Chat now with support
Chat with Support

One Identity Safeguard for Privileged Sessions 7.5.1 - Administration Guide

Preface Introduction The concepts of One Identity Safeguard for Privileged Sessions (SPS)
The philosophy of One Identity Safeguard for Privileged Sessions (SPS) Policies Credential Stores Plugin framework Indexing Supported protocols and client applications Modes of operation Connecting to a server through One Identity Safeguard for Privileged Sessions (SPS) Archive and backup concepts Maximizing the scope of auditing IPv6 in One Identity Safeguard for Privileged Sessions (SPS) SSH host keys Authenticating clients using public-key authentication in SSH The gateway authentication process Four-eyes authorization Network interfaces High Availability support in One Identity Safeguard for Privileged Sessions (SPS) Versions and releases of One Identity Safeguard for Privileged Sessions (SPS) Accessing and configuring One Identity Safeguard for Privileged Sessions (SPS)
Cloud deployment considerations The Welcome Wizard and the first login Basic settings
Supported web browsers The structure of the web interface Network settings Configuring date and time System logging, SNMP and e-mail alerts Configuring system monitoring on SPS Data and configuration backups Archiving Cleaning up audit data Using plugins Forwarding data to third-party systems Starling integration
User management and access control
Login settings Managing One Identity Safeguard for Privileged Sessions (SPS) users locally Setting password policies for local users Managing local user groups Managing One Identity Safeguard for Privileged Sessions (SPS) users from an LDAP database Authenticating users to a RADIUS server Authenticating users with X.509 certificates Authenticating users with SAML2 Managing user rights and usergroups Creating rules for restricting access to search audit data Displaying the privileges of users and user groups Listing and searching configuration changes
Managing One Identity Safeguard for Privileged Sessions (SPS)
Controlling One Identity Safeguard for Privileged Sessions (SPS): reboot, shutdown Managing One Identity Safeguard for Privileged Sessions (SPS) clusters Managing a High Availability One Identity Safeguard for Privileged Sessions (SPS) cluster Upgrading One Identity Safeguard for Privileged Sessions (SPS) Managing the One Identity Safeguard for Privileged Sessions (SPS) license Accessing the One Identity Safeguard for Privileged Sessions (SPS) console Sealed mode Out-of-band management of One Identity Safeguard for Privileged Sessions (SPS) Managing the certificates used on One Identity Safeguard for Privileged Sessions (SPS)
General connection settings HTTP-specific settings ICA-specific settings MSSQL-specific settings RDP-specific settings SSH-specific settings Using Sudo with SPS Telnet-specific settings VMware Horizon View connections VNC-specific settings Indexing audit trails Using the Search interface Advanced authentication and authorization techniques Reports The One Identity Safeguard for Privileged Sessions (SPS) REST API One Identity Safeguard for Privileged Sessions (SPS) scenarios Troubleshooting One Identity Safeguard for Privileged Sessions (SPS)
Network troubleshooting Gathering data about system problems Viewing logs on One Identity Safeguard for Privileged Sessions (SPS) Changing log verbosity level of One Identity Safeguard for Privileged Sessions (SPS) Collecting logs and system information for error reporting Collecting logs and system information of the boot process for error reporting Support hotfixes Status history and statistics Troubleshooting a One Identity Safeguard for Privileged Sessions (SPS) cluster Understanding One Identity Safeguard for Privileged Sessions (SPS) RAID status Restoring One Identity Safeguard for Privileged Sessions (SPS) configuration and data VNC is not working with TLS Configuring the IPMI from the BIOS after losing IPMI password Incomplete TSA response received Using UPN usernames in audited SSH connections
Using SPS with SPP Configuring external devices Using SCP with agent-forwarding Security checklist for configuring One Identity Safeguard for Privileged Sessions (SPS) Jumplists for in-product help Configuring SPS to use an LDAP backend Glossary

Running cleanup policies immediately

You can run all audit data cleanup policies immediately. This procedure deletes all data matching the queries and older than the retention period.

Prerequisites
  • You have configured audit data cleanup policies.

Running cleanup policies immediately

  1. Navigate to Policies > Audit Data Cleanup Policies.

  2. Select Run all policies now.

  3. Select Run policies to confirm running all policies immediately in the pop-up dialog.

    After confirming the cleanup, you still have 10 seconds to undo the procedure in the pop-up dialog by selecting Undo. After 10 seconds or after selecting Okay, SPS completes the cleanup.

Using plugins

To download the official plugins for your product version, navigate to the product page on the Support Portal. The not officially supported plugins are also available on GitHub .

To write your own custom plugin, feel free to use our Plugin SDK.

Figure 75: Basic Settings > Plugins — Viewing the uploaded plugins

The following plugin types can be uploaded to SPS:

Uploading plugins

To upload a plugin to SPS

  1. Navigate to Basic Settings > Plugins and click Upload plugin.

  2. Browse for the plugin .zip file and click Open.

    NOTE: It is not possible to upload or delete plugins if SPS is in sealed mode. For more information, see Sealed mode in the Administration Guide.

Verifying the integrity of a plugin

To verify the integrity of the plugin archive (that is, that the .zip file has officially been issued by One Identity and has not been tampered with before its extraction and uploading the plugin), complete the following steps. These also verify whether the plugin has been modified after upload or not.

This procedure only applies to plugins downloaded from the official repositories.

Prerequisites
  • Make sure that you have already uploaded a plugin.

    For more information on uploading plugins, see Uploading plugins.

To verify the integrity of a plugin

  1. Navigate to Basic Settings > Plugins.

  2. Select the plugin that you want to verify.

  3. Under Plugin details > Plugin integrity, click Check integrity.

    Figure 76: Basic Settings > Plugins > Plugin details — Verifying plugin integrity

    There are three integrity checks:

    • Plugin offline integrity > Zip checksum check

      This check verifies whether the recalculated checksum is the same as the checksum that has been stored in the configuration after uploading plugin.

    • Plugin offline integrity > Zip content check

      This check verifies whether the plugin runtime files are the same since you have uploaded the plugin .zip.

    • Online integrity check

      This check verifies whether the plugin .zip checksums match with the .zip checksums stored online.

      NOTE: The online integrity check works only if you have joined to Starling.

      For more information, see Starling integration

To verify the integrity of a plugin manually

  1. Under Plugin details > Plugin integrity > SHA256 checksum, click Copy.

  2. To verify the integrity of the plugin, compare this checksum with the checksum on the official download sites. You might find your plugin version under a previous product version.

    On the support portal:

    1. Navigate to the product page on the Support Portal that you have downloaded the plugin from. Click on the name of the plugin.

    2. Next to the sha256 section, you will see the checksum of the official One Identity plugin.

    On GitHub:

    1. Navigate to the GitHub plugin repository that you have downloaded the plugin from. Click on the name of the plugin.

    2. Navigate to the releases tab.

    3. Scroll to the specific release that you use.

    4. Under the SHA256 checksum section, you will see the checksum of the official One Identity plugin.

  3. Compare the checksum of the official One Identity plugin with the one you have copied from Plugin details > Plugin integrity > SHA256 checksum.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating