Use the Managed Networks page on the Cluster settings view to add managed networks, which can be used to distribute the task load in a clustered environment. It is the responsibility of the Appliance Administrator to define and maintain managed networks.
To add a managed network
Name: Enter the display name for the managed network.
Limit: 50 characters
Required
Description: (Optional) Enter information about the managed network.
Limit: 255 characters
Subnets: Click Add to specify the subnets, or group of hosts, to be managed.
Enter each subnet using CIDR notation. For example, 0.0.0.0/0.
|
NOTE: You can add a subnet to only one managed network. You will receive an error if you attempt to add the same subnet to another managed network. If you are unsure if an IP address has already been associated with a managed network, use the Resolve Network search box. For more information, see Resolving IP address. |
Managed By: Select the appliances to be used to manage the specified subnets.
|
NOTE: You do not need to specify an appliance when you initially define a managed network. You can use the |
To delete a managed network
As an Appliance Administrator you can use the Managed Networks page to search for an IP address within a managed network's list of subnets.
To find an IP address in a managed network
In the Resolve Network search box, type the IP address, and press Enter.
The managed network that contains the subnet that most closely matches the IP address is highlighted. If there are no subnets that match the IP address, the Default Managed Network is highlighted.
The Appliance Administrator can configure the appliance to send event notifications to various external systems, the integration with an external ticketing system, and configure both external and secondary authentication service providers. However, it is the Security Policy Administrator's responsibility to configure the Approval Anywhere feature.
Navigate to Administrative Tools | Settings | External Integration.
Setting | Description |
---|---|
Where you configure application registrations to use the Application to Application service, which allows third-party applications to retrieve credentials from Safeguard for Privileged Passwords. | |
Where you define the Safeguard for Privileged Passwords users who are authorized to use Approval Anywhere to approve access requests. | |
Where you configure Safeguard for Privileged Passwords to automatically send email notifications when certain events occur. | |
Where you configure the identity providers and authentication providers to use when logging into Safeguard for Privileged Passwords. | |
Where you can view the Sessions Appliances that are joined and have a session connection. You can edit or delete the joined Sessions Appliance connection. | |
Where you configure Safeguard for Privileged Passwords to send SNMP traps to your SNMP console when certain events occur. | |
Where you join Safeguard for Privileged Passwords to Starling to take advantage of other Starling services, such as Starling Two-Factor Authentication and Starling Identity Analytics & Risk Intelligence. | |
Where you configure Safeguard for Privileged Passwords to send event notifications to a syslog server with details about the event. | |
Where you configure Safeguard for Privileged Passwords to integrate with your company's external ticket system. |
© 2019 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy