Use the Accounts tab on the Assets view to add an account to an asset.
You can manage tasks and services on a domain controller (DC) asset. For more information, see Using a domain controller (DC) asset..
You can add an account to an asset or add a directory account to a directory asset. Steps for both follow.
To add an account to an asset
-
Navigate to Asset Management > Assets.
-
Select an asset and click View Details.
-
Open the Accounts tab.
-
Click New Account from the details toolbar.
-
On the General tab, enter the following information:
-
Name:
-
Local account: Enter the login user name for this account. Limit: 100 characters.
-
Directory Account: Browse to find the account.
-
-
Description: (Optional) Enter information about this managed account. Limit: 255 characters.
-
-
On the Management tab, enter the following information:
-
Enable Password Request: This check box is selected by default, indicating that password release requests are enabled for this account. Clear this option to prevent someone from requesting the password for this account. By default, a user can request the password for any account in the scope of the entitlements in which they are an authorized user.
-
Enable Session Request: This check box is selected by default, indicating that session access requests are enabled for this account. Clear this option to prevent someone from requesting session access using this account. By default, a user can make an access request for any account in the scope of the entitlements in which they are an authorized user.
-
(For directory accounts only) Available for use across all partitions: When selected, any partition can use this account and the password is given to other administrators. For example, you can use this account as a dependent account or a service account for other assets. Potentially, you might have assets that are running services as the account, and you can update those assets when the service account changes.If not selected, partition owners and other partitions will not know that the account exists. Although archive servers are not bound by partitions, you must select this option for the directory account for the archive server to be configured with the directory account. You must also select this option to use the directory account as a service account when configuring an email server.
-
Password Profile: Browse to select a profile to govern this account.
By default an account inherits the profile of its associated asset, but you can assign it to a different profile for this partition. For more information, see Assigning assets or accounts to a password profile and SSH key profile..
-
(Optional) JIT Privilege Group Membership: Assign groups to grant just-in-time (JIT) privileges to the account at the time of checkout, then correspondingly remove these groups from the account at the time of check-in. To assign a group, click and enter the name of a group or role. To add multiple groups, repeat. The syntax of the group name may depend on the type of platform.
NOTE: You can use this setting together with the Suspend account when checked in option located in Asset Management > Profiles > View Password Profile Components > Change Password. These settings, however, work independently. Adding JIT privileged groups will not automatically enable an account, for example.
NOTE: For the CISCO ISE platform, you must flag the account as a CISCO ISE AdminUser instead of an InternalUser. Also, the account must not be a member of the service accounts group.
NOTE: Upon check-in of the account, all JIT privileged groups that were configured will be removed from the account, regardless of whether the account was a member of those groups before the initial checkout.
-
-
Click OK to save the account to the asset.
Directory assets
If you add directory user accounts to a directory asset, Safeguard for Privileged Passwords will automatically change the user passwords according to the profile schedule you set, which could prevent a directory user from logging into Safeguard for Privileged Passwords. For information about how to set up directory users as Safeguard for Privileged Passwords users, see Adding a user.
For Active Directory, the standard global catalog port, 3268 (LDAP), must be open on the firewall for every Windows global catalog server in the environment and SPP Appliance to communicate for directory management tasks (for example, adding a directory account, a directory user account, or a directory user group). For more information, see the Microsoft publication How the Global Catalog Works.
To add a directory account to a directory asset
-
Navigate to Asset Management > Assets.
-
Select a directory asset and click View Details.
-
Open the Accounts tab.
-
Click New Account from the details toolbar.
-
In the New Account dialog, click Select Account.
-
In the Account Search Options dialog:
-
Starts With (Active Directory ANR Search): Use this field to enter a full or partial account name.
-
Search Location: Use the Browse button to select a container within the directory as the Search Location.
-
The Include objects from sub containers check box is selected by default, indicating that child objects will be included in your search. Clear this check box to exclude child objects from your search.
-
Click Find Account to search for the account.
-
-
The results of the search displays in the Select Account grid. Select an account to add to Safeguard for Privileged Passwords.
-
To save the selected accounts, click Select Account.
-
Click OK to save the directory account to the directory asset.