Adding assets and accounts to Safeguard for Privileged Passwords is the responsibility of Asset Administrators. While an asset can have multiple accounts, you can only associate an account with one asset.
The new account displays on the Accounts list.
NOTE: Safeguard for Privileged Passwords allows you to set up account discovery jobs that run automatically. For more information, see Account Discovery job workflow..
To add an account
-
Navigate to Asset Management > Accounts.
-
On the toolbar, click (New Account).
-
In the Select the asset for the new account dialog, select an asset to associate with this account, then click Select Asset.
-
In the New Account dialog, enter the following information:
-
On the General tab:
-
Name:
-
Local account: Enter the login user name for this account. Limit: 100 characters.
-
Directory account: Browse to find the account.
-
-
Kubernetes Namespace: Kubernetes Namespace in which the secret exists.
-
Description: (Optional) Enter information about this managed account. Limit: 255 characters.
-
Asset: Platform
-
-
On the Management tab:
-
Enable Password Request: This check box is selected by default, indicating that password release requests are enabled for this account. Clear this option to prevent someone from requesting the password for this account. By default, a user can request the password for any account in the scope of the entitlements in which they are an authorized user.
IMPORTANT: (Azure AD only) After you save an Azure AD account in Safeguard for Privileged Passwords, you can no longer change the Application Account status.
-
Enable Session Request: This check box is selected by default, indicating that session access requests are enabled for this account. Clear this option to prevent someone from requesting session access using this account. By default, a user can make an access request for any account in the scope of the entitlements in which they are an authorized user.
-
Enable SSH Key Request: This check box is selected by default, indicating that SSH key release requests are enabled for this account. Clear this option to prevent someone from requesting the SSH key for this account. By default, a user can request the SSH key for any account in the scope of the entitlements in which they are an authorized user.
-
Enable API Key Request: This check box is selected by default, indicating that API key release requests are enabled for this account. Clear this option to prevent someone from requesting the API key for this account. By default, a user can request the API key for any account in the scope of the entitlements in which they are an authorized user.
-
(Azure AD only) Application Account: Within Azure AD, only application accounts can use API keys. To select the Enable API Key Request check box, you must select this option for Azure AD accounts. This, in turn, will automatically prevent using the Enable Password Request option.
IMPORTANT: (Azure AD only) After you save an Azure AD account in Safeguard for Privileged Passwords, you can no longer change the Application Account status.
-
Password Profile and SSH Key Profile: To select and assign a profile to govern this account, click Browse.
By default an account inherits the profile of its associated asset, but you can assign it to a different profile for this partition. For more information, see Assigning assets or accounts to a password profile and SSH key profile.
-
Available for use across all partitions (Only available for some types of directory accounts): When selected, any partition can use this account and the password is given to other administrators. For example, you can use this account as a dependent account or a service account for other assets. Potentially, you might have assets that are running services as the account, and you can update those assets when the service account changes.If not selected, partition owners and other partitions will not know that the account exists. Although archive servers are not bound by partitions, you must select this option for the directory account for the archive server to be configured with the directory account. You must also select this option to use the directory account as a service account when configuring an email server.
-
-
-
Click OK.