If you are designated as an authorized "user" of an entitlement, you can request access for a specific period (or session) to any account or asset in the scope of the entitlement's policies.
You can configure One Identity Safeguard for Privileged Passwords to notify you of pending access request workflow events, such as when a session request is pending, denied or revoked, and so forth. For more information, see Configuring alerts..
To request session access
From your Home page, click New Request to open the New Access Request dialog.
|
NOTE: You can also submit an access request from your Favorites pane, if you previously saved it as a favorite. |
On the Asset Selection tab, select the assets to be included in the access request.
Limit: 50 assets
The assets available for selection are based on the scope defined in the entitlement's access request policies.
On the Account & Access Type tab, select the accounts to be included in the access request and the type of access being requested for each selected account.
Account: The accounts available appear in the Account column. When an asset has multiple accounts available, either Select Account(s) or the account name appears as a hyperlink in the Account column. Click the hyperlink in the Account column to display a list of accounts available and select the accounts to be included in the access request.
The accounts available for selection are based on the Asset-Based Session Access setting (Access Config tab) defined for the entitlement's access request policy. That is:
If User Supplied is selected in the access request policy, you will be required to enter the user credentials as part of the request workflow, prior to launching the SSH or RDP session.
If Directory Account is selected in the access request policy, only the specified directory accounts will be available for selection. The selected directory account will then be used when the session is requested.
Access Type: The type of access request appears in the Access Type column. When multiple access request types are available, this value appears as a hyperlink, which when selected displays an additional dialog allowing you to select the access type. Select one of the following for a session request: RDP or SSH.
The access type options available depend on the type of asset selected on the Asset Selection tab. For example, RDP is only available for Windows sessions.
To remove an asset or account from the list, select the entry in the grid and click the Delete toolbar button.
Normal Access: (This option is only available if the policy has emergency access enabled.) Select this option to gain normal access to this password. Normal access ensures the access request goes through the entire end-to-end access release process from request to approval to review as defined in the policy by the Security Policy Administrator.
Emergency Access: (This option is only available if the policy has emergency access enabled.) Select this option to gain immediate emergency access to this password. When you use Emergency Access, the request requires no approval.
Request Immediately: Clear this option to enter a specific date and time for the request. Enter the time in the user’s local time.
Ticket Number: Enter a valid ticket number for this request.
Safeguard for Privileged Passwords does not display the Ticket Number option unless the Security Policy Administrator selected Require Ticket Number for this policy.
When multiple accounts are specified in the request, if any of the selected accounts require a ticket number, you must specify a valid ticket number. The specified ticket number will be applied to all of the requests associated with this access request.
Reason: Select an access request reason code for this request.
Select the Description down arrow to view the description defined for the selected reason.
Safeguard for Privileged Passwords does not display the Reason option unless the Security Policy Administrator selected reasons for this policy.
When multiple accounts are specified in the request, if any of the selected accounts require a reason, you must specify a reason. The specified reason will be applied to all of the requests associated with this access request.
Comment: Enter information about this request. When multiple accounts are specified in the request, if any of the selected accounts require a comment, you must enter a comment. The comment will be applied to all of the requests associated with this access request.
Limit: 255 characters
To save the access request as a favorite, click the Add to Favorites button.
The Add to Favorites dialog displays allowing you to specify a name and description for the access request. It also allows you to assign a color to the request's icon.
This access request is then added to your Home page Favorites pane. Selecting it from the Favorites pane displays the New Access Request dialog allowing you to edit the request details or enter a required reason or comment before submitting the request.
After entering the required information, click Submit Request.
The Access Request Result dialog displays showing you the access requests submitted and whether a request was successful.
The actions a user authorized to request access to a privileged session can take depends on the state of the request.
To take action on a session request
You can then select and drag the pane to any location on the console and re-size the window.
|
Note: You enable or disable the Home page widgets in the |
Open the list of requests and select one of these view filters:
State | Description |
---|---|
All | Requests in all states. |
Available | Approved requests that are ready (that is, a session that can be launched). |
Approved | Requests that have been approved, but the checkout time has not arrived. |
Pending | Requests that are waiting for approval. |
Revoked |
Approved requests retracted by the approver. The approver can revoke a request between the time the requester launches the session and checks it back in. When a user with Security Policy administrator permissions revokes a "live" session, the active session is terminated. |
Expired | Requests for which the checkout duration has elapsed. |
Denied | Requests denied by the approver. |
|
Note: The number indicates how many requests are in that state. |
You can take the following actions on session requests, depending on the state:
State | Actions | ||
---|---|---|---|
Available |
Click Click In addition, you can use the following buttons to view or copy information into the configuration dialog that contains the credentials needed to launch the session:
| ||
Approved |
Click A sessions request changes from "Approved" to "Available" when the requested time is reached. It stays available until you either cancel the request or it reaches the end of the duration period. | ||
Pending | |||
Revoked |
Click | ||
Expired | Click | ||
Denied |
Click Click |
Depending on how the Security Policy Administrator configured the policy, a sessions request will either require approval by one or more Safeguard for Privileged Passwords users, or be auto-approved.
You can configure Safeguard for Privileged Passwords to notify you of an access request that requires your approval. For more information, see Configuring alerts..
To approve or deny a sessions request
You can then select and drag the pane to any location on the console and re-size the window.
|
Note: You enable or disable the Home page widgets in the |
State | Description |
---|---|
All | Requests in all states. |
Pending | Requests that are waiting for approval. |
Approved | Requests that have been approved, but not yet available to the requester. |
|
Note: The number indicates how many requests are in that state. |
Take the following actions on sessions requests:
State | Actions |
---|---|
Pending |
Select Optionally, enter a comment of up to 255 characters. |
Pending Additional Approvers |
Select Optionally, enter a comment of up to 255 characters. |
Approved |
Select You can revoke a request between the time the requester views it and checks it in. Any eligible approver can deny an access request after it has already been approved or auto-approved. Once disallowed, the requester will no longer be able to access the requested session, but he is given another opportunity to request that session again. The requester receives an email notifying him that the request was denied. For more information, see Configuring alerts. |
Once an SSH session request becomes available, the requester can launch the SSH client to start the session.
To launch the SSH client to begin your session
Click the Launch button to the right of the asset name. Clicking this button displays the PuTTY Configuration dialog. The required information is populated, click Open to launch the SSH client.
|
NOTE: If the required information is not populated in the PuTTY Configuration dialog, use the following buttons to copy and paste the information into the dialog:
|
In the SSH client, run the commands or programs on the target host.
If there is no activity in an open session for about 10 minutes, the session will be terminated. However, as long as the request is in an Available state, you can launch the session again to resume your tasks.
Once you are completed, log out of the target host and select Check in to complete the session request process.
This makes the session request available to reviewers. If the Record Sessions option is enabled in the policy, the reviewer can play back the recording as part of the review process. In addition, if the Enable Command Detection option is selected in the policy, the reviewer can view a list of the commands and programs run during the session.
© 2021 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy