It is the responsibility of the Appliance Administrator to configure the Safeguard for Privileged Passwords user login control settings, such as the number of failed sign-in attempts before locking out an account.
To configure the login controls
Token Lifetime |
Set the number of minutes a user can stay logged into Safeguard for Privileged Passwords. Range: 10 minutes to 28800 minutes (20 days) Default: 1440 minutes (1 day) | ||
Lockout Duration |
Set the number of minutes a locked out account remains locked. Range: 1 to 9999 minutes; A setting of 9999 requires an administrator to manually unlock the account. Default: 15 minutes | ||
Lockout Threshold |
Set the number of consecutive failed sign-in attempts within the Lockout Window required to lock a user account. If a user submits an incorrect password for the maximum number of times specified by the account Lockout Threshold settings within the Lockout Window, Safeguard for Privileged Passwords locks the account until the Lockout Duration period has been met. Range: 0 to 100 failed sign-in attempts; A value of 0 (zero) indicates the user’s account will never be locked due to failed log ins. Default: 5 consecutive failures
| ||
Lockout Window |
Set the duration (in minutes) in which Safeguard for Privileged Passwords increments the number of failed sign-in attempts. Range: 0 to 15 minutes; A value of 0 (zero) means that there is no time limit to tracking failed log on attempts. Default: 10 minutes | ||
Disable After |
Set the number of days to wait before automatically disabling an inactive user account. If a user has not logged onto Safeguard for Privileged Passwords this number of days, Safeguard for Privileged Passwords disables the user account.
Range: 14 to 365 days Default: 365 days | ||
Inform User of Disabled Account |
Select this option to inform users when Safeguard for Privileged Passwords has disabled their account when they attempt to log in. When cleared, Safeguard for Privileged Passwords tells the user that his or her access has been denied.
A disabled user cannot sign into Safeguard for Privileged Passwords until an administrator has re-enabled his or her account. For more information, see Enabling or disabling a user. Default: Not set | ||
Inform User of Locked Account |
Select this option to inform users when Safeguard for Privileged Passwords has locked their account when they attempt to log in. When cleared, Safeguard for Privileged Passwords tells the user that his or her access has been denied.
A user with a locked account cannot sign into Safeguard for Privileged Passwords until the Lockout Duration period has been met or an administrator has unlocked the account. For more information, see Unlocking a user's account. Default: Not set | ||
Minimum Password Age |
Set the number of days a user must wait before changing his or her password. Range: 0 to 14 days Default: 0 | ||
Maximum Password Age |
Set the number of days users can use their current password before they must change it. Range: 0 to 180 days; A value of 0 (zero) indicates passwords never expire. Default: 42 days | ||
Password Age Reminder |
Set the period of time (in days) before the Maximum Password Age limit is met and Safeguard for Privileged Passwords begins to remind the user that their password is about to expire. Range: 0 to 30 days Default: 14 days | ||
Password History |
Enter the number of old passwords stored by Safeguard for Privileged Passwords for user accounts. Stored passwords cannot be reused, and are replaced on a first-in first-out basis.
Range: 0 to 24 old passwords; A value of 0 (zero) disables password history restrictions allowing users to always reuse old passwords. Default: 5 stored passwords |
Password rules define the complexity requirements for user authentication to Safeguard for Privileged Passwords. Some companies suggest or impose requirements on what type of password a user can create, such as:
|
Note: These rules only apply to local users; they do not impact users accessing Safeguard for Privileged Passwords from an external provider such as Microsoft Active Directory. The password rules are listed in the Set password dialog. For more information, see Setting a local user's password. |
It is the responsibility of the Authorizer Administrator to configure the user password rules.
To configure user password rules
Set the Password Length from 3 to 255 characters.
Default: 6 to 64 characters
|
Note: The maximum length must be equal to or greater than the sum of minimum characters described in the next step. |
First Character Type |
Choose one of the following:
Default: All | ||
Last Character Type |
Choose one of the following:
Default: All | ||
Allow Consecutively Repeated Characters |
Select this option to allow a user to create a password with consecutively repeated characters.
Default: Allowed | ||
Allow Uppercase |
Select this option to allow Safeguard for Privileged Passwords to create a password with uppercase characters. Set the minimum number of required uppercase characters, or set it to zero if there is no minimum requirement.
Default: Require a minimum of 1. | ||
Allow Lowercase |
Select this option to allow a user to create a password with lowercase characters. Set the minimum number of required lowercase characters, or set it to zero if there is no minimum requirement.
Default: Require a minimum of 1. | ||
Allow Numeric (0-9) |
Select this option to allow a user to create a password with numeric characters. Set the minimum number of required numeric characters, or set it to zero if there is no minimum requirement.
Default: Require a minimum of 1. | ||
Allow Symbols (e.g @ # $ % &) |
Select this option to allow a user to create a password with special characters. Set the minimum number of required symbolic characters, or set it to zero if there is no minimum requirement.
Default: Not allowed | ||
Valid Symbols |
Enter allowable special characters, such as: ~!@#$%^*()_+-=;'?/\|><.,`[]{}.
|
One Identity Safeguard for Privileged Passwords enables you to issue privileged access to users for a specific period or session and gives you the ability to record, archive, and replay user sessions so that your company can meet its auditing and compliance requirements.
It is the responsibility of the Appliance Administrator to configure the One Identity Safeguard for Privileged Passwords Privileged Sessions settings.
If a Safeguard Sessions Appliance is joined to Safeguard for Privileged Passwords, sessions configuration is handled via Safeguard for Privileged Session.
Navigate to Administrative Tools | Settings | Sessions.
Setting | Description |
---|---|
Session Recordings Storage Management | Where you assign an archive server to an appliance for storing session recordings produced by that appliance. |
Sessions Module | Where you can view the current status of the sessions module, enable debug logging and reset the sessions module if the Privileged Sessions module is not responding and users cannot connect to their target systems. |
SSH Banner |
Where you define the banner text shown to session users notifying them that they are being recorded. |
SSH Host Key | Where you specify the SSH key to be used for authentication to an SSH session. |
© 2021 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy