Chat now with support
Chat with Support

One Identity Safeguard for Privileged Passwords 2.5 - Administration Guide

Introduction System requirements Installing the One Identity Safeguard for Privileged Passwords desktop client Setting up Safeguard for Privileged Passwords for the first time Getting acquainted with the console Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Directories Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Access settings Sessions settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions
How do I access the API How do I audit transaction activity How do I configure external federation authentication How do I manage accounts on unsupported platforms How do I modify the appliance configuration settings How do I prevent Safeguard for Privileged Passwords messages when making RDP connections How do I see which assets and/or accounts are governed by a profile How do I set the appliance system time How do I setup discovery jobs How do Safeguard for Privileged Passwords database servers use SSL What are the access request states What do I do when an appliance goes into quarantine What is required for One Identity Safeguard for Privileged Passwords, embedded sessions module What is required to integrate with Starling Identity Analytics & Risk Intelligence What needs to be set up to use Application to Application What role-based email notifications are generated by default When does the rules engine run for dynamic grouping and tagging Why did the password change during an open request Why join Safeguard for Privileged Passwords to One Identity Starling
Safeguard Desktop Player Appendix: Safeguard ports

Modifying a user

The Authorizer Administrator and the User Administrator can modify the general information for a user.

To modify a user's information

  1. Navigate to Administrative Tools | Users.
  2. In Users, select a user from the object list.
  3. Double-click the user's name to open the User settings edit window.

    Note: You can also double-click the Identity, Authentication, Location, or Permissions edit box on the General tab (or click the  Edit icon) to go directly to that view.

    For example:

    • To modify a user's authentication provider, change the user's password, or enter an alternate mobile phone number, double-click the Authentication box, or click the  Edit icon.
    • To change a local user's contact information, double-click the Identity box on the General tab or click the  Edit icon.

      Note: You cannot modify a directory user's contact information that is managed in the directory, such as Active Directory. If you need to add a valid mobile phone number, use the alternate mobile phone number option on the Authentication tab instead.

    • To modify the administrator permissions, double-click the Permissions box on the General tab or click the  Edit icon.

      TIP: As a best practice, to prevent users from gaining access to information after you change their administrative permissions, ensure that the user closes all connections to the appliance (or reboot the appliance).

      NOTE:  Help Desk Administrators, Asset Administrators, and Security Policy Administrators can only view the user object history for their own account.

  4. The Security Policy Administrator can modify a user's group membership on the user's User Groups tab.

    Note: You can multi-select user groups to add or remove more than one user on a user's group membership.

  5. The Asset Administrator can delegate partition ownership to a user on the user's Partitions tab.
  6. The Security Policy Administrator can add the selected user to an entitlement on the user's Entitlements tab.
  7. The Security Policy Administrator can add (or remove) linked accounts to an entitlement on the user's Linked Accounts tab.
  8. The Authorizer Administrator and the User Administrator can view or  Export the details of each operation that has affected the selected use on the History tab.

    Note: Help Desk Administrators, Asset Administrators, and Security Policy Administrators can only view the user object history for their own account.

Deleting a user

Typically, it is the responsibility of the Authorizer Administrator to delete administrator users and the User Administrator to delete non-administrator users.

Important: When you delete a local user, Safeguard for Privileged Passwords deletes it permanently. If you delete a directory user that is part of a directory group, next time it synchronizes its database with the directory, Safeguard for Privileged Passwords will add it back in.

To delete a user

  1. Navigate to Administrative Tools | Users.
  2. In Users, select a user from the object list.
  3. Click Delete Selected.
  4. Confirm your request.

TIP: As a best practice, disable the directory user instead of deleting the account. For more information, see Enabling or disabling a user.

Importing objects

Safeguard for Privileged Passwords allows you to import a .csv file containing a set of accounts, assets, or users.

To import a set of objects

  1. Click  Import from the toolbar.
  2. In the Import dialog, Browse to select an existing .csv file containing a list of objects to import.

    Note: For assistance in creating an import file, click CSV Template Assistant. For more information, see Creating an import file.

  3. When importing assets, the Discover SSH Host Keys option is selected by default indicating that Safeguard will retrieve the required SSH host key for the assets specified in the CSV file.
  4. Click OK.

    Safeguard for Privileged Passwords imports the objects into its database.

    Note: Safeguard for Privileged Passwords does not add an object if any column contains invalid data in the .csv file with the follow exceptions:

    • Assets PlatformDisplayName property.
      1. If Safeguard for Privileged Passwords does not find an exact match, it looks for a partial match. If it finds a partial match it supplies the <platform> Other platform, such as "Other Linux".
      2. If it does not find a partial match, it supplies the Other platform type.
    • Users TimeZoneId property.
      1. If Safeguard for Privileged Passwords does not find a valid TimeZoneId property (that is, does not find an exact match or no timezone was provided), it uses the local workstation's current timezone.

        Note: Do not enter numbers or abbreviations for the TimeZoneId.

    • Users Password property.
      1. Safeguard for Privileged Passwords adds a user without validating the password you provide.
  5. Navigate to the Tasks pane in the Toolbox for details about the import process and invalid data messages. For more information, see Viewing task status.

Setting a local user's password

It is primarily the responsibility of the Authorizer Administrator to set passwords for administrators; and the User Administrator and Help Desk Administrator to set passwords for non-administrator local users.

Note: These administrators can only set passwords for local users. Directory user passwords are maintained in an external provider, such as Microsoft Active Directory.

There are three ways to set a password.

To set a local user's password

  1. Navigate to Administrative Tools | Users.
  2. In Users, select a local user from the object list, right-click (or press and hold) and select  Set Password from the context menu.

    -OR-

    Click the  User Security menu and select  Set Password.

    -OR-

    Open the Authentication box on the General tab and click Set Password.

  3. In the Set Password dialog, enter the new password and click OK.

    Note: You must comply with the password requirements specified in the dialog. For more information, see Password Rules.

Related Documents