Chat now with support
Chat with Support

One Identity Safeguard for Privileged Passwords 2.9 - Administration Guide

Introduction System requirements Using the virtual appliance and web management console Installing the desktop client Setting up Safeguard for Privileged Passwords for the first time The console Navigation pane Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Discovery Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Safeguard Access settings Sessions settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP 2.7 or later migration guidance Appendix C: SPP and SPS join guidance Appendix D: Historical changes by release Glossary

Step 4: User Administrator adds users

  1. Log into the desktop client using the User Administrator account.
  2. Add users who can log into Safeguard for Privileged Passwords (Adding a user).
  3. Grant Help Desk Administrator permissions to one or more users.

Step 5: Asset Administrator adds managed systems

  1. Log into the desktop client using the Asset Administrator account.
  2. Add partitions and, optionally, delegate partition ownership to other users (Adding a partition).
  3. (Optional) Set the following Profile settings (or edit the default rules and settings defined when the partition was added):
    1. Account Password Rules
    2. Change Password
    3. Check Password
    4. Password Sync Groups
  4. (Optional) create partition profiles or edit the default profiles created (Creating a partition profile).
  5. Add assets to the appropriate partitions and profiles (Adding an asset).
  6. Add accounts to control access to the assets (Adding an account).

TIP: Create asset and account discovery jobs to discover and, optionally, automatically add assets and accounts to Safeguard for Privileged Passwords. For more information, see Discovery.

Step 6: Security Policy Administrator adds access request policies

  1. Log into the desktop client using the Security Policy Administrator account.
  2. Set Reasons. (Settings | Access Request | Reasons)
  3. Configure Approval Anywhere. (Settings | External Integration | Approval Anywhere).
  4. Add user groups (Adding a user group).
  5. Add local or directory users to local user groups (Adding users to a user group).
  6. Add account groups (Adding an account group).
  7. Add accounts to account groups (Adding one or more accounts to an account group).
  8. Add entitlements (Adding an entitlement).
  9. Add users or user groups to entitlements (Adding users or user groups to an entitlement).
  10. Create access request policies (Creating an access request policy).

The console

One Identity Safeguard for Privileged Passwords has two graphical user interfaces that allow you to manage password and session requests, approvals and reviews for your managed accounts and systems:

  • Windows desktop client

    The desktop client consists of an end-user view and an administrator view. The administrative functionality is dynamically enabled based on the user's permissions.

  • Web client

    The web client is functionally similar to the desktop client end-user view. It exposes the access request workflow functionality and is meant primarily for the non-administrative user. The web client uses a responsive UI design to adapt to the user's device -- from desktops to tablets or mobile phones.

Since the functionality of these two user interfaces are similar, this guide only describes the Windows desktop client.

Toolbar

The toolbar along the top-right corner of the Safeguard for Privileged Passwords console, has these controls:

Related Documents