Chat now with support
Chat with Support

One Identity Safeguard for Privileged Sessions 6.0.5 - Administration Guide

Preface Introduction The concepts of One Identity Safeguard for Privileged Sessions (SPS) The Welcome Wizard and the first login Basic settings
Supported web browsers and operating systems The structure of the web interface Network settings Configuring date and time System logging, SNMP and e-mail alerts Configuring system monitoring on SPS Data and configuration backups Archiving and cleanup Forwarding data to third-party systems Joining to One Identity Starling
User management and access control Managing One Identity Safeguard for Privileged Sessions (SPS)
Controlling One Identity Safeguard for Privileged Sessions (SPS): reboot, shutdown Managing Safeguard for Privileged Sessions (SPS) clusters Managing a high availability One Identity Safeguard for Privileged Sessions (SPS) cluster Upgrading One Identity Safeguard for Privileged Sessions (SPS) Managing the One Identity Safeguard for Privileged Sessions (SPS) license Accessing the One Identity Safeguard for Privileged Sessions (SPS) console Sealed mode Out-of-band management of One Identity Safeguard for Privileged Sessions (SPS) Managing the certificates used on One Identity Safeguard for Privileged Sessions (SPS)
General connection settings HTTP-specific settings ICA-specific settings RDP-specific settings SSH-specific settings Telnet-specific settings VMware Horizon View connections VNC-specific settings Indexing audit trails Using the Search interface Searching session data on a central node in a cluster Advanced authentication and authorization techniques Reports The One Identity Safeguard for Privileged Sessions (SPS) RPC API The One Identity Safeguard for Privileged Sessions (SPS) REST API One Identity Safeguard for Privileged Sessions (SPS) scenarios Troubleshooting One Identity Safeguard for Privileged Sessions (SPS) Using SPS with SPP Configuring external devices Using SCP with agent-forwarding Security checklist for configuring One Identity Safeguard for Privileged Sessions (SPS) Jumplists for in-product help LDAP user and group resolution in SPS Appendix: Deprecated features Glossary

Creating and editing protocol-level HTTP settings

HTTP settings determine the parameters of the connection on the protocol level, including timeout value, and so on.

Caution:

Modifying timeout settings is recommended only to advanced users. Do not modify these settings unless you exactly know what you are doing.

To create a new HTTP settings profile or edit an existing one

  1. Navigate to the Settings tab of the HTTP Control menu item and click to create a HTTP setting profile. Enter a name for the profile (for example http_special).

    Figure 169: HTTP Control > Settings — Creating and editing protocol-level HTTP settings

  2. Click to display the parameters of the profile.

  3. Modify the parameters as needed. The following parameters are available:

    • Idle timeout: Timeout value for the session in seconds. To avoid early timeout, set it to a larger value, for example a week (604800 seconds).

      Caution:

      Determining if a connection is idle is based on the network traffic generated by the connection, not the activity of the user. For example, if an application or the taskbar of a graphical desktop displays the time which is updated every minute, it generates network traffic every minute, negating the effects of timeout values greater than one minute and preventing One Identity Safeguard for Privileged Sessions (SPS) from closing the connection.

    • Session timeout: Timeout value for the session in seconds.

    • Enable pre channel check: Select this option to evaluate the connection and channel policies before establishing the server-side connection. That way if the connection is not permitted at all, SPS does not establish the server-side connection.

      NOTE:

      This option cannot be disabled.

  4. To distinguish the audited HTTP requests and responses based on the session cookies of web applications, click Session Cookie Settings > , and enter the name of the session cookie, for example, PHPSESSID, JSESSIONID, or ASP.NET_SessionId. Note that the names of session cookies are case sensitive.

    Repeat this step to add multiple cookie names. Note that if you list multiple cookie names, SPS will use the first one it finds to assign the requests to a session.

  5. To configure TLS security settings on both the Client side and the Server side, proceed to TLS security settings.

    Figure 170: <Protocol> Control > Settings > TLS security settings - configuring TLS security settings

    • Cipher strength specifies the cipher string OpenSSL will use. The following settings options are possible:

      • Recommended: this setting only uses ciphers with adequate security level.

      • Custom: this setting allows you to specify the list of ciphers you want to permit SPS to use in the connection. This setting is only recommended in order to ensure compatibility with older systems. For more details on customizing this list, check the 'openssl-ciphers' manual page on your SPS appliance.

        For example: ALL:!aNULL:@STRENGTH

    • Minimum TLS version specifies the minimal TLS version SPS will offer during negotiation. The following settings options are possible:

      • TLS 1.2: this setting will only offer TLS version 1.2 during negotiation. This is the recommended setting.

      • TLS 1.1: this setting will offer TLS version 1.1 and later versions during negotiation.

      • TLS 1.0: this setting will offer TLS version 1.0 and later versions during negotiation.

    NOTE:

    Note that SPS only permits TLS-encrypted connections. SSLv3 is not supported.

  6. Click Commit.

  7. Select this settings profile in the HTTP settings field of your connections.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating