One Identity Safeguard 2.7 - User Guide

Reviewing a completed password release request

The Security Policy Administrator can configure an access request policy to require a review of completed password release requests for accounts in the scope of the policy.

You can configure Safeguard for Privileged Passwords to notify you of a password release request that requires your review. For more information, see Configuring alerts.

To review a completed password release request

  1. From your  Home page, the Reviews widget has these controls:
    1. Click  (expand down) to open the list of pending reviews.
    2. Click  Popout to float the Reviews pane.

      You can then select and drag the pane to any location on the console and re-size the window.

    Note: You enable or disable the Home page widgets in the  Console Settings menu.

  2. Open the list of pending reviews and select an account name to see the details of the password release request.
  3. Take the following action on password release requests:

    • Select Workflow to review the transactions that took place in the selected request.
    • Select  Review to complete the review process.

      Optionally, enter a comment of up to 255 characters.

    Once the review is complete, it no longer appears on the Reviews pane.

TIP: If one requester checks in the request and another requester wants to use it, the second requester is unable to check out the password until the original request has been reviewed. However, the Security Policy administrator can Close a request that has not yet been reviewed. This will bypass the reviewer in the workflow and allow the account to be accessed by another requester.

Session request workflow

Authorized users can authorize connections, view active connections, limit access to specific resources, be alerted if connections exceed pre-set time limits and even terminate connections.

Typically a session request follows the workflow below:

  1. Request: Users that are designated as an authorized "user" of an entitlement can request a session for any asset in the scope of that entitlement's policies.
  2. Approve: Depending on how the Security Policy Administrator configured the policy, a session request will either require approval by one or more Safeguard for Privileged Passwords users, or be auto-approved.
  3. Review: The Security Policy Administrator can optionally configure an access request policy to require a review of completed requests for assets in the scope of the policy. In addition, if session recording is enabled in the policy, reviewers can audit the workflow transactions and launch the Desktop Player to replay the session as part of the review process.

The following topics explain the entire end-to-end session access process from request to approval to review (and play back if sessions recording is enabled).

About sessions and recordings

One Identity Safeguard for Privileged Passwords proxies all sessions to target resources. Users do not have direct access to resources, therefore, the enterprise is protected against viruses, malware or other dangerous items on the user's system. Safeguard can proxy and record Unix/Linux, Windows, network devices, firewalls, routers and more.

Important notes
  • PuTTY is installed with the Windows desktop client and is used to launch the SSH client if PuTTY is not available on the machine.
  • Sessions requests are enabled by default. However, if authorized users cannot request sessions, check the Session Requests Enabled setting (Administrative Tools | Settings | Access Request | Enable or Disable Services).

    NOTE: You must have Appliance Administrator permissions to manage the service settings.

  • All session activity (every packet sent and action that takes place on the screen, including mouse movements, clicks and keystrokes) is recorded and available for play back.
  • If Safeguard for Privileged Passwords detects no activity for 10 minutes during a privileged session, the session is terminated.
  • It is highly recommended to assign an archive server for each Safeguard Appliance's session recording to avoid filling up the appliance's disk space.
Embedded session related notes
  • For some systems (SUSE and some Debian systems) that use SSH, you must enable password authentication in the package generated configuration file (sshd_config). For example, in the debian sshd_config file, set the following parameter: PasswordAuthentication yes.
  • Both SSH and RDP session recordings use the Timestamping Certificate Authority.

    Recordings are signed and timestamped every 30 seconds so that partial recordings may be verified as authentic.

  • During an RDP session, Safeguard proxies the connection to the target asset.

    When an RDP connection is established, the embedded sessions module will generate a certificate on the fly and sign it using the RDP Connection Signing Certificate. Therefore the RDP client trusts the RDP Connection Signing Certificate and the generated certificate that is signed by the RDP Connection Signing Certificate. This allows the client to verify that the connection is trusted.

  • During an SSH session, Safeguard proxies the connection to the target asset. Therefore, Safeguard for Privileged Passwords's SSH host key (Settings | Sessions | SSH Host Key) must be trusted by the client. This SSH host key is unique and produced during manufacturing. This key can be trusted by the client or replaced with a different key if desired.

Requesting session access

If you are designated as an authorized "user" of an entitlement, you can request access for a specific period (or session) to any account or asset in the scope of the entitlement's policies.

You can configure One Identity Safeguard for Privileged Passwords to notify you of pending access request workflow events, such as when a session request is pending, denied or revoked, and so forth. For more information, see Configuring alerts.

To request session access

  1. From your Home page, click New Request to open the New Access Request dialog.

    NOTE: You can also submit an access request from your Favorites pane, if you previously saved it as a favorite.

  2. On the Asset Selection tab, select the assets to be included in the access request.

    Limit: 50 assets

    The assets available for selection are based on the scope defined in the entitlement's access request policies.

  3. On the Account & Access Type tab, select the accounts to be included in the access request and the type of access being requested for each selected account. The accounts include linked accounts, if any. For more information, see Linked Accounts tab.

    • Account: The accounts available appear in the Account column. When an asset has multiple accounts available, either Select Account(s) or the account name appears as a hyperlink in the Account column. Click the hyperlink in the Account column to display a list of accounts available and select the accounts to be included in the access request.

      The accounts available for selection are based on the Asset-Based Session Access setting (Access Config tab) defined for the entitlement's access request policy. That is:

      • If None is selected in the access request policy, the accounts Safeguard for Privileged Passwords retrieved from the vault will be available for selection. The selected account will then be used when the session is requested.
      • If User Supplied is selected in the access request policy, you will be required to enter the user credentials as part of the request workflow, prior to launching the SSH or RDP session.

      • If Linked Account is selected in the access request policy, linked directory accounts will be available for selection. The selected account will then be used when the session is requested.
      • If Directory Account is selected in the access request policy, only the specified directory accounts will be available for selection. The selected directory account will then be used when the session is requested.

    • Access Type: The type of access request appears in the Access Type column. When multiple access request types are available, this value appears as a hyperlink, which when selected displays an additional dialog allowing you to select the access type. Select one of the following for a session request: RDP or SSH.

      The access type options available depend on the type of asset selected on the Asset Selection tab. For example, RDP is only available for Windows sessions.

    To remove an asset or account from the list, select the entry in the grid and click the Delete toolbar button.

  4. On the Request Details tab, configure the following settings, which will apply to all of the selected assets and accounts:
    1. Normal Access: (This option is only available if the policy has emergency access enabled.) Select this option to gain normal access to this password. Normal access ensures the access request goes through the entire end-to-end access release process from request to approval to review as defined in the policy by the Security Policy Administrator.

    2. Emergency Access: (This option is only available if the policy has emergency access enabled.) Select this option to gain immediate emergency access to this password. When you use Emergency Access, the request requires no approval.

    3. Request Immediately: Clear this option to enter a specific date and time for the request. Enter the time in the user’s local time.

    4. Checkout Duration: This either displays the checkout duration; or, if the Allow Requester to Change Duration option is enabled in the policy, it allows you to set the days, hours, and minutes that you want the password and overrides the checkout duration set in the access request policy.
    5. Ticket Number: Enter a valid ticket number for this request.

      Safeguard for Privileged Passwords does not display the Ticket Number option unless the Security Policy Administrator selected Require Ticket Number for this policy.

      When multiple accounts are specified in the request, if any of the selected accounts require a ticket number, you must specify a valid ticket number. The specified ticket number will be applied to all of the requests associated with this access request.

    6. Reason: Select an access request reason code for this request.

      Select the Description down arrow to view the description defined for the selected reason.

      Safeguard for Privileged Passwords does not display the Reason option unless the Security Policy Administrator selected reasons for this policy.

      When multiple accounts are specified in the request, if any of the selected accounts require a reason, you must specify a reason. The specified reason will be applied to all of the requests associated with this access request.

    7. Comment: Enter information about this request. When multiple accounts are specified in the request, if any of the selected accounts require a comment, you must enter a comment. The comment will be applied to all of the requests associated with this access request.

      Limit: 255 characters

  5. To save the access request as a favorite, click the Add to Favorites button.

    The Add to Favorites dialog displays allowing you to specify a name and description for the access request. It also allows you to assign a color to the request's icon.

    This access request is then added to your Home page Favorites pane. Selecting it from the Favorites pane displays the New Access Request dialog allowing you to edit the request details or enter a required reason or comment before submitting the request.

  6. After entering the required information, click Submit Request.

    The Access Request Result dialog displays showing you the access requests submitted and whether a request was successful.

Related Documents