The following describes how to create a local user.
NOTE: The admin user is available by default and has all possible privileges. It is not possible to delete this user.
Local users cannot be managed when LDAP authentication is used (see Managing One Identity Safeguard for Privileged Sessions (SPS) users from an LDAP database). When LDAP authentication is enabled, the accounts of local users is disabled, they are not displayed on the Users & Access Control > Local Users page, but they are not deleted, either.
When using RADIUS authentication together with local users, the users are authenticated to the RADIUS server, only their group memberships must be managed locally on One Identity Safeguard for Privileged Sessions (SPS). For details, see Authenticating users to a RADIUS server.
To create a local user
Navigate to Users & Access Control > Local Users and click .
Figure 83: Users & Access Control > Local Users — Creating local users
Enter the username into the User field.
NOTE: For the username of SSH users, only valid UTF-8 strings are allowed.
The following characters cannot be used in usernames: <>\/[]:;|=,+*?
Enter a password for the user into the Password and Verify password fields.
The strength of the password is indicated below the Password field as you type. To set a policy for password strength, see Setting password policies for local users. The user can change the password later from the SPS web interface, and you can modify the password of the user here.
Use strong passwords: at least 8 characters that include numbers, letters, special characters, and capital letters. For local One Identity Safeguard for Privileged Sessions (SPS) users, require the use of strong passwords (set Users & Access Control > Settings > Minimal password strength to strong). For details, see "Setting password policies for local users" in the Administration Guide.
NOTE: One Identity Safeguard for Privileged Sessions (SPS) accepts passwords that are not longer than 150 characters. Letters A-Z, a-z, numbers 0-9, the space character, as well as the following special characters can be used: !"#$%&'()*+,-./:;<>=?@[]\^-`{}_|
NOTE: If possible, use a random password generator.
To create a strong password:
Use special characters
Use long passwords
Mix uppercase and lowercase letters
For strong passwords, do not use:
Personal information in the passwords
Sequential letters or numbers
The word password as the password
Keyboard paths (for example, qwerty)
Click in the Groups section and select a group that the user will be member of. Repeat this step to add the user to multiple groups.
If you wish to modify the group membership of a local user later on, you can do that here.
To remove a user from a group, click next to the group.
Click .
The following describes how to delete a local user from One Identity Safeguard for Privileged Sessions (SPS).
To delete a local user from SPS
Navigate to Users & Access Control > Local Users.
Find the user you wish to delete.
Click next to the user, at the right edge of the screen.
Click .
One Identity Safeguard for Privileged Sessions (SPS) can use password policies to enforce the use of password history, minimal password strength, password length, and password expiry.
Password policies apply only to locally managed users, and have no effect if you manage your users from an LDAP database, or if you authenticate your users to a RADIUS server.
NOTE: One Identity Safeguard for Privileged Sessions (SPS) accepts passwords that are not longer than 150 characters. Letters A-Z, a-z, numbers 0-9, the space character, as well as the following special characters can be used: !"#$%&'()*+,-./:;<>=?@[]\^-`{}_|
To create a password policy
Navigate to Users & Access Control > Settings.
Figure 84: Users & Access Control > Settings — Configuring password policies
Set the Authentication method to Password provided by database and the User database to Local.
NOTE: If the setting of these fields is different (for example LDAP or RADIUS), then SPS is not configured to manage passwords locally.
Set how long the passwords are valid in the Password expiration field. After the configured period, SPS users have to change their password. To disable this option, set the value to 0. The acceptable values are 0-365.
Number of passwords to remember: use this option to prevent using the same password again for the configured number of password changes. For example, if the value is set to 10, the users have to use 10 different passwords consecutively until the first password can be used again. The acceptable values are 0-32. To disable this option, set the value to 0.
Set the required password complexity level in Minimal password strength. The possible values are disabled, good, and strong.
NOTE: The strength of the password is determined by its entropy: the variety of numbers, letters, capital letters, and special characters used, not only by its length.
To execute some simple dictionary-based attacks to find weak passwords, set Cracklib (eg. dictionary) check on password to Enabled.
Click .
NOTE: Changes to the password policy do not affect existing passwords. However, setting password expiry will require every user to change their passwords after the expiry date, and the new passwords must comply with the strength requirements set in the password policy.
You can use local groups to control the privileges of One Identity Safeguard for Privileged Sessions (SPS) local users — who can view and configure what.
For the description of built-in groups, see Built-in usergroups of One Identity Safeguard for Privileged Sessions (SPS).
Use the Users & Access Control > Local User Groups page to:
Create a new user group.
Display which users belong to a particular local user group.
Edit group memberships.
To create a new group,
Navigate to Users & Access Control > Local User Groups and click .
Figure 85: Users & Access Control > Local User Groups — Group management
Enter a name for the group.
Enter the names of the users belonging to the group. Click to add more users.
Click .
Once you have added your user groups, the next step is to start assigning privileges to them. For details on how to do that, see Assigning privileges to user groups for the One Identity Safeguard for Privileged Sessions (SPS) web interface.
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy