers schema list
- Users
- Username
- First Name
- Last Name
- Work Phone
- Mobile Phone
- Email
- Description
- External Federation Authentication
- Radius Authentication
- Managed Objects
- Groups