Chat now with support
Chat with Support

Please note, you may experience access issues between 6am - 7am Eastern time on Saturday, May 28 2022 due to planned maintenance

One Identity Safeguard for Privileged Passwords 2.11 - Administration Guide

Introduction System requirements Using the virtual appliance and web management console Using the cloud Setting up Safeguard for Privileged Passwords for the first time Search box Using the web client Installing the desktop client Using the desktop client Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Discovery Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Safeguard Access settings Sessions settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP 2.7 or later migration guidance Appendix C: SPP and SPS join guidance Appendix D: Regular Expressions Appendix E: Historical changes by release Glossary

Step 1: Create the Authorizer Administrator

  1. Log in to the desktop client using the Bootstrap Administrator account. (The password was changed from the default when you created the appliance using the instructions in the Safeguard for Privileged Passwords Appliance Setup Guide.)
  2. Create the Authorizer Administrator, which is a user who can authorize other administrators. Give the user For more information, see Adding a user.

  3. Log out as the Bootstrap Administrator.

  4. Log in as the Authorizer Administrator.
  5. Disable the Bootstrap Administrator.

Step 2: Authorizer Administrator creates administrators

  1. Make sure you have logged into the desktop client using the Authorizer Administrator account.
  2. Customize the Password Rule. (Navigate to Settings | Safeguard for Privileged Passwords Access | Password Rules.)
  3. Add users for the following administrator permissions (Adding a user):
    1. User Administrator
    2. Help Desk Administrator
    3. Appliance Administrator
    4. Operations Administrator
    5. Auditor
    6. Asset Administrator
    7. Security Policy Administrator

    Note: A user can have more than one set of permissions. For a list of permissions granted to the different Safeguard for Privileged Passwords administrators, see Administrator permissions.

Step 3: Appliance Administrator configures the appliance

NOTE: If one or more Safeguard Sessions Appliances are joined to Safeguard for Privileged Passwords, X1 is not available in Safeguard for Privileged Passwords.

  1. Log in to the desktop client using the Appliance Administrator account.
  2. If you are using both the Privileged Passwords and embedded sessions module, ensure the Network Interface X0 (primary interface) and Network Interface X1 (sessions interface) information is configured. (Navigate to Settings | Appliance | Networking.) After one or more Safeguard Sessions Appliances have been joined, only the Network Interface X0 is used. Navigate to Settings | Appliance | Networking and set the following:

    1. IP address
    2. Netmask
    3. Default gateway
    4. DNS servers
    5. DNS suffixes

    For more information, see Networking.

  3. Ensure the access request and password management features are enabled (Settings | Access Request | Enable or Disable Services). For more information, see Enable or Disable Services (Access and management services).
  4. (Optional) Enable or disable Application to Application (A2) and audit data sharing with Safeguard for Privileged Sessions (SPS) via Settings | Appliance | Enable or Disable Services. For more information, see Enable or Disable Services .
  5. Configure the External Integration settings that apply (Settings | External Integration):
    1. Email: Configure the SMTP server to be used for email notifications. Safeguard for Privileged Passwords provides default email templates for most events, which can be customized.
    2. Identity and Authentication: Configure directory services such as Active Directory and LDAP servers to be used as identity and authentication providers for Safeguard for Privileged Passwords users. Configure Safeguard for Privileged Passwords as a relying party that uses SAML 2.0 to integrate with external federation services to authenticate users. Create a RADIUS server to be used as a primary or secondary authentication provider.
    3. SNMP: Configure SNMP subscriptions for sending SNMP traps to your SNMP console when certain events occur.
    4. Starling: Join Safeguard for Privileged Passwords to Starling to take advantage of other Starling services, such as Starling Two-Factor Authentication.
    5. Syslog: Configure the syslog servers where event notifications are to be sent.
    6. Ticketing: Add external ticketing tracking system or track tickets not tied to an external ticketing system.
  6. If you are using the embedded sessions module, Safeguard ships with default certificates and default SSH algorithms for the Unix and Linux platforms. However, you can replace the certificates to use or add new algorithms.
    1. To specify different certificates to be used, see Certificate settings.
    2. To add new SSH algorithms, use the API endpoint:

      https://<Appliance IP>/service/core/swagger/SessionSshAlgorithms

Step 4: User Administrator adds users

  1. Log in to the desktop client using the User Administrator account.
  2. Add users who can log in to Safeguard for Privileged Passwords (Adding a user).
  3. Grant Help Desk Administrator permissions to one or more users.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating