Chat now with support
Chat with Support

One Identity Safeguard for Privileged Sessions 8.0 LTS - Administration Guide

Preface Introduction The concepts of One Identity Safeguard for Privileged Sessions (SPS)
The philosophy of One Identity Safeguard for Privileged Sessions (SPS) Policies Credential Stores Plugin framework Indexing Supported protocols and client applications Modes of operation Connecting to a server through One Identity Safeguard for Privileged Sessions (SPS) Archive and backup concepts Maximizing the scope of auditing IPv6 in One Identity Safeguard for Privileged Sessions (SPS) SSH host keys Authenticating clients using public-key authentication in SSH The gateway authentication process Four-eyes authorization Network interfaces High Availability support in One Identity Safeguard for Privileged Sessions (SPS) Versions and releases of One Identity Safeguard for Privileged Sessions (SPS) Accessing and configuring One Identity Safeguard for Privileged Sessions (SPS)
Cloud deployment considerations The Welcome Wizard and the first login Basic settings
Supported web browsers The structure of the web interface Network settings Configuring date and time System logging, SNMP and e-mail alerts Configuring system monitoring on SPS Data and configuration backups Archiving Cleaning up audit data Using plugins Forwarding data to third-party systems Starling integration
User management and access control
Login settings Managing One Identity Safeguard for Privileged Sessions (SPS) users locally Setting password policies for local users Managing local user groups Managing One Identity Safeguard for Privileged Sessions (SPS) users from an LDAP database Handling user names in User Principal Name (UPN) format Authenticating users to a RADIUS server Authenticating users with X.509 certificates Authenticating users with SAML2 Managing user rights and user groups Creating rules for restricting access to search audit data Displaying the privileges of users and user groups Listing and searching configuration changes
Managing One Identity Safeguard for Privileged Sessions (SPS)
Controlling One Identity Safeguard for Privileged Sessions (SPS): reboot, shutdown Managing One Identity Safeguard for Privileged Sessions (SPS) clusters Managing a High Availability One Identity Safeguard for Privileged Sessions (SPS) cluster Upgrading One Identity Safeguard for Privileged Sessions (SPS) Managing the One Identity Safeguard for Privileged Sessions (SPS) license Accessing the One Identity Safeguard for Privileged Sessions (SPS) console Sealed mode Out-of-band management of One Identity Safeguard for Privileged Sessions (SPS) Managing the certificates used on One Identity Safeguard for Privileged Sessions (SPS)
General connection settings HTTP-specific settings ICA-specific settings MSSQL-specific settings RDP-specific settings SSH-specific settings Using Sudo with SPS Telnet-specific settings VMware Horizon View connections VNC-specific settings Indexing audit trails Using the Sessions interface Advanced authentication and authorization techniques Reports The One Identity Safeguard for Privileged Sessions (SPS) REST API One Identity Safeguard for Privileged Sessions (SPS) scenarios Troubleshooting One Identity Safeguard for Privileged Sessions (SPS)
Network troubleshooting Gathering data about system problems Viewing logs on One Identity Safeguard for Privileged Sessions (SPS) Changing log verbosity level of One Identity Safeguard for Privileged Sessions (SPS) Collecting logs and system information for error reporting Collecting logs and system information of the boot process for error reporting Support hotfixes Status history and statistics Troubleshooting a One Identity Safeguard for Privileged Sessions (SPS) cluster Understanding One Identity Safeguard for Privileged Sessions (SPS) RAID status Restoring One Identity Safeguard for Privileged Sessions (SPS) configuration and data VNC is not working with TLS Configuring the IPMI from the BIOS after losing IPMI password Incomplete TSA response received
Using SPS with SPP Configuring external devices Using SCP with agent-forwarding Security checklist for configuring One Identity Safeguard for Privileged Sessions (SPS) Jumplists for in-product help Configuring SPS to use an LDAP backend Glossary

Viewing encrypted screenshots

This section provides information on how to view encrypted screenshots and on the private keys that are necessary to view them.

Prerequisites

To view encrypted screenshots in the Search interface, you have to upload the necessary private encryption keys to your audit keystore. Only RSA keys (in PEM-encoded X.509 certificates) can be uploaded to the audit keystore.

TIP: One Identity recommends using 2048-bit RSA keys (or stronger).

The private keys are stored locally, in your browser.

NOTE: If you clear your browser’s data, your audit keystore could be deleted. If your audit keystore is deleted, upload your private keys again.

To view encrypted screenshots

  1. On the Sessions page, select an encrypted audit trail.

  2. To display the details of a connection, click . This page is called the details view.

  3. To access the list of encrypted screenshots of the selected audit trail, click Events in the details view.

  4. Click the screenshot that you want to view.

  5. (Optional) Unlock your keystore.

    If you have private keys stored in your audit keystore, the Unlock keystore dialog is displayed.

    Enter your master password and click Unlock keystore.

    The keystore is unlocked and you can use your keys or you can add new keys.

  6. (Optional) If there is a missing private key, the Private keys missing dialog opens.

    Click Upload private keys, which takes you to User menu > Audit keystore, where you can add the keys.

  7. (Optional) If necessary, add any missing certificates on Basic settings > Local services > Indexer service.

    Previously, the audit keystore was used to store certificates as well as private keys. From SPS version 6.10 and onwards, you must upload the certificates to Basic settings > Local services > Indexer service.

    For more information on how to add certificates, see Configuring the internal indexer.

Result

Once you add the necessary private keys to your audit keystore, you can view the encrypted screenshots in the Sessions interface.

Replaying encrypted audit trails in your browser

This section provides information on the necessary private keys and certificates for playing encrypted audit trails in your browser and on how to open a video file of an audit trail.

Prerequisites

To replay encrypted audit trails in your browser, you have to upload the necessary private keys to your audit keystore and the corresponding certificates to Basic settings > Local services > Indexer service. Depending on the encryption, decrypting the upstream part of an audit trail may require an additional set of certificates and keys.

Only RSA keys (in PEM-encoded X.509 certificates) can be uploaded to the private keystore.

TIP: One Identity recommends using 2048-bit RSA keys (or stronger).

NOTE: Certificates are used as a container and delivery mechanism. For encryption and decryption, only the keys are used.

Use every keypair or certificate only for one purpose. Do not reuse cryptographic keys or certificates (for example, do not use the certificate of the One Identity Safeguard for Privileged Sessions (SPS) webserver to encrypt audit trails, or the same keypair for signing and encrypting data).

For more information, see Encrypting audit trails and Replaying audit trails in your browser.

NOTE: You can only upload certificates permanently. Uploading certificates temporarily is not supported anymore.

To replay encrypted audit trails in your browser

  1. On the Sessions page, select the audit trail you want to replay.

  2. To display the details of a connection, click . This page is called the details view.

    NOTE: If you select the Automatic refresh option in User menu > Preferences, all the details of the sessions are refreshed automatically in the details view. For more information on the Automatic refresh option, see Preferences.

  3. To play the video file, click Play video.

  4. (Optional) Unlock your keystore.

    If you have private keys stored in your audit keystore, the Unlock keystore dialog is displayed.

    Enter your master password and click Unlock keystore.

    The keystore is unlocked and you can use your keys or you can add new keys.

  5. (Optional) If there is a missing private key, the Private keys missing dialog opens.

    Click Upload private keys, which takes you to User menu > Audit keystore, where you can add the keys.

  6. (Optional) If necessary, add any missing certificates on Basic settings > Local services > Indexer service.

    Previously, the audit keystore was used to store certificates as well as private keys. From SPS version 6.10 and onwards, you must upload the certificates to Basic settings > Local services > Indexer service.

    For more information on how to add certificates, see Configuring the internal indexer.

    After uploading the private keys and the corresponding certificates, the encrypted upstream traffic elements are decrypted. The trail is decrypted and decompressed on the client-side. As a result, the encrypted elements will be displayed distributed in the video (for more information, see Player window controls in Replaying audit trails in your browser).

  7. (Optional) After uploading any missing private keys or certificates, to play the video, click Play video.

    1. (Optional) If there are more channels that can be played, select the channel that you want to play in the Multiple channels are available dialog and click Play video.

      The Player window opens.

  8. (Optional) To download the video file, click Download audit trail.

For more information on how to use the browser to play video files, see Using the browser to play video files.

Following active sessions

If a session is not closed but it is still active, the label is displayed in the session details window and you can follow or terminate active sessions.

  1. On the Sessions page, select the audit trail you want to replay.

  2. To display the details of a connection, click . This page is called the details view.

    NOTE: If you select the Automatic refresh option in User menu > Preferences, all the details of the sessions are refreshed automatically in the details view. For more information on the Automatic refresh option, see Preferences.

  3. Click .

  4. Select where you want to follow the active session.

    1. To follow the session in the browser, select Follow in browser.

    2. To follow the session on Safeguard Desktop Player, select Follow in Safegurad Desktop Player.

      The trail data is exported in .srs format, which you can download and open with Safeguard Desktop Player.

      For more information on the Safeguard Desktop Player, see Safeguard Desktop Player User Guide.

  5. (Optional) To terminate the active session, click .

    This button is displayed only if you have the rights to perform this operation.

Creating report subchapters

Detailed information about this topic
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating