An entitlement defines which users are authorized to checkout passwords for accounts in the scope of its policies. A policy defines scope (that is, which accounts) and the rules for checking out passwords, such as the duration, how many approvals are required, and so forth.
It is possible for an account to be governed by more than one entitlement, or is in the scope of more than one policy within an entitlement. Safeguard for Privileged Passwords uses both entitlement and policy priorities to determine which policy to use for a password release. Safeguard for Privileged Passwords first considers the entitlement priority, then the priorities of access request policies within that entitlement.
Notice that AccountX is in the scope of all three of these policies.
If a user requests the password for AccountX for Sunday at 4 p.m., Safeguard for Privileged Passwords first considers Entitlement A because it is priority 1. When it determines that the policy time restrictions prevent the password release, it then considers Entitlement B.
Safeguard for Privileged Passwords first considers Entitlement B's priority 1 policy. When it determines that the time restrictions prevent the password release, it then considers Policy 2. Once the request is satisfied, Safeguard for Privileged Passwords grants the request.
Time restrictions control when the entitlement is in effect relative to the user's time zone. For more information, see About time restrictions.
On the Time Restrictions tab, specify the time restriction properties for the entitlement.
|Use Time Restrictions||
Select this option to enforce time restrictions.
Select and drag the hours you want to allow.
|Have the Entitlement Expire on Date and Time||
Select this option to enforce an expiration date, then enter the date and time.
When an entitlement expires, all the access request policies associated with the entitlement also expire. To set an expiration date on a policy, see Creating an access request policy.
An entitlement's time restrictions enforce when Safeguard for Privileged Passwords uses a policy; a policy's time restrictions enforce when a user can access the account passwords. If the entitlement and the policy both have time restrictions, the user can only check out the password for the overlapping time frame.
Time restrictions control when the entitlement or policy is in effect relative to a user's time zone. Although Safeguard for Privileged Passwords Appliances run on Coordinated Universal Time (UTC), the user's time zone enforces the time restrictions set in the entitlement or policy. This means that if the appliance and the user are in different time zones, Safeguard for Privileged Passwords enforces the policy in the user's time zone set in his account profile.
When you add users to an entitlement, you are specifying which people can request passwords to the accounts governed by the selected entitlement's access request policies, or which people can request sessions for the accounts and assets governed by the selected entitlement's access request policies. A user can be a Sessions Appliance certificate user. For more information, see Sessions management.
Note: It is the responsibility of the Security Policy Administrator to add users to entitlements.
To add "requester" users to an entitlement
Note: You can also double-click (or double-tap) a name to add it.
If you do not see the user or user group you are looking for, depending on your Administrator permissions, you can create them in the Users/User Groups selection dialog. (You must have Authorizer Administrator or User Administrator permissions to create users; or Security Policy Administrator permissions to create user groups.)
To create new users or user groups in the Users/User Groups selection dialog
Note: The Security Policy Administrator only has permission to add groups, not users. For more information, see Administrator permissions.