One Identity Safeguard 2.5 - Administration Guide

Introduction System requirements Installing the One Identity Safeguard for Privileged Passwords desktop client Setting up Safeguard for Privileged Passwords for the first time Getting acquainted with the console Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Directories Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Access settings Sessions settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions
How do I access the API How do I audit transaction activity How do I configure external federation authentication How do I manage accounts on unsupported platforms How do I modify the appliance configuration settings How do I prevent Safeguard for Privileged Passwords messages when making RDP connections How do I see which assets and/or accounts are governed by a profile How do I set the appliance system time How do I setup discovery jobs How do Safeguard for Privileged Passwords database servers use SSL What are the access request states What do I do when an appliance goes into quarantine What is required for One Identity Safeguard for Privileged Passwords, embedded sessions module What is required to integrate with Starling Identity Analytics & Risk Intelligence What needs to be set up to use Application to Application What role-based email notifications are generated by default When does the rules engine run for dynamic grouping and tagging Why did the password change during an open request Why join Safeguard for Privileged Passwords to One Identity Starling
Safeguard Desktop Player Appendix: Safeguard ports

Requesting session access

If you are designated as an authorized "user" of an entitlement, you can request access for a specific period (or session) to any account or asset in the scope of the entitlement's policies.

You can configure One Identity Safeguard for Privileged Passwords to notify you of pending access request workflow events, such as when a session request is pending, denied or revoked, and so forth. For more information, see Configuring alerts..

To request session access

  1. From your Home page, click New Request to open the New Access Request dialog.

    NOTE: You can also submit an access request from your Favorites pane, if you previously saved it as a favorite.

  2. On the Asset Selection tab, select the assets to be included in the access request.

    Limit: 50 assets

    The assets available for selection are based on the scope defined in the entitlement's access request policies.

  3. On the Account & Access Type tab, select the accounts to be included in the access request and the type of access being requested for each selected account.

    • Account: The accounts available appear in the Account column. When an asset has multiple accounts available, either Select Account(s) or the account name appears as a hyperlink in the Account column. Click the hyperlink in the Account column to display a list of accounts available and select the accounts to be included in the access request.

      The accounts available for selection are based on the Asset-Based Session Access setting (Access Config tab) defined for the entitlement's access request policy. That is:

      • If None is selected in the access request policy, the accounts Safeguard for Privileged Passwords retrieved from the vault will be available for selection. The selected account will then be used when the session is requested.
      • If User Supplied is selected in the access request policy, you will be required to enter the user credentials as part of the request workflow, prior to launching the SSH or RDP session.

      • If Linked Account is selected in the access request policy, linked directory accounts will be available for selection. The selected account will then be used when the session is requested.
      • If Directory Account is selected in the access request policy, only the specified directory accounts will be available for selection. The selected directory account will then be used when the session is requested.

    • Access Type: The type of access request appears in the Access Type column. When multiple access request types are available, this value appears as a hyperlink, which when selected displays an additional dialog allowing you to select the access type. Select one of the following for a session request: RDP or SSH.

      The access type options available depend on the type of asset selected on the Asset Selection tab. For example, RDP is only available for Windows sessions.

    To remove an asset or account from the list, select the entry in the grid and click the Delete toolbar button.

  4. On the Request Details tab, configure the following settings, which will apply to all of the selected assets and accounts:
    1. Normal Access: (This option is only available if the policy has emergency access enabled.) Select this option to gain normal access to this password. Normal access ensures the access request goes through the entire end-to-end access release process from request to approval to review as defined in the policy by the Security Policy Administrator.

    2. Emergency Access: (This option is only available if the policy has emergency access enabled.) Select this option to gain immediate emergency access to this password. When you use Emergency Access, the request requires no approval. For more information, see Creating an access request policy.

    3. Request Immediately: Clear this option to enter a specific date and time for the request. Enter the time in the user’s local time.

    4. Checkout Duration: This either displays the checkout duration; or, if the Allow Requester to Change Duration option is enabled in the policy, it allows you to set the days, hours, and minutes that you want the password and overrides the checkout duration set in the access request policy. For more information, see Creating an access request policy.
    5. Ticket Number: Enter a valid ticket number for this request.

      Safeguard for Privileged Passwords does not display the Ticket Number option unless the Security Policy Administrator selected Require Ticket Number for this policy.For more information, see Ticketing.

      When multiple accounts are specified in the request, if any of the selected accounts require a ticket number, you must specify a valid ticket number. The specified ticket number will be applied to all of the requests associated with this access request.

    6. Reason: Select an access request reason code for this request.

      Select the Description down arrow to view the description defined for the selected reason.

      Safeguard for Privileged Passwords does not display the Reason option unless the Security Policy Administrator selected reasons for this policy. For more information, see Reasons.

      When multiple accounts are specified in the request, if any of the selected accounts require a reason, you must specify a reason. The specified reason will be applied to all of the requests associated with this access request.

    7. Comment: Enter information about this request. When multiple accounts are specified in the request, if any of the selected accounts require a comment, you must enter a comment. The comment will be applied to all of the requests associated with this access request.

      Limit: 255 characters

  5. To save the access request as a favorite, click the Add to Favorites button.

    The Add to Favorites dialog displays allowing you to specify a name and description for the access request. It also allows you to assign a color to the request's icon.

    This access request is then added to your Home page Favorites pane. Selecting it from the Favorites pane displays the New Access Request dialog allowing you to edit the request details or enter a required reason or comment before submitting the request.

  6. After entering the required information, click Submit Request.

    The Access Request Result dialog displays showing you the access requests submitted and whether a request was successful.

Taking action on a session request

The actions a user authorized to request access to a privileged session can take depends on the state of the request.

To take action on a session request

  1. From your  Home page, the Requests widget has these controls:
    1. Select  (expand down) to open the list of active requests.
    2. Select  Popout to float the Requests pane.

      You can then select and drag the pane to any location on the console and re-size the window.

    Note: You enable or disable the Home page widgets in the  Console Settings menu.

  2. Open the list of requests and select one of these view filters:

    State Description
    All Requests in all states.
    Available Approved requests that are ready (that is, a session that can be launched).
    Approved Requests that have been approved, but the checkout time has not arrived.
    Pending Requests that are waiting for approval.
    Revoked

    Approved requests retracted by the approver.

    The approver can revoke a request between the time the requester launches the session and checks it back in.

    When a user with Security Policy administrator permissions revokes a "live" session, the active session is terminated.

    Expired Requests for which the checkout duration has elapsed.
    Denied Requests denied by the approver.

    Note: The number indicates how many requests are in that state.

  3. Select an account to see the details of the session request.
  4. You can take the following actions on session requests, depending on the state:

    State Actions
    Available

    Click Launch to launch the SSH client or Remote Desktop Connection. For more information, see Launching the SSH client or Launching an RDP session.

    Click  Check-In to complete the checkout process once you have ended your session.

    In addition, you can use the following buttons to view or copy information into the configuration dialog that contains the credentials needed to launch the session:

    • View: Click this button to view the password or connection string, which is required to launch the session.
    • Copy: Click this button to copy a value to the copy buffer.
    • Help: Click this button to copy the value into the appropriate field of the configuration dialog.

    NOTE: The configuration dialogs are populated with the required information; these actions are available if the fields are not populated for some reason.

    Approved

    Click Cancel to remove the request.

    A sessions request changes from "Approved" to "Available" when the requested time is reached. It stays available until you either cancel the request or it reaches the end of the duration period.

    Pending

    Click  Cancel to remove the request.

    Revoked

    Click  Resubmit Request to request the session again.

    Click  Remove to delete the request from the list.

    Expired Click  Remove to delete the request from the list.
    Denied

    Click  Resubmit Request to request the session again.

    Click  Remove to delete the request from the list.

Approving a session request

Depending on how the Security Policy Administrator configured the policy, a sessions request will either require approval by one or more Safeguard for Privileged Passwords users, or be auto-approved.

You can configure Safeguard for Privileged Passwords to notify you of an access request that requires your approval. For more information, see Configuring alerts..

To approve or deny a sessions request

  1. From your  Home page, the Approvals widget has these controls:
    1. Select  (expand down) to open the list of approvals.
    2. Select  Popout to float the Approvals pane.

      You can then select and drag the pane to any location on the console and re-size the window.

    Note: You enable or disable the Home page widgets in the  Console Settings menu.

  2. Open the list of approvals and select one of these view filters:
    State Description
    All Requests in all states.
    Pending Requests that are waiting for approval.
    Approved Requests that have been approved, but not yet available to the requester.

    Note: The number indicates how many requests are in that state.

  3. Once you open the list, select the requester's name to see the details of the sessions request.
  4. Take the following actions on sessions requests:

    State Actions
    Pending

    Select to Approve or Deny a sessions request.

    Optionally, enter a comment of up to 255 characters.

    Pending Additional Approvers

    Select to Deny a sessions request.

    Optionally, enter a comment of up to 255 characters.

    Approved

    Select to Deny or Revoke an approved request.

    You can revoke a request between the time the requester views it and checks it in.

    Any eligible approver can deny an access request after it has already been approved or auto-approved. Once disallowed, the requester will no longer be able to access the requested session, but he is given another opportunity to request that session again. The requester receives an email notifying him that the request was denied. For more information, see Configuring alerts.

Launching the SSH client

Once an SSH session request becomes available, the requester can launch the SSH client to start the session.

To launch the SSH client to begin your session

  1. If the User Supplied option is selected in the policy, you will be prompted to enter your user credentials. After entering the requested credentials, click Apply. This will retrieve the information (for example, Hostname Connection String) required to launch the SSH client.
  2. Click the Launch button to the right of the asset name. Clicking this button displays the PuTTY Configuration dialog. The required information is populated, click Open to launch the SSH client.

    NOTE: If the required information is not populated in the PuTTY Configuration dialog, use the following buttons to copy and paste the information into the dialog:

    1. Use the buttons to the right of the Hostname Connection String to perform the following tasks:

      • View: To view the hostname connection string.
      • Copy: To copy the value to your copy buffer, which can then be pasted into the Hostname field of the PuTTY Configuration dialog.
      • Help: To copy the value into the Hostname field of the PuTTY Configuration dialog.
    2. Use the buttons to the right of the Password to perform the following tasks.

      • View: To view the password.
      • Copy: To copy the password to your copy buffer, which can then be pasted into the Password field of the PuTTY Configuration dialog.
      • Help: To copy the value into the Password field of the PuTTY Configuration dialog.

        NOTE: The Password field only appears if the Include password release with session requests option (Access Config tab) is selected in the entitlement's access request policy.

  3. In the SSH client, run the commands or programs on the target host.

    If there is no activity in an open session for about 10 minutes, the session will be terminated. However, as long as the request is in an Available state, you can launch the session again to resume your tasks.

  4. Once you are completed, log out of the target host and select Check in to complete the session request process.

    This makes the session request available to reviewers. If the Record Sessions option is enabled in the policy, the reviewer can play back the recording as part of the review process. In addition, if the Enable Command Detection option is selected in the policy, the reviewer can view a list of the commands and programs run during the session.

Related Documents