We now need to define the users who are authorized to make password release requests and add access request policies to define the scope (accounts that can be accessed) and rules for checking out passwords. For more information, see the Safeguard for Privileged Passwords Administration Guide, Creating an access request policy section.
To add a policy to the Linux Password Requests Entitlement
- As PolicyAdmin, navigate to Administrative Tools | Entitlements .
- Select the Linux Password Requests Entitlement.
- On the Users tab, add the Requesters user group as the user for this entitlement.
An entitlement "User" is a person who is authorized to request passwords to accounts governed by the polices in the entitlement.
-
On the Access Request Policies tab, create the following access request policy:
-
General tab:
- Policy Name: Linux Servers Password Release Request Policy
- Description: The rules that define the request, approval, and review of password release requests for the Linux Server Accounts.
- Access Type: Password Release.
-
Scope tab:
- Linux Server Accounts group
-
Requester tab:
- Select the following reasons: SU and Sys Maint.
- Require a Reason.
- Require a Comment.
- Select the Allow Requester to Change Duration option.
-
Approver tab:
- Require one person from the Approvers user group to approve a password release request.
-
Reviewer tab:
- Require one person from the Reviewers user group to review a completed password release.
-
Access Config tab
- Select the Change password after check-in option.
-
Time Restrictions tab:
-
Emergency tab:
To add a policy to the Windows Password Requests Entitlement
- As PolicyAdmin, navigate to Administrative Tools | Entitlements.
- Select the Windows Password Requests Entitlement.
- On the Users tab, add the Requesters user group as the user for this entitlement.
An entitlement User is a person who is authorized to request passwords to accounts governed by the polices in the entitlement.
-
On the Access Request Policies tab, create the following access request policy:
-
General tab:
- Policy Name: Weekday Maintenance Policy
- Description: The rules that define the request, approval, and review of password release requests for the Windows Server Accounts on weekdays.
- Access Type: Password Release
-
Scope tab:
- Windows Server Accounts group
-
Requester tab:
- Do not require a Reason.
- Do not require a Comment.
- Select the Allow Requester to Change Duration option.
-
Approver tab:
- Require one person from the Approvers user group to approve a password release request.
-
Reviewer tab:
- Require one person from the Reviewers user group to review a completed password release.
-
Access Config tab
- Select the Change password after check-in option.
-
Time Restrictions tab:
-
Emergency tab:
- Do not Enable Emergency Access.
To add a policy to the Directory Requests Entitlement
- As PolicyAdmin navigate to Administrative Tools | Entitlements.
- Select the Directory Password Requests Entitlement.
- On the Users tab, add the Requesters user group as the user for this entitlement.
An entitlement User is a person who is authorized to request passwords to accounts governed by the polices in the entitlement.
-
On the Access Request Policies tab, create the following access request policy:
-
General tab:
- Policy Name: Weekday Maintenance Policy
- Description: The rules that define the request, approval, and review of password release requests for the Windows Server Accounts on weekdays.
- Access Type: Password Release
-
Scope tab:
- Directory Server Accounts group
-
Requester tab:
- Do not require a Reason.
- Do not require a Comment.
- Select the Allow Requester to Change Duration option.
-
Approver tab:
- Require one person from the Approvers user group to approve a password release request.
-
Reviewer tab:
- Require one person from the Reviewers user group to review a completed password release.
-
Access Config tab:
- Select the Change password after check-in option.
-
Time Restrictions tab:
-
Emergency tab:
- Do not Enable Emergency Access.
Prior to requesting a session, you must create a session request policy that defines the users who are authorized to access an asset or account. As part of this request policy you will also define the protocol (SSH or RDP) to be used as well as the type of account credentials to be specified to access the asset or account.
To write the policies that govern session requests
- As PolicyAdmin navigate to Administrative Tools | Entitlements.
- Select the Sessions Requests entitlement.
- On the Users tab, add the Requesters user group as the user.
- On the Access Request Policies tab, create the following access request policies for the sessions request entitlement:
- Create a policy for SSH sessions:
General tab:
- Policy Name: SSH Session Request Policy
- Description: The rules that define the request, approval, and review of session requests using SSH protocol.
- Access Type: SSH
Scope tab:
- Linux Server Accounts group
Requester tab:
- Select the following reason: SSH Session.
- Require a Reason.
- Require a Comment.
- Select the Allow Requester to Change Duration option.
Approver tab:
- Require one person from the Approvers user group to approve a session request.
Reviewer tab:
- Require one person from the Reviewers user group to review a session release.
Access Config tab:
- Use the default settings (None is selected by default).
Session Settings tab
- Select Record Sessions.
- Select Enable Command Detection.
- Leave the SSH Controls selected:
- Allow SFTP
- Allow SCP
-
Allow X11 Forwarding
Time Restrictions tab:
- Do not set policy time restrictions.
Emergency tab:
- Do not enable emergency access.
- Create a policy for RDP sessions:
General tab:
- Policy Name: RDP Session Request Policy
- Description: The rules that define the request, approval, and review of session requests using RDP protocol.
- Access Type: RDP
Scope tab:
- Windows Server Accounts group.
Requester tab:
- Do not select or require a reason.
- Do not require a comment.
- Select the Allow Requester to Change Duration option.
Approver tab:
Reviewer tab:
- Require one person from the Reviewers user group to review a past session release.
Access Config tab:
Session Settings tab:
- Select Record Sessions.
- Leave the RDP In-Session Controls selected:
Time Restrictions tab:
- Do not set policy time restrictions.
Emergency tab:
- Do not enable emergency access.
- Log out.
Now that you have setup Safeguard for Privileged Passwords, it's time to validate the access request policies you created for password release requests.
This exercise demonstrates the password release workflow from request to approval to review.
Note: If you setup users from your test lab as a Requester, Approver, and Reviewer user, have each of them log in to a web client using a mobile device. If mobile devices are not available, have your users log in to the Safeguard for Privileged Passwords desktop client at their own workstations.
To start the web client
- Open a browser and navigate to https://<Appliance IP Address>.
- Start three instances of the web client, logging in as Joe, Abe, and Ralph, respectively.
Note: Alternatively, you can open three browser windows on a single desktop and display them side-by-side to simulate mobile devices. Log in to each instance as your Requester, Approver, and Reviewer users.
Test: Approve password requests
(web client) Did you receive a notification on your mobile phone? You can approve the request from your mobile device without being logged in to Safeguard for Privileged Passwords. As Abe, the Approver user, click Approvals on the left of the page to complete the approval.
(desktop client) If you'd rather approve it using the desktop client proceed to the steps below.
As Abe, the Approver user, perform the following steps.
NOTE: Notice Abe has an additional authentication step to take in order to log in to Safeguard for Privileged Passwords. In addition, since you have set up Approval Anywhere, you can use the Starling 2FA app on your mobile phone to complete the login process.
- Open Approvals and review the requests waiting for your approval.
-
Select Approve/Deny to approve Joe's password requests.
Test: The password and check it in
As Joe, perform the following steps.
-
Once the password becomes Available, open the requests and select Show Password to see the password on your screen.
Make note of the password so that you can verify that Safeguard for Privileged Passwords changes it after you use it.
- Select Copy.
- Using the password in your copy buffer, log in to the test server.
- Log out of the test server and return to the Safeguard for Privileged Passwords desktop.
- Select Check-In to complete the password checkout process for the password requests.
Test: Review a password release
As Ralph, the Reviewer, use the web client or desktop client:
(web client)
- Click Reviews. Select the request.
- Enter a comment.
- Click to mark the selected request as reviewed.
(desktop client)
- Open Reviews and review the requests that are waiting for your review.
- Select Workflow to view the transactions that took place as part of the request.
- Select Review to enter a comment and complete the review process.
Test: Request emergency access
As Joe, perform the following steps.
- Request the password for the Linux asset again, this time use the Emergency Access option.
- Notice that the password becomes immediately available. That is because Emergency access bypasses the approval.
- Once the password becomes Available, open the password request and select Show Password.
- Is the password different this time? When the Change Password After Release option is selected in the policy, Safeguard for Privileged Passwords automatically changes the password after each use.
- Copy the password so you can use it to manually log in to the remote asset/account.
- After you have successfully logged in to the remote asset/account, log out of the test server and return to the Safeguard for Privileged Passwords desktop.
- Select Check-In.
Test: Review a password release
- As Ralph, perform the following:
TIP: If one requester checks in the request and another requester wants to use it, the second requester is unable to check out the password until the original request has been reviewed. However, the Security Policy Administrator (PolicyAdmin) can Close a request that has not yet been reviewed. This will bypass the reviewer in the workflow and allow the account to be accessed by another requester.