One Identity Safeguard 2.5 - Administration Guide

Introduction System requirements Installing the One Identity Safeguard for Privileged Passwords desktop client Setting up Safeguard for Privileged Passwords for the first time Getting acquainted with the console Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Directories Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Access settings Sessions settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions
How do I access the API How do I audit transaction activity How do I configure external federation authentication How do I manage accounts on unsupported platforms How do I modify the appliance configuration settings How do I prevent Safeguard for Privileged Passwords messages when making RDP connections How do I see which assets and/or accounts are governed by a profile How do I set the appliance system time How do I setup discovery jobs How do Safeguard for Privileged Passwords database servers use SSL What are the access request states What do I do when an appliance goes into quarantine What is required for One Identity Safeguard for Privileged Passwords, embedded sessions module What is required to integrate with Starling Identity Analytics & Risk Intelligence What needs to be set up to use Application to Application What role-based email notifications are generated by default When does the rules engine run for dynamic grouping and tagging Why did the password change during an open request Why join Safeguard for Privileged Passwords to One Identity Starling
Safeguard Desktop Player Appendix: Safeguard ports

General tab

On the General tab, specify the following information about the entitlement.

Table 109: Entitlement: General tab properties
Property Description
Name

Enter a unique name for the entitlement.

Limit: 50 characters

Required

Description

Enter descriptive text about the entitlement.

Limit: 255 characters

Priority

The priority of this entitlement compared to other entitlements.

If a user desires to access an account in the scope of two different entitlements, then the entitlement with the highest priority (that is, the lowest number) takes precedence. For more information, see About priority precedence.

About priority precedence

An entitlement defines which users are authorized to checkout passwords for accounts in the scope of its policies. A policy defines scope (that is, which accounts) and the rules for checking out passwords, such as the duration, how many approvals are required, and so forth.

It is possible for an account to be governed by more than one entitlement, or is in the scope of more than one policy within an entitlement. Safeguard for Privileged Passwords uses both entitlement and policy priorities to determine which policy to use for a password release. Safeguard for Privileged Passwords first considers the entitlement priority, then the priorities of access request policies within that entitlement.

Example scenario:
  • Entitlement A (priority 1)
    • Policy: "Week Day Policy".
      • Policy time restrictions: Monday through Friday 8:00 a.m. to 5:00 p.m.
      • Scope: AccountX
  • Entitlement B (priority 2)
    • Policy 1: "Sunday AM" (priority 1)
      • Policy time restrictions: Sunday 8:00 to 12:00.
      • Scope: AccountX
    • Policy 2: "Sunday PM" (priority 2)
      • Policy time restrictions: Sunday 13:00 to 17:00.
      • Scope: AccountX

Notice that AccountX is in the scope of all three of these policies.

If a user requests the password for AccountX for Sunday at 4 p.m., Safeguard for Privileged Passwords first considers Entitlement A because it is priority 1. When it determines that the policy time restrictions prevent the password release, it then considers Entitlement B.

Safeguard for Privileged Passwords first considers Entitlement B's priority 1 policy. When it determines that the time restrictions prevent the password release, it then considers Policy 2. Once the request is satisfied, Safeguard for Privileged Passwords grants the request.

To change an entitlement's priority

  1. Select the priority number in the entitlement list.
  2. Enter another number.

To modify a policy's priority

  1. In Entitlements, select an entitlement and switch to the Access Request Policies tab.
  2. Double-click a policy, or select a policy and click  Edit Access Policy.
  3. Enter or select a new priority number.
  4. Click the Refresh button.

Time Restrictions tab

Time restrictions control when the entitlement is in effect relative to the user's time zone. For more information, see About time restrictions.

On the Time Restrictions tab, specify the time restriction properties for the entitlement.

Table 110: Entitlement: Time Restrictions tab properties
Property Description
Use Time Restrictions

Select this option to enforce time restrictions.

Daily calendar

Select and drag the hours you want to allow.

Have the Entitlement Expire on Date and Time

Select this option to enforce an expiration date, then enter the date and time.

When an entitlement expires, all the access request policies associated with the entitlement also expire. To set an expiration date on a policy, see Creating an access request policy.

About time restrictions

An entitlement's time restrictions enforce when Safeguard for Privileged Passwords uses a policy; a policy's time restrictions enforce when a user can access the account passwords. If the entitlement and the policy both have time restrictions, the user can only check out the password for the overlapping time frame.


Time restrictions control when the entitlement or policy is in effect relative to a user's time zone. Although Safeguard for Privileged Passwords Appliances run on Coordinated Universal Time (UTC), the user's time zone enforces the time restrictions set in the entitlement or policy. This means that if the appliance and the user are in different time zones, Safeguard for Privileged Passwords enforces the policy in the user's time zone set in his account profile.

Related Documents