Navigate to Administrative Tools | Entitlements | (add or edit entitlement) | General tab
On the General tab, specify the following information about the entitlement.
Table 103: Entitlement: General tab properties
Name |
Enter a unique name for the entitlement.
Limit: 50 characters |
Description |
Enter descriptive text about the entitlement.
Limit: 255 characters |
Priority |
The priority of this entitlement compared to other entitlements.
If a user desires to access an account in the scope of two different entitlements, then the entitlement with the highest priority (that is, the lowest number) takes precedence. For more information, see About priority precedence. |
An entitlement defines which users are authorized to check out passwords for accounts in the scope of the account's policies. A policy defines scope (that is, which accounts) and the rules for checking out passwords, such as the duration, how many approvals are required, and so on.
It is possible for an account to be governed by more than one entitlement, or is in the scope of more than one policy within an entitlement. Safeguard for Privileged Passwords uses both entitlement and policy priorities to determine which policy to use for a password release. Safeguard for Privileged Passwords first considers the entitlement priority, then the priorities of access request policies within that entitlement.
Example scenario:
- Entitlement A (priority 1)
- Policy: Week Day Policy.
- Policy time restrictions: Monday through Friday 8:00 a.m. to 5:00 p.m.
- Scope: AccountX
- Entitlement B (priority 2)
- Policy 1: Sunday AM (priority 1)
- Policy time restrictions: Sunday 8:00 to 12:00.
- Scope: AccountX
- Policy 2: Sunday PM (priority 2)
- Policy time restrictions: Sunday 13:00 to 17:00.
- Scope: AccountX
Notice that AccountX is in the scope of all three of these policies.
If a user requests the password for AccountX for Sunday at 4 p.m., Safeguard for Privileged Passwords first considers Entitlement A because it is priority 1. When it determines that the policy time restrictions prevent the password release, it then considers Entitlement B.
Safeguard for Privileged Passwords first considers Entitlement B's priority 1 policy. When it determines that the time restrictions prevent the password release, it then considers Policy 2. Once the request is satisfied, Safeguard for Privileged Passwords grants the request.
To change an entitlement's priority
- Select the priority number in the entitlement list.
- Enter another number.
To modify a policy's priority
- In Entitlements, select an entitlement and switch to the Access Request Policies tab.
- Double-click a policy, or select a policy and click
Edit Access Policy.
- Enter or select a new priority number.
- Click the Refresh button.
Time restrictions control when the entitlement is in effect relative to the user's time zone.
An entitlement's time restrictions enforce when Safeguard for Privileged Passwords uses a policy. A policy's time restrictions enforce when a user can access the account passwords. If the entitlement and the policy both have time restrictions, the user can only check out the password for the overlapping time frame.
Time restrictions control when the entitlement or policy is in effect relative to a user's time zone. Although Safeguard for Privileged Passwords Appliances run on Coordinated Universal Time (UTC), the user's time zone enforces the time restrictions set in the entitlement or policy. This means that if the appliance and the user are in different time zones, Safeguard for Privileged Passwords enforces the policy in the user's time zone set in their account profile.
User can change their time zone, by default. Or, the User Administrator can prohibit a user from changing the time zone, possibly to ensure adherence to policy. For more information, see Time Zone.
Navigate to Administrative Tools | Entitlements | (add or edit entitlement) | Time Restrictions tab.
Table 104: Entitlement: Time Restrictions tab properties
Use Time Windows |
Select this option to enforce time windows. |
Daily calendar |
Select and drag to highlight the hours you want to allow. Colored tiles are blocked times. Clear are available times. |
Have the Entitlement Expire on Date and Time |
Select this option to enforce an expiration date, then enter the date and time.
When an entitlement expires, all the access request policies associated with the entitlement also expire. To set an expiration date on a policy, see Creating an access request policy. |
It is the responsibility of the Security Policy Administrator to define access request policies in Safeguard for Privileged Passwords.
A policy defines:
- The scope, which may be assets, asset groups, accounts, or account groups.
- The access type, which may be a:
-
Credential access type:
-
Session access type:
- RDP (Remote Desktop Protocol)
- SSH (Secure SHell)
- Telnet
- The rules for checking out passwords, such as the duration, how many approvals are required, and so on.
Considerations
- An access request policy is only assigned to one cluster.
- An access request policy is only used in the entitlement in which it is created. If you delete an entitlement, all access request policies associated with that entitlement are deleted. You cannot copy an access request policy and add it to another entitlement; access request policies are entitlement-specific.
To add an access request policy to an entitlement
- Navigate to Administrative Tools | Entitlements.
- In Entitlements, select an entitlement from the object list and open the Access Request Policies tab.
- Click
Create Access Policy from the details toolbar.
- In the Access Request Policy dialog, provide information in each of the tabs:
General tab |
Where you add general information about the access request policy as well as specify the type of access being requested |
Scope tab |
Where you assign assets, asset groups, accounts, or account groups to an access request policy |
Requester tab |
Where you configure the access request policy requester settings |
Approver tab |
Where you configure the access request policy approver settings |
Reviewer tab |
Where you configure the access request policy reviewer settings |
Access Config tab |
Where you define the access settings for the selected type of request including allowing users to request passwords from their respective linked accounts |
Session Settings tab |
Where you configure the recording settings for session access requests |
Time Restrictions tab |
Where you indicate policy time restrictions |
Emergency tab |
Where you enable emergency access for the accounts governed by the access request policy |