One Identity Safeguard 2.5 - Administration Guide

Introduction System requirements Installing the One Identity Safeguard for Privileged Passwords desktop client Setting up Safeguard for Privileged Passwords for the first time Getting acquainted with the console Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Directories Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Access settings Sessions settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions
How do I access the API How do I audit transaction activity How do I configure external federation authentication How do I manage accounts on unsupported platforms How do I modify the appliance configuration settings How do I prevent Safeguard for Privileged Passwords messages when making RDP connections How do I see which assets and/or accounts are governed by a profile How do I set the appliance system time How do I setup discovery jobs How do Safeguard for Privileged Passwords database servers use SSL What are the access request states What do I do when an appliance goes into quarantine What is required for One Identity Safeguard for Privileged Passwords, embedded sessions module What is required to integrate with Starling Identity Analytics & Risk Intelligence What needs to be set up to use Application to Application What role-based email notifications are generated by default When does the rules engine run for dynamic grouping and tagging Why did the password change during an open request Why join Safeguard for Privileged Passwords to One Identity Starling
Safeguard Desktop Player Appendix: Safeguard ports

Step 2: Appliance Administrator configures the appliance

NOTE: If one or more Safeguard Sessions Appliances are joined to Safeguard for Privileged Passwords, X1 is not available in Safeguard for Privileged Passwords.

  1. Log into the desktop client using the Appliance Administrator account.
  2. If you are using both the Privileged Passwords and embedded sessions module, ensure the Network Interface X0 (primary interface) and Network Interface X1 (sessions interface) information is configured (Settings | Appliance | Networking). After one or more Safeguard Sessions Appliances have been joined, only the Network Interface X0 is used. Configuration includes the following for each:

    1. IP address
    2. Netmask
    3. Default gateway
    4. DNS servers
    5. DNS suffixes

    For more information, see Networking.

  3. Ensure the access request and password management features are enabled. (Settings | Access Request | Enable or Disable Services).
  4. Configure the External Integration settings that apply (Settings | External Integration):
    1. Email: Configure the SMTP server to be used for email notifications. Safeguard for Privileged Passwords provides default email templates for most events, which can be customized.
    2. Identity and Authentication: Configure directory services such as Active Directory and LDAP servers to be used as identity and authentication providers for Safeguard for Privileged Passwords users. Configure Safeguard for Privileged Passwords as a relying party that uses SAML 2.0 to integrate with external federation services to authenticate users. Create a RADIUS server to be used as a primary or secondary authentication provider.
    3. SNMP: Configure SNMP subscriptions for sending SNMP traps to your SNMP console when certain events occur.
    4. Starling: Join Safeguard for Privileged Passwords to Starling to take advantage of other Starling services, such as Starling Two-Factor Authentication and Starling Identity Analytics & Risk Intelligence.
    5. Syslog: Configure the syslog servers where event notifications are to be sent.
    6. Ticketing: Add external ticketing tracking system.
  5. Safeguard ships with default certificates and default SSH algorithms for the Unix and Linux platforms. However, you can replace the certificates to use or add new algorithms.
    1. To specify different certificates to be used, see Certificate settings.
    2. To add new SSH algorithms, use the API endpoint:

      https://<Appliance IP>/service/core/swagger/SessionSshAlgorithms

Step 3: User Administrator adds users

  1. Log into the desktop client using the User Administrator account.
  2. Add users who can log into Safeguard for Privileged Passwords (Adding a user).
  3. Grant Help Desk Administrator permissions to one or more users.

Step 4: Asset Administrator adds managed systems

  1. Log into the desktop client using the Asset Administrator account.
  2. Add partitions and, optionally, delegate partition ownership to other users (Adding a partition).
  3. (Optional) Set the following Profile settings (or edit the default rules and settings defined when the partition was added):
    1. Account Password Rules
    2. Change Password
    3. Check Password
    4. Password Sync Groups
  4. (Optional) create partition profiles or edit the default profiles created (Creating a partition profile).
  5. Add assets to the appropriate partitions and profiles (Adding an asset).
  6. Add accounts to control access to the assets (Adding an account).

Step 5: Directory Administrator adds external identity stores

  1. Log into the desktop client using the Directory Administrator account.
  2. Add directories (Adding a directory).
  3. Add directory accounts to directories (Adding directory accounts to a directory).
  4. Create directory profiles (Creating a directory profile).
Related Documents