Converse agora com nosso suporte
Chat com o suporte

One Identity Safeguard for Privileged Sessions 6.0.11 - Administration Guide

Preface Introduction The concepts of One Identity Safeguard for Privileged Sessions (SPS) Cloud deployment considerations The Welcome Wizard and the first login Basic settings
Supported web browsers and operating systems The structure of the web interface Network settings Configuring date and time System logging, SNMP and e-mail alerts Configuring system monitoring on SPS Data and configuration backups Archiving and cleanup Forwarding data to third-party systems Joining to One Identity Starling
User management and access control Managing One Identity Safeguard for Privileged Sessions (SPS)
Controlling One Identity Safeguard for Privileged Sessions (SPS): reboot, shutdown Managing Safeguard for Privileged Sessions (SPS) clusters Managing a high availability One Identity Safeguard for Privileged Sessions (SPS) cluster Upgrading One Identity Safeguard for Privileged Sessions (SPS) Managing the One Identity Safeguard for Privileged Sessions (SPS) license Accessing the One Identity Safeguard for Privileged Sessions (SPS) console Sealed mode Out-of-band management of One Identity Safeguard for Privileged Sessions (SPS) Managing the certificates used on One Identity Safeguard for Privileged Sessions (SPS)
General connection settings HTTP-specific settings ICA-specific settings RDP-specific settings SSH-specific settings Telnet-specific settings VMware Horizon View connections VNC-specific settings Indexing audit trails Using the Search interface Searching session data on a central node in a cluster Advanced authentication and authorization techniques Reports The One Identity Safeguard for Privileged Sessions (SPS) RPC API The One Identity Safeguard for Privileged Sessions (SPS) REST API One Identity Safeguard for Privileged Sessions (SPS) scenarios Troubleshooting One Identity Safeguard for Privileged Sessions (SPS) Using SPS with SPP Configuring external devices Using SCP with agent-forwarding Security checklist for configuring One Identity Safeguard for Privileged Sessions (SPS) Jumplists for in-product help LDAP user and group resolution in SPS Appendix: Deprecated features Glossary

Exporting and importing the configuration of One Identity Safeguard for Privileged Sessions (SPS) using the console

For manual archiving, or to migrate it to another One Identity Safeguard for Privileged Sessions (SPS) unit, you can export/import the configuration of SPSfrom the console using the /opt/scb/bin/configbundle.py script.

NOTE:

You must run the /opt/scb/bin/configbundle.py script using the root user.

NOTE:

The configuration of your SPS may contain sensitive information. Make sure you delete any configuration export files that are not needed anymore.

To export/import the configuration of SPS from the console

  1. Execute the following command to export the configuration of your SPS:

    /opt/scb/bin/configbundle.py create --bundle /<my destination folder>/bundle.tar.gz

    Where:

    • /opt/scb/bin/configbundle.py: The script you execute to export the configuration.

    • create: The option that lets you export a configuration.

    • --bundle: The option used to specify the bundle file.

    • /<my destination folder>/bundle.tar.gz: The path to the file where you wish to export the configuration.

      Replace <my destination folder> with the name of the folder where you wish to store the exported configuration.

  2. Execute the following command to import the configuration of your SPS:

    /opt/scb/bin/configbundle.py import --bundle /<my destination folder>/bundle.tar.gz

    Where:

    • /opt/scb/bin/configbundle.py: The script you execute to import the configuration.

    • import: The option that lets you import a configuration.

    • --bundle: The option used to specify the bundle file.

    • /<my destination folder>/bundle.tar.gz: The path to the file from which you wish to import the configuration.

      Replace <my destination folder> with the name of the folder where your configuration export file is stored.

Sealed mode

When sealed mode is enabled, the following settings are automatically applied:

  • One Identity Safeguard for Privileged Sessions (SPS) cannot be accessed remotely via SSH for maintenance.

  • The root password of SPS cannot be changed in sealed mode.

  • It is not possible to upload or delete plugins in sealed mode.

  • Sealed mode can be disabled only from the local console. For details, see Disabling sealed mode.

To enable sealed mode use one of the following methods:

  • Select the Sealed mode option during the Welcome Wizard.

  • Select Basic Settings > System > Sealed mode > Activate sealed mode on the SPS web interface.

  • Log in to SPS as root using SSH or the local console, and select Sealed mode > Enable from the console menu.

Disabling sealed mode

The event of disabling sealed mode is logged. The following describes how to disable sealed mode.

To disable sealed mode

  1. Go to the One Identity Safeguard for Privileged Sessions (SPS) appliance and access the local console.

  2. Log in as root.

  3. From the console menu, select Sealed mode > Disable

  4. Select Back to Main menu > Logout.

Out-of-band management of One Identity Safeguard for Privileged Sessions (SPS)

One Identity Safeguard for Privileged Sessions (SPS) 6.0.10 includes a dedicated out-of-band management interface conforming to the Intelligent Platform Management Interface (IPMI) v2.0 standards. The IPMI allows system administrators to monitor the system health of SPS and to manage the computer events remotely, independently of the operating system of SPS. SPS is accessible using the IPMI only if the IPMI is physically connected to the network.

Note that the IPMI supports only 100Mbps Full-Duplex speed.

Basic information about the IPMI is available also on the SPS web interface on the Basic Settings > High Availability page. The following information is displayed:

Figure 112: Basic Settings > High Availability — Information about the IPMI SPS

  • Hardware serial number: The unique serial number of the appliance.

  • IPMI IP address: The IP address of the IPMI.

  • IPMI subnet mask: The subnet mask of the IPMI.

  • IPMI default gateway: The address of the default gateway configured for the IPMI.

  • IPMI IP address source: Shows how the IPMI receives its IP address: dynamically from a DHCP server, or it uses a fixed static address.

Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação