立即与支持人员聊天
与支持团队交流

One Identity Safeguard for Privileged Passwords 6.0.11 LTS - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Getting started with the desktop client Using the desktop client Search box Privileged access requests Toolbox Accounts Account Groups Assets Asset Groups Discovery Entitlements Partitions Settings
Access Request settings Appliance settings Asset Management settings Backup and Retention settings Certificate settings Cluster settings External Integration settings Messaging settings Profile settings Safeguard Access settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP 2.7 or later migration guidance Appendix C: SPP and SPS join guidance Appendix D: Regular Expressions SPP glossary

Enabling or disabling a user

Typically, it is the responsibility of the Authorizer Administrator to enable or disable administrator users and the User Administrator to enable or disable non-administrator users. You can modify a disabled user's information. If a directory user is disabled in the directory asset, the user cannot be enabled in Safeguard.

Disabling a user prevents from logging in to Safeguard for Privileged Passwords; however, if you disable a directory user, that does not prevent that user from logging in to the directory.

When re-enabling a disabled account, the Authorizer Administrator must reset the user's password. Simply enabling the account does not permit the user to log in with the previous password.

You configure the number of days you want Safeguard for Privileged Passwords to wait before automatically disabling an inactive user account in the Disable After Login Control Setting. For more information, see Login Control.

To enable or disable a user

  1. Navigate to Administrative Tools | Users.
  2. In Users, select a user from the object list.
  3. In the upper-right corner of the window, click Enabled ( toggle on) or Disabled ( toggle off) to toggle to the setting.

Deleting a user

Typically, it is the responsibility of the Authorizer Administrator to delete administrator users and the User Administrator to delete non-administrator users.

NOTE: When you delete a local user, Safeguard for Privileged Passwords deletes the user permanently. If you delete a directory user that is part of a directory user group, the next time it synchronizes its database with the directory, Safeguard for Privileged Passwords will add it back in. As a best practice, disable the directory user instead of deleting the account. For more information, see Enabling or disabling a user.

To delete a user

  1. Navigate to Administrative Tools | Users.
  2. In Users, select a user from the object list.
  3. Click Delete Selected.
  4. Confirm your request.

Importing objects

Safeguard for Privileged Passwords allows you to import a .csv file containing a set of accounts, assets, or users. A .csv template for import can be downloaded when you click  Import from the toolbar. For more information, see Creating an import file.

Once an import is completed, you can navigate to the Tasks pane in the Toolbox for details about the import process and invalid data messages. For more information, see Viewing task status.

To import objects

  1. In Administrative Tools, click Assets, Accounts, or Users based on what data you are importing.
  2. Click  Import from the toolbar.
  3. In the Import dialog, Browse to select an existing .csv file containing a list of objects to import.
  4. When importing assets, the Discover SSH Host Keys option is selected by default indicating that Safeguard will retrieve the required SSH host key for the assets specified in the .csv file.
  5. Click OK.

    Safeguard for Privileged Passwords imports the objects into its database.

    NOTE: Safeguard for Privileged Passwords does not add an object if any column contains invalid data in the .csv file, with the following exceptions:

    • Assets PlatformDisplayName property:
      1. If Safeguard for Privileged Passwords does not find an exact match, it looks for a partial match. If it finds a partial match, it supplies the <platform> Other platform, such as Other Linux.
      2. If it does not find a partial match, it supplies the Other platform type.
    • Users TimeZoneId property:
      1. If Safeguard for Privileged Passwords does not find a valid TimeZoneId property (that is, does not find an exact match or no time zone was provided), it uses the local workstation's current time zone.

      NOTE: Do not enter numbers or abbreviations for the TimeZoneId.

    • Users Password property:
      1. Safeguard for Privileged Passwords adds a user without validating the password you provide.

Details for importing directory assets, service accounts, users, and user groups

You can use the steps like those above to import your existing directory infrastructure (such as Microsoft Active Directory). Managed account users cannot be members of the Protected Users AD Security Group.

Additional information specific to directory import follows.

  1. Import the directory (and service account) via Administrative Tools | Assets | Import Asset and browse to select the .csv file. Safeguard for Privileged Passwords imports the directory as an asset.

    The directory's service account is automatically added to the list of accounts you can viewed via the Assets | Accounts tab.

  2. Import users and user groups.
    1. Import directory users via Administrative Tools | Users | Import Users and browse to select the .csv file.
    2. Assign to user groups via Administrative Tools | Users Groups | Users (select one or multiple users).
    3. Automatic synchronization: Once you import directory users and directory groups, Safeguard for Privileged Passwords automatically synchronizes the objects in its database with the directory schema attributes. User and group membership changes in the directory are reflected in Safeguard for Privileged Passwords. Directory users authenticate to Safeguard for Privileged Passwords with their directory credentials.

Active Directory and LDAP synchronization

Active Directory and LDAP data is automatically synchronized by asset or identity and authentication providers schema as shown in the following lists.

Asset schema list

  • Users
    • Username
    • Password (modifiable in LDAP and not modifiable in Active Directory)
    • Description
  • Groups
    • Name
    • Member
  • Computer
    • Name
    • Network Address
    • Operating System
    • Operating System Version
    • Description

Identity and Authentication Providers schema list

  • Users
    • Username
    • First Name
    • Last Name
    • Work Phone
    • Mobile Phone
    • Email
    • Description
    • External Federation Authentication
    • Radius Authentication
    • Managed Objects
  • Groups
    • Name
    • Members
    • Description

Setting a local user's password

It is primarily the responsibility of the Authorizer Administrator to set passwords for administrators. The User Administrator and Help Desk Administrator set passwords for non-administrator local users. These administrators can only set passwords for local users. Directory user passwords are maintained in an external provider, such as Microsoft Active Directory.

To set a local user's password

  1. Navigate to Administrative Tools | Users.
  2. Select a local user from the object list and perform one of the following:
    • Right-click, and select  Set Password from the context menu.
    •  Click  User Security and select  Set Password.
    • On the General tab next to Authentication, click Edit and click Set Password.
  3. In the Set Password dialog, enter the new password and click OK. You must comply with the password requirements specified in the dialog. For more information, see Password Rule.
相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级