Chat now with support
Chat with Support

One Identity Safeguard for Privileged Passwords 7.0.4.1 LTS - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Enable or Disable Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions About us

Configuring and launching a Remote Desktop Application session

In order to launch a remote desktop application session request, some additional configuration is required.

To configure and launch a remote desktop application

  1. Install and configure Safeguard for Privileged Sessions's RemoteApp launcher available starting with 6.12. For more information, see One Identity Safeguard for Privileged Sessions Administration Guide.

  2. Publish the OISGRemoteAppLauncher application following Microsoft's instructions. All remote applications that will be launched using SPP/SPS need to be configured to launch with the OISGRemoteAppLauncher and include a command line which references the intended remote application. Take note of the RemoteApp Program Name and Alias since they will be needed when configuring the access request policy.

  3. On Asset Management > Assets, you need the following assets (for more information, see Adding an asset):

    1. Windows Server asset: This asset will be used to connect with a Windows Application Server.

    2. Other/Other Managed asset: This asset (of either platform type) is used to connect with the remote application. It requires the following settings:

      • Network Address: None

      • Authentication Type: None

      • An account from the remote application added to the Accounts tab.

  4. On Security Policy Management > Entitlements, you will need an entitlement containing a Remote Desktop Application access request policy. For more information, see Creating an access request policy.

  5. Within Safeguard for Privileged Sessions, a channel policy needs to be modified or created to include the following attributes. This channel policy will also need to be referenced from an RDP connection policy. For more information, see One Identity Safeguard for Privileged Sessions Administration Guide.

    1. In RDP Control > Connections, set the Channel policy to applications.

    2. In RDP Control > Channel Policies, create the following:

      1. Dynamic virtual channel: No configured settings.

      2. Custom: Add the following to Permitted channels:

        • rail

        • rail_ri

        • rail_wi

Once a remote desktop application session request becomes available, the requester can launch the remote desktop connection to start the session.

To launch a remote desktop application connection

In the web client: Click the Start RDP Session button associated with the asset.

NOTE: The Start RDP Session option is available only if enabled by user preferences and if you have installed Session Client Application Launch Uri System (for more information, see SCALUS).

NOTE: A black window may appear on the screen as the launcher loads the remote desktop application session.

Reviewing a session request

The Security Policy Administrator can configure an access request policy to require a review of completed session requests for assets or accounts in the scope of the policy.

NOTE: You can configure Safeguard for Privileged Passwords to notify you of an access request that requires your review. For more information, see Configuring alerts.

Desktop Player User Guide

To download the player user guide, go to One Identity Safeguard for Privileged Sessions - Technical Documentation. Scroll to User Guide and click One Identity Safeguard for Privileged Sessions [version] Safeguard Desktop Player User Guide.

To review a completed sessions request

Select Reviews on the left of the page to manage reviews. On the Reviews page, you can:

  • View details by selecting a request then looking at the details display on the right of the page, including the workflow.
  • Mark one or more request as reviewed: Select the requests. Do the following:
    • If no comment is needed, click Mark all the selected requests as reviewed.
    • If a comment is needed, this icon will display as One or more of the selected requests requires review comments. Add the comment. Then, click Mark as Reviewed.
  • Change the columns that display: Click Select columns to display then select the columns you want to see.
    • Action: Displays This request requires review comments or Mark only this request as reviewed.
    • Requester: Displays the user name of the requester.
    • Access Type: Displays the type of access (for example, Password, SSH Key, RDP, RDP Application, SSH, or Telnet).
    • Account: Displays the managed account name.
    • Ticket Number: Displays the ticket number, if required.
    • Request For/Duration: Displays the date and time as well as the window of availability (for example, March 20, 2021 9:56 AM 2 hours).
  • Search: For more information, see Search box.

Appliance Management

In the web client, expand the Appliance Management section in the left navigation pane. Settings are available to Appliance Administrators, Operations Administrators, and the Bootstrap Administrator (Auditors have read-only access).

The following pages are available. See each section for a description of the functions available.

Topics:

Appliance

Use the Appliance settings to view general information about the appliance, run diagnostic tools, and reset or update the Safeguard for Privileged Passwords hardware appliance.

Safeguard for Privileged Passwords can be set up to use a virtual appliance. For more information, see Using the virtual appliance and web management console.

web client: Navigate to Appliance Management > Appliance.

Safeguard for Privileged Passwordsprovides the following information to help you resolve many common problems you may encounter as you deploy and use your appliance.

Table 16: Appliance settings
Setting Description

Appliance Diagnostics

Where you execute a trusted, secure diagnostics package to help solve a configuration issue, synchronization issue, clustering issue, or other internal issues.

Appliance Information

Where you view general information about the appliance, as well as its performance utilization and the memory usage. You can also edit the Appliance Name and Host DNS Suffix.

Debug

Where you enable or disable debug logging to a syslog server.

Licensing settings

Where you add or update a Safeguard for Privileged Passwords license.

Network Diagnostics

Where you run diagnostic tests on your appliance.

Networking Where you view and configure the primary network interface, and if applicable, the sessions network interface.
Operating System Licensing

Available on virtual machine only. Not available on hardware.

Where you configure the operating system for the virtual appliance.

Patch Updates

Where you upload and install a patch update file.

Power

Where you shut down or restart your appliance in the web client.

SSH Algorithms

Where you configure SSH Algorithms to manage account passwords and SSH keys.

Support bundle

Where you create a support bundle containing system and configuration information to send to One Identity Support to analyze and diagnose issues with your appliance.

Time

Where you enable Network Time Protocol (NTP) and set the primary and secondary NTP servers. A replica in the cluster will always reference the primary appliance as its NTP server.

You can also manually set the time on a primary but not a cluster.

CAUTION: Manually setting the time should be done with caution. Time changes can cause critical data loss.

Factory Reset

Available on hardware only. Not available on a virtual machine.

Where you perform a factory reset to revert your appliance to its original state when it first came from the factory.

Lights Out Management (BMC)

Available on hardware only. Not available on a virtual machine.

Where you enable and disable lights out management, which allows you to remotely manage the power state and serial console to Safeguard for Privileged Passwords using the baseboard management controller (BMC).

In addition to the appliance options, Safeguard for Privileged Passwords provides these troubleshooting tools:

Table 17: Additional troubleshooting tools
Tool Description

Activity Center

View the details of specific events or user activity. For more information, see Activity Center.
LCD status messages Use the LCD screen on the appliance to view the status of the appliance as it is starting up or shutting down. For more information, see LCD status messages.
Recovery Kiosk (Serial Kiosk) A terminal or laptop connected directly to the appliance to view basic appliance information, restart the appliance remotely, shut down the appliance, reset the bootstrap administrator’s password to its initial value, perform a factory rest, or to generate and send a support bundle to a Windows share. For more information, see Recovery Kiosk (Serial Kiosk).
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating