This document describes how you can use the services of RSA SecurID Access to authenticate the sessions of your privileged users with One Identity Safeguard for Privileged Sessions (Safeguard for Privileged Sessions).
One Identity Safeguard for Privileged Sessions (Safeguard for Privileged Sessions) controls privileged access to remote IT systems, records activities in searchable, movie-like audit trails, and prevents malicious actions. Safeguard for Privileged Sessions is a quickly deployable enterprise device, completely independent from clients and servers — integrating seamlessly into existing networks. It captures the activity data necessary for user profiling and enables full user session drill down for forensic investigations.
Safeguard for Privileged Sessions acts as a central authentication gateway, enforcing strong authentication before users access sensitive IT assets. Safeguard for Privileged Sessions can integrate with remote user directories to resolve the group memberships of users who access nonpublic information. Credentials for accessing information systems can be retrieved transparently from Safeguard for Privileged Sessions's local credential store or a third-party password management system. This method protects the confidentiality of passwords as users can never access them. When used together with RSA (or another multi-factor authentication provider), Safeguard for Privileged Sessions directs all connections to the authentication tool, and upon successful authentication, it permits the user to access the information system.
Safeguard for Privileged Sessions can interact with your RSA Authentication Manager and can automatically request strong multi-factor authentication for your privileged users who are accessing the servers and services protected by PSM. When used together with RSA SecurID Access, Safeguard for Privileged Sessions prompts the user for a second factor authentication, and upon successful authentication, it permits the user to access the information system.
The integration adds an additional security layer to the gateway authentication performed on Safeguard for Privileged Sessions. If the user has a RSA SecurID Hardware Token, the user can generate a one-time password using the device. This will be used for the authentication to the One Identity platform. The one-time password is changed after 60 seconds.
ISO 27001, ISO 27018, SOC 2, and other regulations and industry standards include authentication-related requirements, for example, multi-factor authentication (MFA) for accessing production systems, and the logging of all administrative sessions. In addition to other requirements, using Safeguard for Privileged Sessions and RSA helps you comply with the following requirements:
PCI DSS 8.3: Secure all individual non-console administrative access and all remote access to the cardholder data environment (CDE) using multi-factor authentication.
PART 500.12 Multi-Factor Authentication: Covered entities are required to apply multi-factor authentication for:
Each individual accessing the covered entity’s internal systems.
Authorized access to database servers that allow access to nonpublic information.
Third parties accessing nonpublic information.
NIST 800-53 IA-2, Identification and Authentication, network access to privileged accounts: The information system implements multi-factor authentication for network access to privileged accounts.
Figure 1: How Safeguard for Privileged Sessions and RSA work together
A user attempts to log in to a protected server.
Safeguard for Privileged Sessions receives the connection request and authenticates the user. Safeguard for Privileged Sessions can authenticate the user to a number of external user directories, for example, LDAP, Microsoft Active Directory, or RADIUS. This authentication is the first factor.
If gateway authentication is successful, Safeguard for Privileged Sessions connects the RSA Authentication Manager. Then Safeguard for Privileged Sessions requests the second authentication factor from the user and sends it to the RSA server for verification.
If multi-factor authentication is successful, the user can start working, while Safeguard for Privileged Sessions records the user's activities. (Optionally, Safeguard for Privileged Sessions can retrieve credentials from a local or external credential store or password vault, and perform authentication on the server with credentials that are not known to the user.)
In order to successfully connect Safeguard for Privileged Sessions with RSA, you need the following components.
An RSA Authentication Manager deployed.
RADIUS access parameters, for example, host, port, and an RSA shared secret. You will need it to configure the Safeguard for Privileged Sessions plugin.
Your users must be enrolled in RSA Authentication Manager.
The users must be able to perform the authentication required for the fasctor (for example, possess the required RSA SecurID Hardware Token).
A One Identity Safeguard for Privileged Sessions appliance (virtual or physical), at least version 5 F1.
A copy of the Safeguard for Privileged Sessions RSA plugin. This plugin is an Authentication and Authorization (AA) plugin customized to work with the RSA multi-factor authentication service.
Safeguard for Privileged Sessions must be able to access the RADIUS port of the RSA Authentication Manager.
Safeguard for Privileged Sessions supports Authentication and Authorization plugins in the RDP, SSH, and Telnet protocols.
In RDP, using an AA plugin together with Network Level Authentication in a Connection Policy has the same limitations as using Network Level Authentication without domain membership. For details, see "Network Level Authentication without domain membership" in the Administration Guide.
In RDP, using an AA plugin requires TLS-encrypted RDP connections. For details, see "Enabling TLS-encryption for RDP connections" in the Administration Guide.
The Safeguard for Privileged Sessions RSA plugin is available as-is, free of charge to every Safeguard for Privileged Sessions customer from the Plugin Page. In case you need any customizations or additional features, contact email@example.com.
You can use the plugin on Safeguard for Privileged Sessions 5 F5 and later. If you need to use the plugin on Safeguard for Privileged Sessions 5 LTS, contact firstname.lastname@example.org.
To find out more about Safeguard for Privileged Sessions, visit the One Identity page.
For a detailed tutorial about how to connect your RSA account with Safeguard for Privileged Sessions, see RSA Multi-Factor Authentication - Tutorial.