Chat now with support
Chat with Support

One Identity Safeguard for Privileged Passwords 2.4 - Administration Guide

Introduction System requirements Installing the One Identity Safeguard for Privileged Passwords desktop client Setting up Safeguard for Privileged Passwords for the first time Getting acquainted with the console Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Directories Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Access settings Sessions settings
Users User Groups Disaster recovery Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions
How do I access the API How do I audit transaction activity How do I configure external federation authentication How do I manage accounts on unsupported platforms How do I modify the appliance configuration settings How do I prevent Safeguard for Privileged Passwords messages when making RDP connections How do I see which assets and/or accounts are governed by a profile How do I set the appliance system time How do I setup discovery jobs How do Safeguard for Privileged Passwords database servers use SSL What are the access request states What do I do when an appliance goes into quarantine What is required for One Identity Safeguard for Privileged Passwords Privileged Sessions What is required to integrate with Starling Identity Analytics & Risk Intelligence What needs to be set up to use Application to Application What role-based email notifications are generated by default When does the rules engine run for dynamic grouping and tagging Why did the password change during an open request Why join Safeguard for Privileged Passwords to One Identity Starling
Safeguard Desktop Player Appendix: Safeguard ports

Security Policy administrator permissions

The Security Policy administrator configures the security policies that govern the access rights to accounts and assets, including the requirements for checking out passwords, such as the maximum duration, if password reasons are required, if emergency access is allowed, and so forth.

This user configures time restrictions for entitlements and who can request, approve and review access requests.

  • Creates account groups, asset groups and user groups.
  • Creates entitlements.
  • Configures access request policies.
  • Adds users or user groups to entitlements to authorize those accounts to request passwords.

NOTE: This user may not know any details about the assets.

NOTE:  Security Policy Administrators can only view the user object history for their own account.

Table 261: Security Policy administrator: Permissions
Safeguard for Privileged Passwords view | page Permissions

Dashboard | Access Requests

Full control to manage access requests.

Activity Center

View and export security-related activity events, including access request events.

Audit access request workflow.

Reports

View and export entitlement reports.

Administrative Tools | Toolbox

Access to the Accounts Groups, Asset Groups, Entitlements, Users and User Groups view.

Access to the Tasks pane.

Administrative Tools | Account Groups

Add, modify or delete account groups.

Add accounts to account groups.

Assign policies to account groups.

Administrative Tools | Asset Groups

Add, modify or delete asset groups.

Add assets to asset groups.

Assign policies to asset groups.

Administrative Tools | Entitlements

Add, modify or delete entitlements.

Add users or user groups to entitlements.

Define and maintain access request policies.

Assign policies to entitlements.

Administrative Tools | Settings:

 

  • Access Request | Reasons
Add, modify, or delete reason codes.
  • External Integration | Application to Application

Add, modify, or delete application registrations.

  • External Integration | Approval Anywhere
Configure Approval Anywhere service for access request approvals.
  • Messaging

Login notification: View only.

Set message of the day.

Administrative Tools | Users

Add users to user groups.

Add users to entitlements.

Link directory accounts to a user.

Administrative Tools | User Groups

Add, modify or delete local user groups.

Add local or directory users to user groups.

Assign entitlements to user groups.

User administrator permissions

The user administrator:

  • Creates (or imports) Safeguard for Privileged Passwords users.
  • Grants Help Desk Administrator permissions to users.
  • Sets passwords, unlocks, and enables or disables non-administrator user accounts.
  • Adds directory groups, including the associated directory users, if a directory has been added to Safeguard for Privileged Passwords.

NOTE: Also has Help Desk Administrator permissions.

NOTE: User Administrators cannot modify administrator passwords, including their own.

Important: User Administrators can change the permissions for their own account which may affect their ability to grant Help Desk Administrator permissions to other users. When you make changes to your own permissions, they take effect next time you log in.

Table 262: User administrator: Permissions
Safeguard for Privileged Passwords view | page Permissions

Activity Center

View and export user activity events.

Administrative Tools | Toolbox

Access to the Users and User Groups view.

Access to Tasks pane.

Administrative Tools | Settings:  
  • External Integration | Identity and Authentication
View only.
  • Messaging | Message of the Day

Login notification: View only.

Set message of the day.

Administrative Tools | Users

Add, modify, delete or import local and directory users.

Set passwords and unlock accounts for non-administrator users.

Enable or disable non-administrative users.

Set Help Desk Administrator permissions.

Administrative Tools | User Groups

Add or delete directory groups, if a directory has been added to Safeguard for Privileged Passwords.

Preparing systems for management

Before you add systems to Safeguard for Privileged Passwords (Adding an asset), you must ensure they are properly configured.

Generally, to prepare an asset for Safeguard for Privileged Passwords:

  1. Create a functional account (called a "service" account in Safeguard for Privileged Passwords) on the asset and assign it a password.

    Note: To add an asset to Safeguard for Privileged Passwords, it must have a service account. For more information, see About service accounts.

  2. Grant the service account sufficient permissions.
  3. Test the service account connectivity.
  4. Configure the security protocol.
  5. For platforms that support SSL server certificate validation, add the server’s signing authority certificate to the Trusted Certificates store in Safeguard for Privileged Passwords. For more information, see Trusted Certificates.

The following topics can help you prepare your hosts for management by Safeguard for Privileged Passwords:

Safeguard for Privileged Passwords supports a variety of platforms. For more information, see Supported platforms.

Prepare ACF - Mainframe systems

This applies to both ACF2 - Mainframe and ACF2 - Mainframe LDAP platforms.

To prepare IBM ACF-mainframe systems for Safeguard for Privileged Passwords

  1. Create a service account on the asset and assign it a password.
  2. Grant the service account the privileges required to use the ALTERUSER command on other profiles.
  3. If not already installed, install a Telnet server on the z/OS system. If required, secure Telnet with SSL.

    Note: Please refer to your IBM z/OS system documentation for details on installing and configuring the Telnet server (and SSL).

  4. Test the Telnet server using a Windows-based 3270 emulator or on Linux, use the telnet-ssl or x3270 programs to test SSL and non-SSL connections to an z/OS system.
  5. In Safeguard for Privileged Passwords, create the asset and accounts for the z/OS system using password authentication.
About certificate support for the TELNET protocol

Safeguard for Privileged Passwords automatically accepts any server certificate that the connection offers and does not verify the trust chain on the TELNET certificate. In addition, Safeguard for Privileged Passwords does not support client certificate selection so if TELNET requires that the client present a certificate that is signed by a recognized authority, Safeguard for Privileged Passwords cannot support that configuration.

Related Documents