Chat now with support
Chat with Support

One Identity Safeguard for Privileged Sessions 8.0 LTS - Administration Guide

Preface Introduction The concepts of One Identity Safeguard for Privileged Sessions (SPS)
The philosophy of One Identity Safeguard for Privileged Sessions (SPS) Policies Credential Stores Plugin framework Indexing Supported protocols and client applications Modes of operation Connecting to a server through One Identity Safeguard for Privileged Sessions (SPS) Archive and backup concepts Maximizing the scope of auditing IPv6 in One Identity Safeguard for Privileged Sessions (SPS) SSH host keys Authenticating clients using public-key authentication in SSH The gateway authentication process Four-eyes authorization Network interfaces High Availability support in One Identity Safeguard for Privileged Sessions (SPS) Versions and releases of One Identity Safeguard for Privileged Sessions (SPS) Accessing and configuring One Identity Safeguard for Privileged Sessions (SPS)
Cloud deployment considerations The Welcome Wizard and the first login Basic settings
Supported web browsers The structure of the web interface Network settings Configuring date and time System logging, SNMP and e-mail alerts Configuring system monitoring on SPS Data and configuration backups Archiving Cleaning up audit data Using plugins Forwarding data to third-party systems Starling integration
User management and access control
Login settings Managing One Identity Safeguard for Privileged Sessions (SPS) users locally Setting password policies for local users Managing local user groups Managing One Identity Safeguard for Privileged Sessions (SPS) users from an LDAP database Handling user names in User Principal Name (UPN) format Authenticating users to a RADIUS server Authenticating users with X.509 certificates Authenticating users with SAML2 Managing user rights and user groups Creating rules for restricting access to search audit data Displaying the privileges of users and user groups Listing and searching configuration changes
Managing One Identity Safeguard for Privileged Sessions (SPS)
Controlling One Identity Safeguard for Privileged Sessions (SPS): reboot, shutdown Managing One Identity Safeguard for Privileged Sessions (SPS) clusters Managing a High Availability One Identity Safeguard for Privileged Sessions (SPS) cluster Upgrading One Identity Safeguard for Privileged Sessions (SPS) Managing the One Identity Safeguard for Privileged Sessions (SPS) license Accessing the One Identity Safeguard for Privileged Sessions (SPS) console Sealed mode Out-of-band management of One Identity Safeguard for Privileged Sessions (SPS) Managing the certificates used on One Identity Safeguard for Privileged Sessions (SPS)
General connection settings HTTP-specific settings ICA-specific settings MSSQL-specific settings RDP-specific settings SSH-specific settings Using Sudo with SPS Telnet-specific settings VMware Horizon View connections VNC-specific settings Indexing audit trails Using the Sessions interface Advanced authentication and authorization techniques Reports The One Identity Safeguard for Privileged Sessions (SPS) REST API One Identity Safeguard for Privileged Sessions (SPS) scenarios Troubleshooting One Identity Safeguard for Privileged Sessions (SPS)
Network troubleshooting Gathering data about system problems Viewing logs on One Identity Safeguard for Privileged Sessions (SPS) Changing log verbosity level of One Identity Safeguard for Privileged Sessions (SPS) Collecting logs and system information for error reporting Collecting logs and system information of the boot process for error reporting Support hotfixes Status history and statistics Troubleshooting a One Identity Safeguard for Privileged Sessions (SPS) cluster Understanding One Identity Safeguard for Privileged Sessions (SPS) RAID status Restoring One Identity Safeguard for Privileged Sessions (SPS) configuration and data VNC is not working with TLS Configuring the IPMI from the BIOS after losing IPMI password Incomplete TSA response received
Using SPS with SPP Configuring external devices Using SCP with agent-forwarding Security checklist for configuring One Identity Safeguard for Privileged Sessions (SPS) Jumplists for in-product help Configuring SPS to use an LDAP backend Glossary

Supported SSH channel types

The available SSH channel types and their functionalities are described below. For details on configuring Channel Policies, see Creating and editing channel policies. For a list of supported client applications, see Supported protocols and client applications.

  • Agent: Forwards the SSH authentication agent from the client to the server.

    NOTE: To perform agent-based authentication on the target server, it is not required to enable the Agent-forwarding channel in the Channel Policy used by the connection. The Agent-forwarding channel is needed only to establish connections from the target server to other devices and authenticate using the agent running on the client.

  • X11 Forward: Forwards the graphical X-server session from the server to the client. Enter the address of the client into the Allow client address field to permit X11-forwarding only to the specified clients. Specify IP addresses or networks (in IP address/Prefix format).

    NOTE: Certain client applications send the Target address as a hostname, while others as an IP address. If you are using a mix of different client applications, you might have to duplicate the channel rules and create IP-address and hostname versions of the same rule.

  • Local Forward: Forwards traffic arriving to a local port of the client to a remote host. To enable forwarding only between selected hosts, enter their IP addresses into the Details field. If the Details field is empty, local forwarding is enabled without restriction, the client may forward any traffic to the remote host. Enter the source of the forwarded traffic into the Originator, the target of the traffic into the Target field. Specify IP addresses or networks (in IP address/Prefix format). These parameters are the end-points of the forwarded traffic (that is, the local host that sends data to the remote host), and not the SSH server or the client.

    For example, to enable forwarding from the 192.168.20.20 host to the remote host 192.168.50.50, enter 192.168.20.20 into the Originator, and 192.168.50.50 into the Target field.

    Figure 218: Local TCP forwarding

    NOTE: Certain client applications send the Originator and Target addresses as hostnames, while others as IP addresses. If you are using a mix of different client applications, you might have to duplicate the channel rules and create IP-address and hostname versions of the same rule.

    Caution:

    Port forwarding across One Identity Safeguard for Privileged Sessions (SPS) may fail for certain SSH client-server combinations. This happens if within the protocol, the address of the remote host is specified as a hostname during the port-forwarding request (SSH_MSG_GLOBAL_REQUEST), but the hostname is resolved to IP address in the channel opening request (SSH_MSG_CHANNEL_OPEN. By default, SPS rejects such connections.

    To enable these connections, navigate to Traffic Controls > SSH > Settings, and disable the Strict mode option.

  • Remote Forward: Forwards traffic arriving a remote port of the server to the client. To enable forwarding only between selected hosts, enter their IP addresses into the Details field. If the Details field is empty, remote forwarding is enabled without restriction, the SSH server may forward any traffic to the client. Enter the source of the forwarded traffic into the Originator, the target of the traffic into the Target field. Specify IP addresses or networks (in IP address/Prefix format). These parameters are the end-points of the forwarded traffic (that is, the remote host that sends data to the client), and not the SSH server.

    For example, to enable forwarding from the 192.168.20.20 remote host to the client 192.168.50.50, enter 192.168.20.20 into the Originator, and 192.168.50.50 into the Target field.

    Figure 219: Remote TCP forwarding

    NOTE: Certain client applications send the Originator and Target addresses as hostnames, while others as IP addresses. If you are using a mix of different client applications, you might have to duplicate the channel rules and create IP-address and hostname versions of the same rule.

    Caution:

    Port forwarding across SPS may fail for certain SSH client-server combinations. This happens if within the protocol, the address of the remote host is specified as a hostname during the port-forwarding request (SSH_MSG_GLOBAL_REQUEST), but the hostname is resolved to IP address in the channel opening request (SSH_MSG_CHANNEL_OPEN. By default, SPS rejects such connections.

    To enable these connections, navigate to Traffic Controls > SSH > Settings, and disable the Strict mode option.

  • Session Exec: Execute a remote command (for example rsync) without opening a session shell. Enter the permitted command into the Permitted commands field. You can use regular expressions to specify the commands. This field can contain only letters (a-z, A-Z), numbers (0-9), and the following special characters ({}()*?\\|[]).

    Caution:

    Restricting the commands available in Session Exec channels does not guarantee that no other commands can be executed. Commands can be renamed, or executed from shell scripts to circumvent such restrictions.

  • Session Exec SCP: Transfers files using the Secure Copy (SCP) protocol.

    • To make the list of file operations available in the File operations column of the Sessions page, navigate to the Channel Policies page of the protocol, and enable the Log file transfers to database option. This option is disabled by default.

    • To send the file operations into the system log, enable the Log file transfers to syslog option. This option is disabled by default.

      NOTE: Turning logging on might result in a slight performance penalty. If traffic load slows processes down, disable the option.

    Caution:

    The WinSCP application does not follow the RFC of the SCP protocol properly, but transfers files in a Session Shell channel instead of a Session Exec SCP channel. This has the following results:

    • If the Session Shell channel is enabled in a Channel Policy (this is needed for SSH terminal sessions as well), and your users use WinSCP using the File protocol > SCP option, they will be able to transfer files to and from the server. Also, these files will not be listed in the File operations field of the Sessions page.

    • To avoid these problems, you have to enforce that your clients use WinSCP with the File protocol > SFTP option. WinSCP uses SFTP by default, but can be changed manually to use SCP, and also falls back to using SCP if a server rejects SFTP.

    • To terminate the connection when a user transfers a file with WinSCP using the Session Shell channel, create a Content Policy that matches the WinSCP: this is end-of-file string in screen content, and use this policy in your Connection Policies. For details on Content Policies, see Real-time content monitoring with Content Policies. This solution has been tested with WinSCP version 5.1.5: if it does not work for your version, contact our Support Team.

  • Session Subsystem: Use a subsystem. Enter the name of the permitted subsystem into the Permitted subsystem field.

  • Session SFTP: Transfers files using the Secure File Transfer Protocol (SFTP).

    • To make the list of file operations available in the File operations column of the Sessions page, navigate to the Channel Policies page of the protocol, and enable the Log file transfers to database option. This option is disabled by default.

    • To send the file operations into the system log, enable the Log file transfers to syslog option. This option is disabled by default.

      NOTE: Turning logging on might result in a slight performance penalty. If traffic load slows processes down, disable the option.

  • Session Shell: The traditional remote terminal session.

    Caution:

    The WinSCP application does not follow the RFC of the SCP protocol properly, but transfers files in a Session Shell channel instead of a Session Exec SCP channel. This has the following results:

    • If the Session Shell channel is enabled in a Channel Policy (this is needed for SSH terminal sessions as well), and your users use WinSCP using the File protocol > SCP option, they will be able to transfer files to and from the server. Also, these files will not be listed in the File operations field of the Sessions page.

    • To avoid these problems, you have to enforce that your clients use WinSCP with the File protocol > SFTP option. WinSCP uses SFTP by default, but can be changed manually to use SCP, and also falls back to using SCP if a server rejects SFTP.

    • To terminate the connection when a user transfers a file with WinSCP using the Session Shell channel, create a Content Policy that matches the WinSCP: this is end-of-file string in screen content, and use this policy in your Connection Policies. For details on Content Policies, see Real-time content monitoring with Content Policies. This solution has been tested with WinSCP version 5.1.5: if it does not work for your version, contact our Support Team.

Sharing SSH connection policies with SPP

The Share connection policy with SPP option enables you to use SSH connection policies in SPP to initiate sessions.

Prerequisites

Link an SPP appliance to SPS. For more information, see Linking SPS to SPP.

To share an SSH connection policy

  1. Navigate to Traffic Controls > SSH > Connections.

    Figure 220: Traffic Controls > SSH > Connections — Functions shared with SPP

  2. Select Share connection policy with SPP.

    NOTE: The Share connection policy with SPP checkbox is enabled only if you have linked an SPP appliance to SPS.

  3. Set the following configuration for the SSH connection policy:

    • In Target, select Inband destination selection.

    • Unselect Require Gateway Authentication on the SPS Web Interface.

    • In AA plugin, consider the following, then select the AA plugin of your choice:

      • Select an AA plugin different from the safeguard_default plugin.

      • Alternatively, leave AA plugin unset.

      WARNING: Do not delete or rename the safeguard_default AA plugin, otherwise, you are not able to use the Share connection policy with SPS option. If you have modified the safeguard_default plugin, to proceed, revert your changes.

    • In Credential Store, select SGCredStore.

      NOTE: The SGCredStore option is available only if you have linked an SPP appliance to SPS.

    • In Authentication policy, select an authentication policy.

      After that, navigate to Traffic Controls > SSH > Authentication Policies and open the respective authentication policy. In Relayed authentication methods, select Keyboard-interactive and Password.

  4. To save your changes, click Commit.

Sharing SSH connection policies with SPS

If you have joined an SPP to SPS, the Share connection policy with SPS option enables you to use SSH connection policies in SPS to initiate sessions.

Prerequisites

Link an SPP appliance to SPS. For more information, see Linking SPS to SPP.

To share an SSH connection policy

  1. Navigate to Traffic Controls > SSH > Connections.

    Figure 221: Traffic Controls > SSH > Connections — Functions shared with SPS

  2. Select Share connection policy with SPS.

    NOTE: The Share connection policy with SPS checkbox is enabled only if you have linked an SPP appliance to SPS.

  3. Set the following configuration for the SSH connection policy:

    • Unselect Require Gateway Authentication on the SPS Web Interface.

      • In AA plugin, consider the following:

        • Select an AA plugin different from the safeguard_default plugin.

        • Alternatively, leave AA plugin unset.

        WARNING: Do not delete or rename the safeguard_default AA plugin, otherwise, you are not able to use the Share connection policy with SPS option. If you have modified the safeguard_default plugin, to proceed, revert your changes.

    • In Authentication policy, select an authentication policy.

      After that, navigate to Traffic Controls > SSH > Authentication Policies and open the respective authentication policy. In Gateway authentication method, select at least one of the following options:

      • Password

      • Public key

      • Kerberos

  4. To save your changes, click Commit.

Authentication Policies

An authentication policy is a list of authentication methods that can be used in a connection. Connection definitions refer to an authentication policy to determine how the client can authenticate to the target server. Separate authentication methods can be used on the client and the server-side of the connection.

Figure 222: Authentication policies

Detailed information about this topic
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating