Chat now with support
Chat with Support

One Identity Safeguard for Privileged Passwords 2.5 - Administration Guide

Introduction System requirements Installing the One Identity Safeguard for Privileged Passwords desktop client Setting up Safeguard for Privileged Passwords for the first time Getting acquainted with the console Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Directories Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Access settings Sessions settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions
How do I access the API How do I audit transaction activity How do I configure external federation authentication How do I manage accounts on unsupported platforms How do I modify the appliance configuration settings How do I prevent Safeguard for Privileged Passwords messages when making RDP connections How do I see which assets and/or accounts are governed by a profile How do I set the appliance system time How do I setup discovery jobs How do Safeguard for Privileged Passwords database servers use SSL What are the access request states What do I do when an appliance goes into quarantine What is required for One Identity Safeguard for Privileged Passwords, embedded sessions module What is required to integrate with Starling Identity Analytics & Risk Intelligence What needs to be set up to use Application to Application What role-based email notifications are generated by default When does the rules engine run for dynamic grouping and tagging Why did the password change during an open request Why join Safeguard for Privileged Passwords to One Identity Starling
Safeguard Desktop Player Appendix: Safeguard ports

Adding a managed network

Use the Managed Networks page on the Cluster settings view to add managed networks, which can be used to distribute the task load in a clustered environment. It is the responsibility of the Appliance Administrator to define and maintain managed networks.

To add a managed network

  1. Navigate to Administrative Tools | Settings | Cluster | Managed Networks.
  2. Click Add.
  3. In the Managed Network dialog, provide the following information:
    1. Name: Enter the display name for the managed network.

      Limit: 50 characters

      Required

    2. Description: (Optional) Enter information about the managed network.

      Limit: 255 characters

    3. Subnets: Click Add to specify the subnets, or group of hosts, to be managed.

      Enter each subnet using CIDR notation. For example, 0.0.0.0/0.

      NOTE: You can add a subnet to only one managed network. You will receive an error if you attempt to add the same subnet to another managed network. If you are unsure if an IP address has already been associated with a managed network, use the Resolve Network search box. For more information, see Resolving IP address.

    4. Managed By: Select the appliances to be used to manage the specified subnets.

      NOTE: You do not need to specify an appliance when you initially define a managed network. You can use the Edit button to specify the managing appliance at a later time.

  4. Click OK to save your selections and add the managed network.

Deleting a managed network

To delete a managed network

  1. Navigate to Administrative Tools | Settings | Cluster | Managed Networks.
  2. Select the managed network to be deleted, click Delete.
  3. In the confirmation dialog, click Yes.

Resolving IP address

As an Appliance Administrator you can use the Managed Networks page to search for an IP address within a managed network's list of subnets.

To find an IP address in a managed network

  1. Navigate to Administrative Tools | Settings | Cluster | Managed Networks.
  2. In the Resolve Network search box, type the IP address, and press Enter.

    The managed network that contains the subnet that most closely matches the IP address is highlighted. If there are no subnets that match the IP address, the Default Managed Network is highlighted.

External Integration settings

The Appliance Administrator can configure the appliance to send event notifications to various external systems, the integration with an external ticketing system, and configure both external and secondary authentication service providers. However, it is the Security Policy Administrator's responsibility to configure the Approval Anywhere feature.

Navigate to Administrative Tools | Settings | External Integration.

Table 184: External Integration settings
Setting Description

Application to Application

Where you configure application registrations to use the Application to Application service, which allows third-party applications to retrieve credentials from Safeguard for Privileged Passwords.

Approval Anywhere

Where you define the Safeguard for Privileged Passwords users who are authorized to use Approval Anywhere to approve access requests.

Email

Where you configure Safeguard for Privileged Passwords to automatically send email notifications when certain events occur.

Identity and Authentication

Where you configure the identity providers and authentication providers to use when logging into Safeguard for Privileged Passwords.

Sessions management

Where you can view the Sessions Appliances that are joined and have a session connection. You can edit or delete the joined Sessions Appliance connection.

SNMP

Where you configure Safeguard for Privileged Passwords to send SNMP traps to your SNMP console when certain events occur.

Starling

Where you join Safeguard for Privileged Passwords to Starling to take advantage of other Starling services, such as Starling Two-Factor Authentication and Starling Identity Analytics & Risk Intelligence.

Syslog

Where you configure Safeguard for Privileged Passwords to send event notifications to a syslog server with details about the event.

Ticketing

Where you configure Safeguard for Privileged Passwords to integrate with your company's external ticket system.
Related Documents