サポートと今すぐチャット
サポートとのチャット

One Identity Safeguard for Privileged Passwords 8.0 LTS - Administration Guide

Introduction System requirements Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home page Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Global Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms Importing objects
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Vaults Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions

Trusted CA Certificates

It is the responsibility of the Appliance Administrator to add or remove trusted root certificates to the Safeguard for Privileged Passwords Appliance. If you are going to verify the server certificate, then you do need a certificate from the server certificates chain of trust in Trusted Certificates.

Examples:

  • If you uploaded a syslog client certificate with a private key, you may need to upload the certificate's root CA to the list of trusted certificates. For more information, see Syslog Client Certificate..
  • An SSL/TLS certificate must be trusted to resolve the chain of authority. For an SSL/TSL certificate, when Safeguard for Privileged Passwords connects to an asset that has the Verify SSL Certificate option enabled, the signing authority of the certificate presented by the asset is compared to the certificates in the trusted certificate store. For more information, see Directory Account, Verify SSL Certificate.

Go to the following:

  • web client: Navigate to Certificates > Trusted CA Certificates.

Select a certificate to display the following information for the user-supplied certificates added to the trusted certificate store.

Table 33: Trusted CA certificates: Properties
Property Description
Subject The name of the subject (such as user, program, computer, service or other entity) assigned to the certificate when it was requested.

Issued By

The name of the certificate authority (CA) that issued the certificate.

Certificate Type

Trusted

Thumbprint

A unique hash value that identifies the certificate.
Invalid Before A "start" date and time that must be met before a certificate can be used.
Expiration Date The date and time when the certificate expires and can no longer be used.

Toolbar options follow.

Table 34: Trusted Certificates: Toolbar
Option Description
Upload New Trusted CA Certificate

Add a trusted certificate.

Delete Selected

Delete the selected certificate.

Refresh

Update the list of certificates.

Adding a trusted certificate

Prior to adding an asset that uses SSL server certificate validation, add the certificate's root CA and any intermediate CAs to the Trusted Certificates store in Safeguard for Privileged Passwords. For more information, see Verify SSL Certificate.

You may need to add the syslog server certificate if it is signed by the same CA.

If a certificate upload fails, the audit log reflects: TrustedCertificateUploadFailed or ServerCertificateUploadFailed.

To add a trusted certificate

  1. Go to the following:
    • web client: Navigate to Certificates > Trusted CA Certificates.
  2. Click  Upload New Trusted CA Certificate from the details toolbar.

  3. Browse and select the certificate file then click Open.
  4. On the dialog box, enter the case sensitive passphrase to import the certificate. If the certificate does not have a private key passphrase, leave the field empty and click OK.

Removing a trusted certificate

To remove certificates from the appliance

  1. Go to the following:
    • web client: Navigate to Certificates > Trusted CA Certificates.
  2. Select a certificate.
  3. Click  Delete Trusted CA Certificate from the details toolbar.

    IMPORTANT: Safeguard for Privileged Passwords does not allow you to remove built-in certificate authorities.

Cluster

Use the Cluster settings to create a clustered environment, to monitor the health of the cluster and its members, and to define managed networks for high availability and load distribution.

It is the responsibility of the Appliance Administrator or the Operations Administrator to create a cluster, monitor the status of the cluster, and define managed networks.

Before creating a Safeguard for Privileged Passwords cluster, become familiar with the Disaster recovery and clusters chapter to understand:

  • Go to the following:
    • web client: Navigate to Cluster.
    Table 35: Cluster settings
    Setting Description

    Cluster Management

    Where you create and manage a cluster and monitor the health of the cluster and its members.

    Managed Networks

    Where you define managed networks to distribute the task load for the clustered environment.

    Offline Workflow (automatic)

    Where you configure Offline Workflow Mode to automatically trigger if an appliance has lost consensus (quorum) and, optionally, automatically resume online workflow. You can also manually Enable Offline Workflow and Resume Online Operations from this dialog. For more information, see About Offline Workflow Mode..

    Session Appliances with SPS link

    Where you view, edit, and delete link connections when a Safeguard for Privileged Sessions cluster is linked to a Safeguard for Privileged Password for session recording and auditing. For more information, see Safeguard for Privileged Passwords and SPS appliance link guidance..

  • 関連ドキュメント

    The document was helpful.

    評価を選択

    I easily found the information I needed.

    評価を選択