https://<Appliance IP address>/docs/mib/SAFEGUARD-MIB.mib
To configure SNMP subscriptions
Enter the IP address or FQDN of the primary SNMP network server.
Limit: 255 characters
Enter the UDP port number for SNMP traps.
Enter the description of the SNMP subscriber.
Limit: 255 characters
Browse to select one or more SNMP event types.
Use the Clear icon to remove an individual event from this list or right-click and select Remove All to clear all events from the list.
Choose the SNMP version: Version 1 or Version 2.
Default: Version 2.
Enter the SNMP community string, such as "public".
The SNMP community string is like a user ID or password that allows access to a device's statistics, such as a router. A PRTG Network Monitor sends the community string along with all SNMP requests. If the community string is correct, the device responds with the requested information. If the community string is incorrect, the device simply discards the request and does not respond.
Use the Send Test Event link located under the SNMP table on the Settings | External Integration | SNMP pane.
To validate your setup
Safeguard for Privileged Passwords sends a test event notification to your SNMP console.
Integrating One Identity Safeguard for Privileged Passwords with One Identity Starling allows you to take advantage of companion features from Starling services, such as Starling Two-Factor Authentication and Starling Identity Analytics & Risk Intelligence.
In order to use Starling 2FA with Safeguard for Privileged Passwords's Approval Anywhere feature or as a secondary authentication provider, you must join Safeguard for Privileged Passwords to Starling. This is done from the Administrative Tools | Settings | External Integration | Starling pane in the Safeguard for Privileged Passwords desktop client. This pane also includes the following links, which provide assistance with Starling:
NOTE: In previous versions of Safeguard for Privileged Passwords, you had to specify a Starling API key in order to use Approval Anywhere and Starling Two-Factor Authentication as a secondary authentication provider. This is no longer necessary when you join Safeguard for Privileged Passwords to Starling. If you previously configured these features, once you join to Starling, Safeguard for Privileged Passwords automatically migrates your previous configurations to use the credential string generated by the join process.
It is the responsibility of the Appliance Administrator to join One Identity Safeguard for Privileged Passwords to Starling.
In order to use the companion features from Starling services, first configure the following:
A valid license for Safeguard for Privileged Passwords with One Identity Hybrid subscription included.
NOTE: You must have a valid license for at least one of the Safeguard modules: Privileged Passwords or Privileged Sessions.
To join Safeguard for Privileged Passwords with Starling
Click Join to Starling.
NOTE: The following additional information may be required:
After the join has successfully completed, you will be returned to the Safeguard for Privileged Passwords desktop client and the Starling settings pane will now show Joined to Starling.
To unjoin Safeguard for Privileged Passwords from Starling
Click Unjoin Starling.
Safeguard for Privileged Passwords will no longer be joined to Starling, which means that Approval Anywhere and two-factor authentication as a secondary authentication provider are also disabled in Safeguard for Privileged Passwords. A Starling Organization Admin account or Collaborator account associated with the Starling One Identity Hybrid subscription can rejoin Safeguard for Privileged Passwords to Starling at any time.
Safeguard for Privileged Passwords allows you to define one or more syslog servers to be used for logging Safeguard for Privileged Passwords event messages. Using this feature, Appliance Administrators can specify to send different types of messages to different syslog servers.
Navigate to Administrative Tools | Settings | External Integration | Syslog. The Syslog pane displays the following about each syslog server defined.
|Network Address||The IP address or FQDN of the syslog server.|
|Port||The UDP port number for syslog server.|
|Facility||The type of program being used to create syslog messages.|
|Description||The description of the syslog server configuration.|
|# of Events||The number of events selected to be logged to the syslog server.|
Use these toolbar buttons to manage the syslog server configurations.
|New||Add a new syslog server configuration. For more information, see Configuring a syslog server.|
|Refresh||Update the list of syslog server configurations.|
|Edit||Modify the selected syslog server configuration.|
|Copy||Clone the selected syslog server configuration.|