On the Connection tab, select a platform, an Authentication Type, and specify the account credentials. If the asset has a custom platform, the Custom Properties elements are displayed (for more information, see Custom platforms). When you create a directory asset, accounts created display as discovered accounts in the Discovered Accounts properties grid. For more information, see Discovered Accounts..
The settings for an asset are shown below.
Property | Description | ||
---|---|---|---|
Platform |
Select an operating system or directory service, for this asset. A custom platform can be selected. For more information, see Custom platforms.. Generic operating system selections: Safeguard for Privileged Passwords allows you to select a generic operating system of Other, Other Managed, Other Directory, or Linux. This allows you to add an asset to Safeguard for Privileged Passwords without designating a specific platform.
Other platform details: Any Other platform type can be changed to a different platform type. Conversely, any platform type can be changed to Other; however, any property values specific to the current platform type will be lost. For example, you may want to change a Linux operating system to any type of Linux, such as AIX, HP-UX, or Solaris. Then, the specific platform type can be changed back to Other, if needed. | ||
Version |
(Optional) Select the operating system version. When adding a Linux or Macintosh OS X system, Safeguard for Privileged Passwords allows you to choose an Other version. Custom platforms do not allow for a version to be selected. Safeguard for Privileged Passwords does not manage passwords for accounts on domain controllers. Manage accounts on domain controllers through the directory asset that hosts the domain controller. For more information, see Adding an account to an asset.. | ||
Architecture |
(Optional) The product's system architecture. Custom platforms do not allow for an architecture to be set. | ||
Network Address |
If applicable, enter a network DNS name or the IP address used to connect to the managed system over the network. For Amazon Web Services assets, enter the Amazon AWS Account ID or Alias. For SPS assets, if you're using both REST and SSH as part of your management protocol they will need to be hosted on the same IP. | ||
Starling Agent ID (only available for Connect for Safeguard Assets platforms) |
This is required for all assets that are using the Connect for Safeguard Assets service in Starling. Use the Browse button to select an agent registered in the Starling subscription. For more information on installing an agent, see the Connect for Safeguard Assets User Guide. | ||
Authentication Type |
Select the authentication method to use for the asset. | ||
Domain Name (directory) |
The domain for the asset (Name on the General tab). A domain can be identified for more than one directory asset so that multiple directory assets can be governed the same domain. | ||
NetBios Name (Other Directory only) |
The NetBios name of the asset. | ||
Domain Unique Id (Other Directory only) |
The unique domain identifier for the asset. | ||
Naming Context (Other Directory only) |
The naming context for the asset. | ||
Manage Forest (Only available for some types of directory accounts) |
Select if you want to manage the whole forest. Do not select if you want to manage just one domain. | ||
Domain Controllers (Only available for some types of directory accounts) |
This value is set for a directory (such as Active Directory). To manage tasks and services on a Windows Domain Controller, you need to add a Windows Asset for the Domain Controller. For Active Directory, instead of having Safeguard for Privileged Passwords automatically find domain controllers from a DNS and CLDAP ping, you can specify domain controllers. | ||
RDP Session Port |
If applicable, specify the access port on the target server to be used for RDP session requests. Default: Port 3389 | ||
SSH Session Port |
If applicable, specify the access port on the target server to be used for SSH session requests. Default: Port 22 | ||
Telnet Session Port |
If connecting to TN3270 or TN5250, the port for connection. By default, a telnet server typically listens on port 23. | ||
Sync additions every [number] minutes (directory) |
Sync additions (incremental sync) syncs all changes except deletions. This is the faster type of sync. For directory assets, enter or select how often you want to synchronize additions (in minutes). This updates Safeguard for Privileged Passwords with any additions or modifications that have been made to the objects, including group membership and user account attributes mapped to Safeguard for Privileged Passwords. The default is 15 minutes and the range is between 1 and 2147483647 minutes. Directory Sync is enabled by default and can be disabled. For more information, see Global Services. | ||
Sync deletions every [number] minutes (directory) |
Sync deletions (full sync) syncs all changes and deletions. This sync takes longer (perhaps hours), especially the first time it is run based on your directory setup. For directory assets, enter or select how often you want Safeguard for Privileged Passwords to synchronize deletions (in minutes). This updates Safeguard for Privileged Passwords with any additions, changes, and deletions that have been made to the objects, including group membership and user account attributes mapped to Safeguard for Privileged Passwords. The default is 15 minutes and the range is between 1 and 1440 minutes. Directory Sync is enabled by default and can be disabled. For more information, see Global Services. You can run the deletion (full) sync on demand using the API Assets/Synchronize and IdentityProviders/Synchronize. | ||
Privileged Account Name (read-only) |
When configuring Cisco IOS, Cisco ASA, or Check Point GAiA assets, this read-only field displays enable (Cisco IOS and Cisco ASA) or expert (Check Point GAiA). | ||
Account Name |
For SPS assets, enter the name of the service account to be managed. Use the Reset button to remove a previously configured account. | ||
Hide Alter User command from verbose log_statement logging |
This option to hide Alter User commands is enabled by default for new PostgreSQL assets with log_statement configured starting with Safeguard for Privileged Passwords 7.1. Customers upgrading to 7.1 that want to enable the option will need to reconfigure any existing PostgreSQL assets with log_statement configured to have a service account with superuser permissions and enable the option. |
Authentication Type | Description |
---|---|
SSH Key | To authenticate to the asset using an SSH authentication key. |
Directory Account |
To authenticate to the asset using a directory account from an external identity store such as Microsoft Active Directory. NOTE: In order to use this authentication type, you must first add a directory asset and add domain user accounts. For more information, see Accounts.. |
To authenticate to the asset using a connector configured in Starling Connect. NOTE: In order to use this authentication type, you must first register a Starling Connect connector. For more information, see Registered Connectors. | |
Local System Account |
For SQL Server assets, to authenticate to the asset using a local system account, which is a Windows user account on the server that is hosting the SQL database. |
Password (local service account) |
To authenticate to the asset using a local service account and password. |
Account Password |
When the function account credentials are not in the custom script, for example, Amazon Web Services. For more information, see Adding a cloud platform account.. |
Access Key |
For Amazon Web Services assets, to authenticate to the asset using an access key. For more information, see Adding a cloud platform account.. |
Custom |
No authentication information is taken because the custom parameters or parameters in a customer platform script are used. No accounts associated with the asset are stored. For more information, see Custom platforms.. |
None |
No authentication information is taken and check/change functions are disabled. No accounts associated with the asset are stored. Safeguard for Privileged Passwords discovers the SSH host key of discovered assets even if you selected None as the service account credential type. |
Test Connection |
Verify that Safeguard can log in to the asset using the service account credentials that you have provided. |
Timeout |
Enter how long to wait (in seconds) for both the connect and command timeout. |
Client ID: For SAP assets, enter the client ID.
Custom Properties
If the Platform field on the Connection tab identified a custom platform, complete the dialog based on the custom properties of the custom platform script. Safeguard for Privileged Passwords checks to ensure the values match the type of the property that include a string, boolean, integer, or password (which is called secret in the API scripts). Safeguard for Privileged Passwords cannot check the validity or system impact of values entered for custom platforms.For more information, see Creating a custom platform script..