サポートと今すぐチャット
サポートとのチャット

One Identity Safeguard for Privileged Passwords 8.0 LTS - Administration Guide

Introduction System requirements Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home page Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Global Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms Importing objects
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Vaults Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions

Assigning a Hardware Security Module client certificate

Safeguard for Privileged Passwords allows you to assign Hardware Security Module client certificates that you have previously uploaded to any appliance in your clustered environment.

To assign a client certificate to appliances

  1.  Go to Client Certificates:
    • web client: Navigate to Certificates > Hardware Security Module Certificates > Client Certificates.
  2. Select a certificate and click Assign Certificate to Appliance(s).

  3. In the Assign Certificate to Appliances dialog, select one or more appliances.

  4. Click OK.

Uploading a Hardware Security Module server certificate

Safeguard for Privileged Passwords allows you to upload Hardware Security Module server certificates.

To upload a Hardware Security Module server certificate

  1.  Go to Server Certificates:
    • web client: Navigate to Certificates > Hardware Security Module Certificates > Server Certificates.
  2. Click Upload Certificate.

  3. Select the server certificate and click Open.

SMTP Certificate

Initially, the default self-signed SMTP client certificate used is listed and assigned to the appliance. This default certificate is not a trusted certificate and should be replaced.

Considerations:

  • The remote certificate must have a valid CN and/or DNS SAN and it must publish a CRL if the following is true:
    • TLS (STARTTLS or SMTPS) is used with SMTP
    • Verify SMTP Server Certificate is selected on Appliance Management > External Integration > Email.
  • Safeguard for Privileged Passwords supports cipher suites for SMTP TLS in both the default mode and the TLS 1.2 mode. For more information, see Cipher support..
  • If a managed domain account is being used for SMTP user authentication, the remote SMTP server must accept the username in the form user@domain.

Go to SMTP Certificate:

  • web client: Navigate to Certificates > SMTP Certificate.

The SMTP Certificate pane displays the following information for the SMTP client certificates stored in the database.

Table 29: SSL Certificates: Properties
Property Description
Refresh

Update the list of SMTP client certificates available (uploaded to Safeguard for Privileged Passwords).

Subject

The name of the subject (such as user, program, computer, service, or other entity) assigned to the certificate when it was requested.

Thumbprint

A unique hash value that identifies the SMTP client certificate.

Add Certificate

Click Add Certificate and select one of the following options to replace the default SMTP client certificate with a new certificate:

  • Install Certificate generated from CSR
  • Install Certificate with Private Key
  • Create Certificate Signing Request (CSR)

Use Default

Click to return to the Safeguard for Privileged Passwords default SMTP client certificate.

Creating an SMTP Certificate Signing Request

If you do not want to use a default SMTP client certificate provided with Safeguard for Privileged Passwords, you can enroll a certificate using a Certificate Signing Request (CSR) to replace the default SMTP client certificate. You can return to the default certificate later.

To create a CSR for a SMTP certificate

  1.  Go to SMTP Certificate:
    • web client: Navigate to Certificates > SMTP Certificate.
  2. Click the Add Certificate button for the certificate to be replaced and select Create Certificate Signing Request (CSR).
  3. In the Certificate Signing Request dialog, enter the following information:
    1. Subject (Distinguished Name): Enter the distinguished name of the person or entity to whom the certificate is being issued in the proper format like: cn=common name,ou=organizational unit,o=organization. Using the format example, cn=sam doe,ou=marketing,o=mycompany. Maximum length is 500 characters.

      • Click Use Distinguished Name Creator to create the distinguished name based on your entries in Fully Qualified Domain Name (required), Department, Organization, City/Locality, State/County/Region, and Country.
    2. Key Size: Select the bit length of the private key pair. The bit length determines the security level of the SSL certificate. A larger key size is more secure but encryption is slower.

      • 1024
      • 2048 (default)
      • 4096

  4. Click OK then Save to save your selections and enroll the certificate. The certificate is listed in the SMTP Certificates pane.

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択