PAM access request policies
An access request policy defines:
-
The scope (meaning, which assets, asset groups, asset accounts, directory accounts, or account groups).
-
The access type (password, SSH, SSH key, remote desktop, remote desktop application, Telnet)
-
The rules for requesting passwords, for example, the duration or how many approvals are required.
Access request policies are imported into the One Identity Manager database during synchronization. Changes to the object properties of individual access request policies can be re-imported by single object synchronization.
To display the properties of an access request policy
-
In the Manager, select the Privileged Account Management > Appliances > <Appliance> > Entitlements > <Entitlement> category.
-
Select the access request policy in the result list.
-
Select the Change main data task.
For an access request policy, will see an overview of the scope of the access request policy and the entitlements associated with the access request policy.
To obtain an overview of an access request policy
-
In the Manager, select the Privileged Account Management > Appliances > <Appliance> > Entitlements > <Entitlement> category.
-
Select the access request policy in the result list.
-
Select the PAM access request policy overview task.
Related topics
Reports about PAM objects
One Identity Manager makes various reports available containing information about the selected base object and its relations to other One Identity Manager database objects. The following reports are available for PAM systems.
Table 28: Data quality target system report
Show overview |
User account |
This report shows an overview of the user account and the assigned permissions. |
Show overview including origin |
User account |
This report shows an overview of the user account and origin of the assigned permissions. |
Show overview including history |
User account |
This report shows an overview of the user accounts including its history.
Select the end date for displaying the history (Min. date). Older changes and assignments that were removed before this date, are not shown in the report. |
Overview of all assignments |
User group |
This report finds all roles containing employees who have the selected system entitlement. |
Show overview |
User group |
This report shows an overview of the system entitlement and its assignments. |
Show overview including origin |
User group |
This report shows an overview of the system entitlement and origin of the assigned user accounts. |
Show overview including history |
User group |
This report shows an overview of the system entitlement and including its history.
Select the end date for displaying the history (Min. date). Older changes and assignments that were removed before this date, are not shown in the report. |
Show entitlement drifts |
Appliance |
This report shows all system entitlements that are the result of manual operations in the target system rather than provisioned by One Identity Manager. |
Show user accounts overview (incl. history) |
Appliance |
This report returns all the user accounts with their permissions including a history.
Select the end date for displaying the history (Min. date). Older changes and assignments that were removed before this date, are not shown in the report. |
Show user accounts with an above average number of system entitlements |
Appliance |
This report contains all user accounts with an above average number of system entitlements. |
Show employees with multiple user accounts |
Appliance |
This report shows all the employees that have multiple user accounts. The report contains a risk assessment. |
Show system entitlements overview (incl. history) |
Appliance |
This report shows the system entitlements with the assigned user accounts including a history.
Select the end date for displaying the history (Min. date). Older changes and assignments that were removed before this date, are not shown in the report. |
Overview of all assignments |
Appliance |
This report finds all roles containing employees with at least one user account in the selected target system. |
Show unused user accounts |
Appliance |
This report contains all user accounts, which have not been used in the last few months. |
Show orphaned user accounts |
Appliance |
This report shows all user accounts to which no employee is assigned. |
Table 29: Additional reports for the target system
PAM user account and group administration |
This report contains a summary of user account and group distribution in all PAM appliances. You can find the report in the My One Identity Manager > Target system overviews category. |
Data quality summary for PAM user accounts |
This report contains different evaluations of user account data quality in all PAM appliances. You can find the report in the My One Identity Manager > Data quality analysis category. |
Overview of employee's privileged access. |
The report contains detailed information about personal and organizational data as well as the employee's current privileged access. The report is displayed for employees. |
PAM access requests
In One Identity Manager, you can request access requests for assets, asset accounts, directory accounts, asset groups, and account groups in a PAM system. For requesting an access request, the following products are available in IT Shop:
-
Password release request: To request passwords for accounts in a PAM system.
-
SSH key request: To requests SSH keys for accounts in a PAM system.
-
SSH session request: To request SSH sessions for assets in a PAM system.
-
Remote Desktop session request: To request remote desktop sessions for assets in a PAM system.
-
Telnet session request: To request Telnet sessions for assets in a PAM system.
The access requests are requested in the Web Portal. After the request is approved, a corresponding access request is created in the PAM system. To check out the requested password or session, the user logs on to the PAM system.
For more information about configuring the IT Shop, see the One Identity Manager IT Shop Administration Guide. For more information about requesting access requests in Web Portal, please refer to the One Identity Manager Web Designer Web Portal User Guide.
Detailed information about this topic
System requirements for requesting PAM access requests
The access requests in the PAM system are created in process and script processing. The Job server must have the same configuration as the synchronization server (in terms of the installed software and the entitlements and certificates of the user account). Use the synchronization server.
In One Identity Safeguard, the following system prerequisites must be guaranteed:
-
The application-to-application service is enabled.
-
An application with the following properties has been registered and activated:
-
Name: One Identity Manager
-
Certificate user: Users for access to the One Identity Safeguard appliance (synchronization user)
-
Access request broker: Activated
At least one user or user group for which One Identity Safeguard will determine the access must be assigned to the access request broker.
This list is updated when access requests are created by the One Identity Manager.
-
To generate valid access requests whenever possible, do not set time restrictions on the entitlements and access request policies.
For more information about setting up the application to application service in One Identity Safeguard and configuring the entitlements and access request policies, see the One Identity Safeguard Administration Guide.
Related topics