Chat now with support
Chat with Support

One Identity Safeguard for Privileged Passwords 2.4 - Administration Guide

Introduction System requirements Installing the One Identity Safeguard for Privileged Passwords desktop client Setting up Safeguard for Privileged Passwords for the first time Getting acquainted with the console Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Directories Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Access settings Sessions settings
Users User Groups Disaster recovery Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions
How do I access the API How do I audit transaction activity How do I configure external federation authentication How do I manage accounts on unsupported platforms How do I modify the appliance configuration settings How do I prevent Safeguard for Privileged Passwords messages when making RDP connections How do I see which assets and/or accounts are governed by a profile How do I set the appliance system time How do I setup discovery jobs How do Safeguard for Privileged Passwords database servers use SSL What are the access request states What do I do when an appliance goes into quarantine What is required for One Identity Safeguard for Privileged Passwords Privileged Sessions What is required to integrate with Starling Identity Analytics & Risk Intelligence What needs to be set up to use Application to Application What role-based email notifications are generated by default When does the rules engine run for dynamic grouping and tagging Why did the password change during an open request Why join Safeguard for Privileged Passwords to One Identity Starling
Safeguard Desktop Player Appendix: Safeguard ports

Add Connection

You must configure how you want Safeguard for Privileged Passwords to connect to and communicate with the discovered assets.

Important: A discovery job can have more than one rule. When Safeguard for Privileged Passwords runs the discovery job, if it finds an asset with more than one rule, it applies the connection and profile settings of the first rule that discovers the asset. Once Safeguard for Privileged Passwords creates an asset, it will not attempt to re-create it or modify it if rediscovered by a different job.

To add connection information

  1. In the Rule dialog, click (or tap) Edit next to Connection.
  2. In the Connection dialog, select an Authentication Type:

    • SSH Key: To authenticate to the asset using an SSH authentication key.

      Browse to select an SSH Key and provide an account name.

    • Directory Account: To authenticate to the assets using an account from an external identity store such as Microsoft Active Directory, select the service account. Click (or tap) Select Account to choose the directory account.

    • Password: To authenticate to the assets using a local service account and password. Enter the account name and password.

    • None: To authenticate to the assets manually.
  3. To verify the connection setting, click (or tap) Test Connection.

    Test Connection returns a list of assets Safeguard for Privileged Passwords will find in the directory you set in the Information tab.

  4. Choose an asset and click (or tap) OK.
  5. If asked to Verify Host Authenticity, click (or tap) Yes to accept the SSH Key for the host.
  6. You can click (or tap) Test Connection again to verify the connection setting on another asset or OK to return to the Rule dialog to continue configuring the discovery rule.

    NOTE: Assets that fail the test connection during the asset discovery are created with a authentication type of NONE.

Add Profile

During discovery, Safeguard for Privileged Passwords automatically adds the assets that it finds and begins to manage them according to the settings in the profile you set on the Rules tab.

To add the profile information

  1. In the Rule dialog, click (or tap) Edit next to Profile.
  2. Browse to select a profile to govern the discovered assets.

    Note: You can only choose a profile that is associated with the partition selected in the General tab.

  3. Click (or tap) OK to save your selection.

Important: A discovery job can have more than one rule. When Safeguard for Privileged Passwords runs the discovery job, if it finds an asset with more than one rule, it applies the connection and profile settings of the first rule that discovers the asset. Once Safeguard for Privileged Passwords creates an asset, it will not attempt to re-create it or modify it if rediscovered by a different job.

Schedule tab

From the Discovery dialog, Schedule tab, configure when you want to run the asset discovery job.

To schedule an asset discovery job

  1. On the Schedule tab,

    1. Interval: Choose Never, Minute, Hour, Day, Week, or Month.

      NOTE: Best Practice: Do not use the Minute interval.

      NOTE: If you selected Never, click (or tap) Next to proceed to the Summary tab. For all other intervals, proceed with step 1b.

    2. Time of day: Set the start time.
    3. Repeat interval: Select the interval you would like to repeat the asset discovery job.

      • If Weekly, select which days of the week to run the asset discovery job.
      • If Monthly, set the task recurrence pattern: Day of month or week of month and day of week.
    4. Time Zone: Select the time zone.

Summary tab

From the Discovery dialog, Summary tab, review the asset discovery job parameters and save it.

  1. Review the following settings:

    • Method
    • Information
    • Rules
    • Schedule
  2. Modify the asset discovery job settings, if necessary.
  3. Click (or tap) Add Discovery to save the discovery job.
Related Documents