Chat now with support
Chat with Support

Safeguard for Sudo 2.0 - Administrators Guide

One Identity Privileged Access Suite for Unix Introducing Privilege Manager for Unix Introducing Privilege Manager for Sudo Planning Deployment Installation and Configuration
Download Privilege Manager for Unix Software Packages Download Privilege Manager for Sudo Software Packages Quick Start and Evaluation Configure a Primary Policy Server Configure a Secondary Policy Server Install PM Agent or Sudo Plugin on a Remote Host Remove Configurations
Upgrading Privilege Manager System Administration Managing Security Policy The Privilege Manager for Unix Security Policy Advanced Privilege Manager for Unix Configuration Administering Log and Keystroke Files InTrust Plug-in for Privilege Manager Troubleshooting Privilege Manager for Unix Policy File Components Privilege Manager Variables Privilege Manager for Unix Flow Control Statements Privilege Manager for Unix Built-in Functions and Procedures Privilege Manager Programs Installation Packages Unsupported Sudo Options Sudo Plugin Policy Evaluation About us

Listing Policy File Revisions

System Administration > Listing Policy File Revisions

After you have made several revisions to your policy file under source control, you can view the list of policy file versions stored in the repository.

To display all previous version numbers with timestamps and commit logs

  1. From the command line, enter:
    # pmpolicy log

    This command returns output similar to this:

    ** Validate options          [ OK ] 
    ** Check out working copy    [ OK ] 
    ** Retrieve revision details [ OK ] 
    version="2",user="pmpolicy",date=2011-05-11,time=19:19:47,msg="added tuser" 
    version="1",user="pmpolicy",date=2011-05-11,time=15:56:12,msg="First import"

Viewing Differences Between Revisions

System Administration > Viewing Differences Between Revisions

You can view the changes from revision to revision of a policy file.

To show the differences between version 1 and version 3

  1. From the command line, enter:
    # pmpolicy diff –r:1:3

    This command returns output similar to this:

    ** Validate options [ OK ] 
    ** Check out working copy [ OK ] 
    ** Check differences [ OK ] 
    ** Report differences between selected revisions [ OK ] 
    Index: sudoers 
    --- sudoers	(revision 1) 
    +++ sudoers	(revision 3) 
    @@ -13,6 +13,7 @@ 
      ## User privilege specification 
      root ALL=(ALL) ALL 
    +tuser, = /usr/bin/whoami 
      ## Uncomment to allow members of group wheel to execute any command 
      # %wheel ALL=(ALL) ALL

    The output reports lines removed and lines added in a unified diff format.

Backup and Recovery

System Administration > Backup and Recovery

It is important for you to perform systematic backups of the following directories on all policy servers:

  • /var/opt/quest/qpm4u which contains:
    • Event Logs
    • Keystroke Logs (I/O logs)
    • SVN Repository
    • SSH Keys
    • pmpolicy
  • /etc/opt/quest/qpm4u which contains:
    • Settings File
    • Production Policy
  • /opt/quest/qpm4u/.license* which contains:
    • License Files
  • /opt/quest/qpm4u/license* which contains:
    • License Files
  • /opt/quest/qpm4u/install which contains:
    • Install Logs
    • End User License Agreement (EULA)

NOTE: When recovering from a failure, keep the same hostname and IP address.

Managing Security Policy

Managing Security Policy

The Privilege Manager security system consists of one or more centralized policy servers and one or more remote clients. A user wishing to run a command secured by Privilege Manager makes a request to their client. The request is then propagated to the policy server which consults a security policy to determine whether to allow or disallow the command. A typical Privilege Manager installation has several policy servers to provide adequate fail-over and load-balancing coverage.

The Privilege Manager policy servers are capable of recording all the activity which passes through them. The power to accurately log root, and other account activities in a safe environment allows you to implement a secure system administration regime with an indelible audit trail. You always know exactly what is happening in root, as well as who did it, when it happened, and where.

The data created by the Privilege Manager policy servers is stored in a log file called an event log. An entry in the event log is made every time a policy server is used to run a command.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating