Chat now with support
Chat with Support

One Identity Safeguard for Privileged Passwords 2.4 - Administration Guide

Introduction System requirements Installing the One Identity Safeguard for Privileged Passwords desktop client Setting up Safeguard for Privileged Passwords for the first time Getting acquainted with the console Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Directories Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Access settings Sessions settings
Users User Groups Disaster recovery Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions
How do I access the API How do I audit transaction activity How do I configure external federation authentication How do I manage accounts on unsupported platforms How do I modify the appliance configuration settings How do I prevent Safeguard for Privileged Passwords messages when making RDP connections How do I see which assets and/or accounts are governed by a profile How do I set the appliance system time How do I setup discovery jobs How do Safeguard for Privileged Passwords database servers use SSL What are the access request states What do I do when an appliance goes into quarantine What is required for One Identity Safeguard for Privileged Passwords Privileged Sessions What is required to integrate with Starling Identity Analytics & Risk Intelligence What needs to be set up to use Application to Application What role-based email notifications are generated by default When does the rules engine run for dynamic grouping and tagging Why did the password change during an open request Why join Safeguard for Privileged Passwords to One Identity Starling
Safeguard Desktop Player Appendix: Safeguard ports

Uninstalling the desktop client

To uninstall the desktop client

  1. In the Windows Control Panel, open Programs and Features.
  2. Right-click (or press and hold) the Safeguard for Privileged Passwords application and choose Uninstall.

Setting up Safeguard for Privileged Passwords for the first time

Before One Identity Safeguard for Privileged Passwords can manage your privileged account passwords and privileged sessions, you must first add all the objects you need to write access request policies, such as users, accounts, and assets. By following these procedures you will set up a hierarchy of administrators that ensures your company follows role-based access control. For more information, see Administrator permissions.

NOTE: The setup steps in this section assume you have already performed the initial One Identity Safeguard for Privileged Passwords 2000 Appliance installation and configuration steps in the One Identity Safeguard for Privileged Passwords Appliance Setup Guide provided with your hardware equipment and have added a user with Authorizer Administrator permissions.

In addition:

  • If you have not already done so, it is highly recommended that you change the default password for your bootstrap administrator account.
  • Before Safeguard for Privileged Passwords can reset local account passwords on Windows systems, you must change the local security policy to disable "User Account Control: Run all administrators in Admin Approval Mode".
  • Sessions module: For some systems (SUSE and some Debian systems) that use SSH, you must enable password authentication in the package generated configuration file (sshd_config). For example, in the debian sshd_config file, set the following parameter: PasswordAuthentication yes.

Step 1: Authorizer Administrator creates administrators

  1. Log into the desktop client using the Authorizer Administrator account.
  2. Customize the Password Rules. (Settings | Safeguard for Privileged Passwords Access | Password Rules)
  3. Add users for the following administrator permissions (Adding a user):
    1. User Administrator
    2. Help Desk Administrator
    3. Appliance Administrator
    4. Operations Administrator
    5. Auditor
    6. Asset Administrator
    7. Directory Administrator
    8. Security Policy Administrator

    Note: A user can have more than one set of permissions. For a list of permissions granted to the different Safeguard for Privileged Passwords administrators, see Administrator permissions.

Step 2: Appliance Administrator configures the appliance

NOTE: If one or more Safeguard Sessions Appliances are joined to Safeguard for Privileged Passwords, X1 is not available in Safeguard for Privileged Passwords.

  1. Log into the desktop client using the Appliance Administrator account.
  2. If you are using both the Privileged Passwords and embedded sessions module, ensure the Network Interface X0 (primary interface) and Network Interface X1 (sessions interface) information is configured (Settings | Appliance | Networking). After one or more Safeguard Sessions Appliances have been joined, only the Network Interface X0 is used. Configuration includes the following for each:

    1. IP address
    2. Netmask
    3. Default gateway
    4. DNS servers
    5. DNS suffixes

    For more information, see Networking.

  3. Ensure the access request and password management features are enabled. (Settings | Access Request | Enable or Disable Services).
  4. Configure the External Integration settings that apply (Settings | External Integration):
    1. Email: Configure the SMTP server to be used for email notifications. Safeguard for Privileged Passwords provides default email templates for most events, which can be customized.
    2. Identity and Authentication: Configure directory services such as Active Directory and LDAP servers to be used as identity and authentication providers for Safeguard for Privileged Passwords users. Configure Safeguard for Privileged Passwords as a relying party that uses SAML 2.0 to integrate with external federation services to authenticate users. Create a RADIUS server to be used as a primary or secondary authentication provider.
    3. SNMP: Configure SNMP subscriptions for sending SNMP traps to your SNMP console when certain events occur.
    4. Starling: Join Safeguard for Privileged Passwords to Starling to take advantage of other Starling services, such as Starling Two-Factor Authentication and Starling Identity Analytics & Risk Intelligence.
    5. Syslog: Configure the syslog servers where event notifications are to be sent.
    6. Ticketing: Add external ticketing tracking system.
  5. Safeguard ships with default certificates and default SSH algorithms for the Unix and Linux platforms. However, you can replace the certificates to use or add new algorithms.
    1. To specify different certificates to be used, see Certificate settings.
    2. To add new SSH algorithms, use the API endpoint:

      https://<Appliance IP>/service/core/swagger/SessionSshAlgorithms

Related Documents