Chat now with support
Chat with Support

One Identity Safeguard for Privileged Passwords 6.10 - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Getting started with the desktop client Using the desktop client Search box Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Discovery Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificates settings Cluster settings Enable or Disable Services settings External Integration settings Messaging settings (desktop client) Password Management settings Real-Time Reports Safeguard Access settings SSH Key Management settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP 2.7 or later migration guidance Appendix C: SPP and SPS join guidance Appendix D: Regular Expressions About us

Access Request Policies tab

The Administrative Tools | Entitlements | Access Request Policies tab displays the password and SSH key request policies that govern the accounts in the selected entitlement.

IMPORTANT: The selection made on the Entitlement | Access Request Policy tab takes precedence over the selections on Settings | Cluster | Managed Networks page. If a Managed Networks rule includes nodes from different SPS clusters, SPP will only select the nodes from the same cluster that was assigned on the Session Settings page of the Access Request Policy tab.

Click Create Access Policy from the details toolbar to add a policy to the selected entitlement.

Table 99: Entitlements: Access Request Policies tab properties
Property Description
Priority

A unique number that determines the processing order of the policy. For more information, see How Safeguard for Privileged Passwords evaluates policy when a user submits an access request.

Name

The name of the access request policy.

Access Type

Indicates the type of access requested. Credential access types include:

  • Password Release
  • SSH Key

Session access types include:

  • RDP (Remote Desktop Protocol)
  • SSH (Secure SHell)
  • Telnet
Scope

The number of unique account groups, accounts (including the number of accounts in the specified account groups), asset groups, and assets (including the number of assets in the specified asset groups) governed by the selected policy.

Approvals

A displays if there are approver settings for the access request policy. For more information, see Approver tab.

Reviews

A displays if there are reviewer settings for the access request policy. For more information, see Reviewer tab.

Emergency

A displays if a user can request emergency access to the accounts and assets governed by the policy.

Emergency Access overrides the Approver requirements; that is, when a user requests access using Emergency Access, the request is immediately approved, provided that the other constraints are met, such as the Requester settings. Multiple users are allowed to request emergency access simultaneously for the same account or asset.For more information, see Emergency tab.

Time Restrictions

A displays if time restrictions are specified for access requests for accounts and assets governed by the policy. For more information, see Time Restrictions tab.

Expired

A Warning displays for the entitlement when it contains at least one expired policy. You can configure Safeguard for Privileged Passwords to notify you of an impending entitlement or policy expiration by sending an event notification to a syslog server, in an email message, or a SNMP trap. For more information, see External Integration settings.

Invalid

A Warning displays for the entitlement when it contains at least one invalid policy.

Check the following if there is an invalid policy.

  • Validate that the SPS cluster is still linked to SPP.
  • Validate the SPS cluster is available.
  • Validate there are no network issues that prevent SPP from communicating with SPS.
  • Validate SPP can communicate with the SPS cluster.
  • Validate that the assigned session connection policy is on the SPS cluster master.
  • Validate the session connection policy is still compatible with SPP given what the administrator changed.

For more information, see Managed Networks.

Description

Information about the selected policy.

Use these buttons on the details toolbar to manage your access request policies.

Table 100: Entitlements: Access Request Policies tab toolbar
Option Description

Create Access Policy

Add an access request policy to the selected entitlement. For more information, see Creating an access request policy.

Delete Selected

Remove the selected policy from the selected entitlement. For more information, see Deleting an access request policy.

Refresh

Update the list of access request policies.

Edit Access Policy

Modify the selected policy. For more information, see Modifying an access request policy.

Copy Access Policy

Make a copy of the selected policy. For more information, see Copying an access request policy.

Details

View additional details about the selected policy. For more information, see Viewing and editing policy details.

Search (case insensitive)

To locate a specific policy or set of policies in this list, enter the character string to be used to search for a match. For more information, see Search box.

History tab

The Administrative Tools | Entitlements | History tab allows you to view or export the details of each operation that has affected the selected entitlement.

The top of the History tab contains the following information:

  • Items: Total number of entries in the history log.
  • Refresh: Update the list displayed.
  • Export: Export the data to a .csv file.
  • Search: For more information, see Search box.

  • Time Frame: By default, the history details are displayed for the last 24 hours. Click one of the time intervals at the top of the grid to display history details for a different time frame. If the display does not refresh after selecting a different time interval, click Refresh.
Table 101: Entitlements: History tab properties
Property Description
Date/Time The date and time of the event.
User The display name of the user that triggered the event.
Source IP The network DNS name or IP address of the managed system that triggered the event.
Object Name The name of the selected entitlement.
Event

The type of operation made to the selected entitlement:

  • Create
  • Delete
  • Update
  • Add Membership
  • Remove Membership

NOTE: A membership operation indicates a relationship change with a related or parent object such as a user or user group was added or removed from the membership of an entitlement.

Related Object The name of the related object.
Related Object Type The type of the related object.
Parent The name of the object to which the selected entitlement is a child.
Parent Object Type The parent object type.

For some types of events, you can select an event to display this additional information (for example, create and update events).

Table 102: Additional History tab properties
Property Description
Property The property that was updated.
Old Value The value of the property before it was updated.
New Value The new value of the property.

Managing entitlements

Use the controls and tabbed pages on the Entitlements page to perform the following tasks to manage Safeguard for Privileged Passwords entitlements:

Adding an entitlement

It is the responsibility of the Security Policy Administrator to add entitlements to Safeguard for Privileged Passwords.

To add an entitlement

  1. Navigate to Administrative Tools | Entitlements.
  2. Click  Add Entitlement from the toolbar.
  3. In the Entitlement dialog, provide information in each of the tabs:

    General tab

    Where you add general information about the entitlement.

    Time Restrictions tab

    Where you indicate entitlement time restrictions.

Related Topics

How Safeguard for Privileged Passwords evaluates policy when a user submits an access request

Adding users or user groups to an entitlement

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating