Converse agora com nosso suporte
Chat com o suporte

One Identity Safeguard for Privileged Passwords 6.0.10 LTS - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Getting started with the desktop client Using the desktop client Search box Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Discovery Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Safeguard Access settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP 2.7 or later migration guidance Appendix C: SPP and SPS join guidance Appendix D: Regular Expressions SPP glossary

Users tab

The Administrative Tools | Entitlements | Users tab displays the users and user groups who are authorized to request access for the accounts and assets in the scope of the selected entitlement's policies. Certificate users are included in the display if the user was created during a Safeguard for Privileged Sessions join and was assigned and used by a Sessions Appliance. The certificate users created during the join can be added to the Users tab but are not there by default.

Click Add User or User Group from the details toolbar to add one or more requester users or user groups to the selected entitlement.

Table 82: Entitlements: User tab properties
Property Description
Type

Type of member:

  • Group
  • User
Name Name of the user or user group included in the selected entitlement.
Provider

The name of the authentication provider:

  • Local
  • Certificate
  • The name of an external provider such as a Microsoft Active Directory domain name.

Domain Name

If applicable, the name of the domain of the user group or user

Use these buttons on the details toolbar to manage the requester users associated with the selected entitlement.

Table 83: Entitlements: Users tab toolbar
Option Description

Add User or User Group

Add a requester user group or requester user to the entitlement. For more information, see Adding users or user groups to an entitlement.

Remove Selected

Remove the selected user or user group from the entitlement.

Refresh

Update the list of requester users or user groups.

Details

View additional details about the selected user or user group.

Search (case sensitive)

To locate a specific user (or user group) or set of users (or user groups) in this list, enter the character string to be used to search for a match. For more information, see Search box.

Related Topics

Adding users or user groups to an entitlement

Access Request Policies tab

The Administrative Tools | Entitlements |Access Request Policies tab displays the password release policies that govern the accounts in the selected entitlement.

IMPORTANT: The selection made on the Entitlement | Access Request Policy tab takes precedence over the selections on Settings | Cluster | Managed Networks page. If a Managed Networks rule includes nodes from different SPS clusters, SPP will only select the nodes from the same cluster that was assigned on the Session Settings page of the Access Request Policy tab.

Click Create Access Policy from the details toolbar to add a policy to the selected entitlement.

Table 84: Entitlements: Access Request Policies tab properties
Property Description
Priority

A unique number that determines the processing order of the policy. For more information, see About priority precedence.

Name

The name of the access request policy.

Access Type

Indicates the type of access requested:

  • Password Release
  • RDP
  • SSH
  • Telnet
Scope

The number of unique account groups, accounts (including the number of accounts in the specified account groups), asset groups, and assets (including the number of assets in the specified asset groups) governed by the selected policy.

Description

Information about the selected policy.

Approvals

A displays if there are approver settings for the access request policy. For more information, see Approver tab.

Reviews

A displays if there are reviewer settings for the access request policy. For more information, see Reviewer tab.

Emergency

A displays if a user can request emergency access to the accounts and assets governed by the policy.

Emergency Access overrides the Approver requirements; that is, when a user requests access using Emergency Access, the request is immediately approved, provided that the other constraints are met, such as the Requester settings. Multiple users are allowed to request emergency access simultaneously for the same account or asset.For more information, see Emergency tab.

Time Restrictions

A displays if time restrictions are specified for access requests for accounts and assets governed by the policy. For more information, see Time Restrictions tab.

Expired

A Warning displays for the entitlement when it contains at least one expired policy. You can configure Safeguard for Privileged Passwords to notify you of an impending entitlement or policy expiration by sending an event notification to a syslog server, in an email message, or a SNMP trap. For more information, see External Integration settings.

Invalid

A Warning displays for the entitlement when it contains at least one invalid policy.

Check the following if there is an invalid policy.

  • Validate that the SPS cluster is still joined to SPP.
  • Validate the SPS cluster is available.
  • Validate there are no network issues that prevent SPP from communicating with SPS.
  • Validate SPP can communicate with the SPS cluster.
  • Validate that the assigned session connection policy is on the SPS cluster master.
  • Validate the session connection policy is still compatible with SPP given what the administrator changed.

For more information, see Managed networks.

Use these buttons on the details toolbar to manage your access request policies.

Table 85: Entitlements: Access Request Policies tab toolbar
Option Description

Create Access Policy

Add an access request policy to the selected entitlement. For more information, see Creating an access request policy.

Delete Selected

Remove the selected policy from the selected entitlement. For more information, see Deleting an access request policy.

Refresh

Update the list of access request policies.

Edit Access Policy

Modify the selected policy. For more information, see Modifying an access request policy.

Copy Access Policy

Make a copy of the selected policy. For more information, see Copying an access request policy.

Details

View additional details about the selected policy. For more information, see Viewing and editing policy details.

Search (case insensitive)

To locate a specific policy or set of policies in this list, enter the character string to be used to search for a match. For more information, see Search box.

History tab

The Administrative Tools | Entitlements |History tab allows you to view or export the details of each operation that has affected the selected entitlement.

The top of the History tab contains the following information:

  • Items: Total number of entries in the history log.
  • Refresh: Update the list displayed.
  • Export: Export the data to a .csv file.
  • Search: For more information, see Search box.

  • Time Frame: By default, the history details are displayed for the last 24 hours. Click one of the time intervals at the top of the grid to display history details for a different time frame. If the display does not refresh after selecting a different time interval, click Refresh.
Table 86: Entitlements: History tab properties
Property Description
Date/Time The date and time of the event
User The display name of the user that triggered the event
Source IP The network DNS name or IP address of the managed system that triggered the event
Object Name The name of the selected entitlement.
Event

The type of operation made to the selected entitlement:

  • Create
  • Delete
  • Update
  • Add Membership
  • Remove Membership

NOTE: A membership operation indicates a relationship change with a related or parent object such as a user or user group was added or removed from the membership of an entitlement.

Related Object The name of the related object
Related Object Type The type of the related object
Parent The name of the object to which the selected entitlement is a child
Parent Object Type The parent object type

Select an event to display this additional information for some types of events (for example, create and update events).

Table 87: Additional History tab properties
Property Description
Property The property that was updated
Old Value The value of the property before it was updated
New Value The new value of the property

Managing entitlements

Use the controls and tabbed pages on the Entitlements page to perform the following tasks to manage Safeguard for Privileged Passwords entitlements:

Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação