SPS version 3.2 and later provides an interface to query the user-rights and privileges of individual users and user groups. To display the privileges of a user or usergroup, navigate to AAA > Permission Query, enter the name of the user or group into the respective field, then click Filter. Note that:
It is not possible to filter on both the username and the group at the same time.
Partial matches are also displayed.
Usergroups can be local usergroups, userlists, or LDAP usergroups.
For usergroups accessing the SPS web interface, a table is displayed that lists the pages of the SPS web interface that the user or usergroup can access. The following information is displayed:
Page: The name of the page or group of pages, for example, Basic Settings.
Element: If a group has access only to a section of a page, the name of the element is listed here. For example, a particular Channel Policy.
Group: The name of the usergroup.
Permission: The type of access that the user or usergroup has to the page: read or read and write/perform.
Figure 79: AAA > Permission Query — Displaying web interface permissions
To review which servers a user or usergroup can access, SPS collects the main information about the connections the user or group is permitted to use. The following information is displayed.
To display the usergroups that can access a specific Connection Policy, open the Connection Policy, then select Show connection permissions > Show on the Connections page.
Figure 80: AAA > Connection permissions — Displaying connection permissions
Gateway group: Lists the group memberships required to access the connection. Group memberships can be restricted at the following places:
Connection > Gateway authentication > Groups
Channel Policies > Gateway group
Policies > Usermapping Policies > Groups
Source IP: The IP address of the client.
Destination IP: The IP address of the server as requested by the client.
Destination port: The port number of the server as requested by the client.
Server IP: The IP address of the server connected by SPS.
Server port: The port number of the server connected by SPS.
Username on server: The username used to log in to the remote server. This username can differ from the client-side username if usermapping is used in the connection. For details on usermapping, see Configuring usermapping policies.
Remote group: The group that can access the destination server, as set in the Usermapping Policy (if any).
Protocol: The protocol used in the connection (Citrix ICA, HTTP, RDP, SSH, Telnet, or VNC).
Connection policy ID: The identifier of the connection policy.
Four-eyes authorizer: The username of the user who authorized the session. Available only if 4-eyes authorization is required for the channel. For details on 4-eyes authorization, see Configuring four-eyes authorization.
Auth type: The authentication method used in the client-side connection during gateway authentication.
Channel: The type of the channel, for example, session-shell.
Time: The name of the Time Policy used in the connection.
LDAP: The name of the LDAP Server used in the connection (if any).
Credential store: The name of the Credential Store used in the connection (if any).
Audit: Indicates if the connection is recorded into audit trails.
When searching for users, the table displays the group memberships of the matching users. When searching for usergroups, the table displays the members of the matching groups. The following information is displayed:
User: The username of the user.
Group: The name of the usergroup or userlist.
Exception: Usernames that are denied in case of default-deny userlists managed locally on SPS.
Figure 81: AAA > Connection permissions — Displaying usergroup and userlist memberships
The following sections explain the basic management tasks of SPS.
For basic management tasks (reboot and shutdown, disabling traffic), see Managing SPS.
For managing a high availability cluster, see Managing a high availability SPS cluster.
For instructions on upgrading SPS, see Upgrading SPS.
For instructions on accessing SPS through console and SSH, see Accessing the SPS console.
For enabling sealed mode (which disables basic configuration changes from a remote host), see Sealed mode.
For information on configuring the out-of-band (IPMI) interface, see Out-of-band management of SPS.
For managing certificates used on SPS, see Managing the certificates used on SPS.
To reboot or shut down SPS, navigate to Basic Settings > System > System control > This node and click the respective action button. The Other node refers to the slave node of a high availability SPS cluster. For details on high availability clusters, see Managing a high availability SPS cluster.
Figure 82: Basic Settings > System > System Control — Performing basic management
Web sessions to the SPS interface are persistent and remain open after rebooting SPS, so you do not have to relogin after a reboot.
During the reboot process, SPS displays information about the progress of the reboot and any possible problems in the following places:
On the web interface of SPS, at any of the Listening addresses configured at Basic settings > Local Services > Web login (admin and user). (After booting, you are directed to the login screen of SPS.)
On the console, which you can monitor with IPMI (ILOM) or console access.
The information displayed in the browser and on the console is the same.
To temporarily disable some or all of the controlled traffic to the protected servers, complete the following steps:
Figure 83: Basic Settings > System > Traffic control — Disabling the controlled traffic
Disabling traffic that way is only temporary. Connections will be enabled again after committing any other change from the SPS web interface. For details on how to permanently disable a type of traffic, see Disabling controlled traffic permanently.
Disabling the traffic affects only the traffic configured in the Connection policies, other traffic can pass SPS even if the all traffic is disabled. For details on configuring Connection policies, see General connection settings.
Navigate to the Basic Settings > System > Traffic control.
To disable SSH traffic, click Stop in the SSH traffic field. Note that this also stops all other traffic forwarded in SSH, for example X11.
To disable RDP traffic, click Stop in the RDP traffic field.
To disable Telnet and TN3270 traffic, click Stop in the Telnet traffic field.
To disable VNC traffic, click Stop in the VNC traffic field.
To disable all types of traffic, click Stop in the All services field.
The System monitor displays the status of all types of traffic.