Chat now with support
Chat with Support

One Identity Safeguard for Privileged Sessions 5.8.0 - Administration Guide

Preface Introduction The concepts of SPS The Welcome Wizard and the first login Basic settings User management and access control Managing SPS
Controlling SPS: reboot, shutdown Managing Safeguard for Privileged Sessions clusters Managing a high availability SPS cluster Upgrading SPS Managing the SPS license Accessing the SPS console Sealed mode Out-of-band management of SPS Managing the certificates used on SPS
General connection settings HTTP-specific settings ICA-specific settings RDP-specific settings SSH-specific settings Telnet-specific settings VMware Horizon View connections VNC-specific settings Indexing audit trails Using the Search (classic) interface Using the Search interface Searching session data on a central node in a cluster Advanced authentication and authorization techniques Reports The SPS RPC API The SPS REST API SPS scenarios Troubleshooting SPS Configuring external devices Using SCP with agent-forwarding Security checklist for configuring SPS Jumplists for in-product help Third-party contributions About us

Kerberos authentication settings

Purpose:

To perform authentication with Kerberos, complete the following steps:

NOTE:

If Kerberos authentication has been configured for the connection, it is not possible to fall back to other authentication methods.

Prerequisites:

Before configuring Kerberos authentication on SPS, make sure you have configured your Kerberos environment correctly and have retrieved the keytab file. For details, see Configuring your Kerberos environment.

Steps:
  1. Navigate to SSH Control > Authentication Policies.

  2. Create a new Authentication Policy and enable GSSAPI-based single sign-on. This will disable all other authentication methods. Click Commit.

  3. Navigate to SSH Control > Global Options > GSSAPI.

  4. Browse for the Kerberos keytab file, and click Upload. The uploaded principals are displayed in Currently uploaded principals.

  5. Optional step: If more than one realm is deployed on your network, you have to specify the mapping from the server's DNS domain name to the name of its realm. To map hostnames onto Kerberos realms, click .

  6. Navigate to SSH Control > Connections and configure the SSH connection as follows. For details on configuring connections in general, see Configuring connections.

    1. Select Use fixed address or Inband destination selection as Target.

    2. Select the Kerberos Authentication policy.

    NOTE:

    Usermapping policies cannot be used with Kerberos Authentication policy.

Server host keys and certificates

The host keys and X.509 certificates of the trusted servers can be managed on the SSH Control > Server Host Keys page. When a client tries to connect to a server, SPS verifies the host key or the certificate of the server. SPS allows connections only to the servers listed on this page, unless the Accept key for the first time or the Accept certificate for the first time option is enabled in the connection policy.

  • To display the stored host keys of a host, enter its IP address into Host IP address field and click Search. Note that the search requires the exact IP address, and does not support wildcard characters.

    You can use IPv4 and IPv6 addresses as well.

  • To display the list of stored host keys, click Show All. Note that this function does not work if there are more than 250 hosts in the database. In this case, use Generate CSV instead.

  • To export the entire list into as a comma-separated list, click Generate CSV.

Figure 184: SSH Control > Server Host Keys — Server host keys

Automatically adding the host keys and host certificates of a server to SPS

Purpose:

The host keys and host certificates of the servers can be added either automatically or manually. To add the host key or certificates automatically, complete the following steps:

Steps:
  1. Navigate to the SSH Control > Connections.

  2. Configure a connection: fill the From, To, and Port fields.

    You can use IPv4 and IPv6 addresses as well.

    • To configure a transparent connection, enter the IP address of the server into the To field.

    • To configure a non-transparent connection, enter the IP address of SPS into the To field, and the address of the target server into the Target field.

  3. Click to display the advanced settings and verify that the Server side hostkey settings > Plain host key check option is set to Accept key for the first time.

    If the servers use X.509 certificates, select Allow X.509 host certificates, and verify that the X.509 host certificate check option is set to Accept certificate for the first time.

    Click Commit.

  4. Initiate an SSH connection from the client to the server. SPS will automatically record the host key of the server — the server's IP address and the host key will be listed on the SSH Control > Server Host Keys page.

Manually adding the host key or host certificate of a server

Purpose:

To add the host key or host certificate manually, complete the following steps:

NOTE:

One Identity recommends using 2048-bit RSA keys (or stronger).

Steps:
  1. Navigate to the SSH Control > Server Host Keys and click .

  2. Enter the IP address and port of the server into the Address and Port fields.

    You can use IPv4 and IPv6 addresses as well.

  3. To set the host key of the server, complete the following steps:

      • To add the RSA fingerprint of the server, click in the Public key (RSA) field.

      • To add the DSA fingerprint of the server, click in the Public key (DSA) field.

      A pop-up window is displayed.

    1. Figure 185: SSH Control > Server Host Keys — Uploading server host keys

      • Select Query to retrieve the host key from the server.

      • To upload the host key manually, select Browse, select the file, and click Upload. Optionally, you can also paste the key into the Copy-paste key section and select Upload.

        Close the window.

  4. To set the host certificates of the server, complete the following steps:

      • To add the RSA certificate of the server, click in the X.509 certificate (RSA) field.

      • To add the DSA certificate of the server, click in the X.509 certificate (DSA) field.

      A pop-up window is displayed.

    1. To upload the host key manually, select Browse, select the file, and click Upload. Optionally, you can also paste the key into the Copy-paste key section and select Upload.

      Close the window.

  5. Click Commit.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating