For manual archiving, or to migrate it to another One Identity Safeguard for Privileged Sessions (SPS) unit, you can export/import the configuration of SPSfrom the console using the /opt/scb/bin/configbundle.py script.
|
NOTE:
You must run the /opt/scb/bin/configbundle.py script using the root user. |
|
NOTE:
The configuration of your SPS may contain sensitive information. Make sure you delete any configuration export files that are not needed anymore. |
To export/import the configuration of SPS from the console
Execute the following command to export the configuration of your SPS:
/opt/scb/bin/configbundle.py create --bundle /<my destination folder>/bundle.tar.gz
Where:
/opt/scb/bin/configbundle.py: The script you execute to export the configuration.
create: The option that lets you export a configuration.
--bundle: The option used to specify the bundle file.
/<my destination folder>/bundle.tar.gz: The path to the file where you wish to export the configuration.
Replace <my destination folder> with the name of the folder where you wish to store the exported configuration.
Execute the following command to import the configuration of your SPS:
/opt/scb/bin/configbundle.py import --bundle /<my destination folder>/bundle.tar.gz
Where:
/opt/scb/bin/configbundle.py: The script you execute to import the configuration.
import: The option that lets you import a configuration.
--bundle: The option used to specify the bundle file.
/<my destination folder>/bundle.tar.gz: The path to the file from which you wish to import the configuration.
Replace <my destination folder> with the name of the folder where your configuration export file is stored.
When sealed mode is enabled, the following settings are automatically applied:
One Identity Safeguard for Privileged Sessions (SPS) cannot be accessed remotely via SSH for maintenance.
The root password of SPS cannot be changed in sealed mode.
It is not possible to upload or delete plugins in sealed mode.
Sealed mode can be disabled only from the local console. For details, see Disabling sealed mode.
To enable sealed mode use one of the following methods:
Select the Sealed mode option during the Welcome Wizard.
Select Basic Settings > System > Sealed mode > Activate sealed mode on the SPS web interface.
Log in to SPS as root using SSH or the local console, and select Sealed mode > Enable from the console menu.
The event of disabling sealed mode is logged. The following describes how to disable sealed mode.
To disable sealed mode
Go to the One Identity Safeguard for Privileged Sessions (SPS) appliance and access the local console.
Log in as root.
From the console menu, select Sealed mode > Disable
Select Back to Main menu > Logout.
One Identity Safeguard for Privileged Sessions (SPS) 6.0 includes a dedicated out-of-band management interface conforming to the Intelligent Platform Management Interface (IPMI) v2.0 standards. The IPMI allows system administrators to monitor the system health of SPS and to manage the computer events remotely, independently of the operating system of SPS. SPS is accessible using the IPMI only if the IPMI is physically connected to the network.
Note that the IPMI supports only 100Mbps Full-Duplex speed.
For details on connecting the IPMI, see "Installing the SPS hardware" in the Installation Guide.
For details on configuring the IPMI, see Configuring the IPMI from the console.
For details on using the IPMI to remotely monitor and manage SPS, see the following document:
For Safeguard Sessions Appliance 3000 and 3500, see the X9 SMT IPMI User's Guide.
Basic information about the IPMI is available also on the SPS web interface on the Basic Settings > High Availability page. The following information is displayed:
Figure 112: Basic Settings > High Availability — Information about the IPMI SPS
Hardware serial number: The unique serial number of the appliance.
IPMI IP address: The IP address of the IPMI.
IPMI subnet mask: The subnet mask of the IPMI.
IPMI default gateway: The address of the default gateway configured for the IPMI.
IPMI IP address source: Shows how the IPMI receives its IP address: dynamically from a DHCP server, or it uses a fixed static address.
© 2024 One Identity LLC. ALL RIGHTS RESERVED. 이용 약관 개인정보 보호정책 Cookie Preference Center