Product |
Select an operating system or directory service, for this asset.
A custom platform can be selected. For more information, see Custom platforms.
NOTE: Safeguard for Privileged Passwords allows you to select a generic operating system of Other, Other Managed, or Other Linux. This allows you to add an asset to Safeguard for Privileged Passwords without designating a specific platform.
- Other: An asset with an Other operating system cannot be managed. You can manually change passwords on accounts associated with an asset with an Other operating system. Safeguard for Privileged Passwords cannot connect to the asset so there is no automatic password check and change, test connection, or other activity requiring a connection.
- Other Managed: Safeguard for Privileged Passwords stores the password and can automatically check and change it per the profile configuration. There is no active connection or service account. The passwords are rotated internally and event notifications are sent when the rotation is complete. Another component or piece of automation can change the password or make use of the password in configuration files. For example, a listener can pick up the change event via the Safeguard for Privileged Passwords Application to Application (A2A) service and perform actions, as required.
- Other Linux: Safeguard for Privileged Passwords manages an asset with "Other Linux" on a best effort basis.
Other platform details: Any Other platform type can be changed to different platform type. Conversely, any platform type can be changed to Other, however, any property values specific to the current platform type will be lost. For example, you may want to change an Other Linux operating system to any type of Linux, such as AIX, HP-UX, or Solaris. Then, the specific platform type can be changed back to Other, if needed. For more information, see Modifying an asset. |
Version |
If applicable, select the operating system version. When adding a Linux or Macintosh OS X system, Safeguard for Privileged Passwords allows you to choose an Other version.
|
Architecture |
If applicable, the product's system architecture. |
Network Address |
If applicable, enter a network DNS name or the IP address used to connect to the managed system over the network.
For Amazon Web Services assets, enter the Amazon AWS Account ID or Alias. |
Domain Name (directory) |
The domain for the asset (Name on the General tab). A domain can be identified for more than one directory asset so that multiple directory assets can be governed the same domain. |
Manage Forest (directory) |
Select if you want to manage the whole forest. Do not select if you want to manage just one domain. |
Available for discovery across all partitions |
If applicable, select to make this asset read-access available for Asset Discovery jobs beyond partition boundaries. Any partition that exists is able to use this directory asset. Other partition owners do not have read password access. If not selected, partition owners and other partitions will not know the directory asset exists.
In setting up the Asset Discovery job, use the Directory asset discovery Method so that directory assets that are shared can be discovered into any partition. For more information, see General tab (asset discovery). |
Enable Session Request |
If applicable, this check box is selected by default, indicating that authorized users can request session access for this asset.
Clear this check box if you do not want to allow session requests for this asset. If an asset is disabled for sessions and an account on the asset is enabled for sessions, sessions are not available because the asset does not allow sessions. |
Advanced |
|
Managed Network |
The managed network that is assigned for work load balancing. For more information, see Managed networks. |
RDP Session Port |
If applicable, specify the access port on the target server to be used for RDP session requests.
Default: Port 3389 |
SSH Session Port |
If applicable, specify the access port on the target server to be used for SSH session requests.
Default: Port 22 |
Telnet Session Port |
If connecting to TN3270 or TN5250, the port for connection. By default, a telnet server typically listens on port 23. |
Sync additions every [number] minutes |
For directory assets, enter or select how often you want Safeguard for Privileged Passwords to synchronize additions (in minutes). This updates Safeguard for Privileged Passwords with any additions, or modifications that have been made to the objects, including group membership and user account attributes mapped to Safeguard for Privileged Passwords.
Default: 15 minutes
Range: Between 1 and 2147483647
Directory Sync is enabled by default and can be disabled. For more information, see Enable or Disable Services (Access and management services). |
Sync deletions every [number] minutes |
For directory assets, enter or select how often you want Safeguard for Privileged Passwords to synchronize deletions (in minutes).
This updates Safeguard for Privileged Passwords with any deletions that have been made to the objects, including group membership and user account attributes mapped to Safeguard for Privileged Passwords.
Default: 15 minutes
Range: Between 1 and 2147483647
Directory Sync is enabled by default and can be disabled. For more information, see Enable or Disable Services (Access and management services). |