立即与支持人员聊天
与支持团队交流

One Identity Safeguard for Privileged Sessions 7.2 - Administration Guide

Preface Introduction The concepts of One Identity Safeguard for Privileged Sessions (SPS)
The philosophy of One Identity Safeguard for Privileged Sessions (SPS) Policies Credential Stores Plugin framework Indexing Supported protocols and client applications Modes of operation Connecting to a server through One Identity Safeguard for Privileged Sessions (SPS) Archive and backup concepts Maximizing the scope of auditing IPv6 in One Identity Safeguard for Privileged Sessions (SPS) SSH host keys Authenticating clients using public-key authentication in SSH The gateway authentication process Four-eyes authorization Network interfaces High Availability support in One Identity Safeguard for Privileged Sessions (SPS) Versions and releases of One Identity Safeguard for Privileged Sessions (SPS) Accessing and configuring One Identity Safeguard for Privileged Sessions (SPS)
Cloud deployment considerations The Welcome Wizard and the first login Basic settings
Supported web browsers The structure of the web interface Network settings Configuring date and time System logging, SNMP and e-mail alerts Configuring system monitoring on SPS Data and configuration backups Archiving Cleaning up audit data Using plugins Forwarding data to third-party systems Starling integration
User management and access control
Login settings Managing One Identity Safeguard for Privileged Sessions (SPS) users locally Setting password policies for local users Managing local user groups Managing One Identity Safeguard for Privileged Sessions (SPS) users from an LDAP database Authenticating users to a RADIUS server Authenticating users with X.509 certificates Authenticating users with SAML2 Managing user rights and usergroups Creating rules for restricting access to search audit data Displaying the privileges of users and user groups Listing and searching configuration changes
Managing One Identity Safeguard for Privileged Sessions (SPS)
Controlling One Identity Safeguard for Privileged Sessions (SPS): reboot, shutdown Managing One Identity Safeguard for Privileged Sessions (SPS) clusters Managing a High Availability One Identity Safeguard for Privileged Sessions (SPS) cluster Upgrading One Identity Safeguard for Privileged Sessions (SPS) Managing the One Identity Safeguard for Privileged Sessions (SPS) license Accessing the One Identity Safeguard for Privileged Sessions (SPS) console Sealed mode Out-of-band management of One Identity Safeguard for Privileged Sessions (SPS) Managing the certificates used on One Identity Safeguard for Privileged Sessions (SPS)
General connection settings HTTP-specific settings ICA-specific settings MSSQL-specific settings RDP-specific settings SSH-specific settings Using Sudo with SPS Telnet-specific settings VMware Horizon View connections VNC-specific settings Indexing audit trails Using the Search interface Advanced authentication and authorization techniques Reports The One Identity Safeguard for Privileged Sessions (SPS) REST API One Identity Safeguard for Privileged Sessions (SPS) scenarios Troubleshooting One Identity Safeguard for Privileged Sessions (SPS)
Network troubleshooting Gathering data about system problems Viewing logs on One Identity Safeguard for Privileged Sessions (SPS) Changing log verbosity level of One Identity Safeguard for Privileged Sessions (SPS) Collecting logs and system information for error reporting Collecting logs and system information of the boot process for error reporting Support hotfixes Status history and statistics Troubleshooting a One Identity Safeguard for Privileged Sessions (SPS) cluster Understanding One Identity Safeguard for Privileged Sessions (SPS) RAID status Restoring One Identity Safeguard for Privileged Sessions (SPS) configuration and data VNC is not working with TLS Configuring the IPMI from the BIOS after losing IPMI password Incomplete TSA response received Using UPN usernames in audited SSH connections
Using SPS with SPP Configuring external devices Using SCP with agent-forwarding Security checklist for configuring One Identity Safeguard for Privileged Sessions (SPS) Jumplists for in-product help Configuring SPS to use an LDAP backend Glossary

Streamable session recording playback with Safeguard Desktop Player started from the SPS UI

From SPS version 7.2, you can play back your session recordings with the Safeguard Desktop Player application started from the SPS UI. With this method, you do not have to start the Safeguard Desktop Player application outside SPS to start replaying your session recording. This method starts a streamable, on-demand playback. As a result, you do not have to wait for a potentially large file to completely download before you start replaying the recording.

NOTE: You can replay session recordings in your browser, or using the Safeguard Desktop Player application. Note that there are differences between these solutions.

For details on the Safeguard Desktop Player application, see Safeguard Desktop Player User Guide.

The following table details the differences between the solutions provided by the browser and the Safeguard Desktop Player application when replaying session recordings.

Browser Safeguard Desktop Player
Works without installation -
Works on any operating system Windows, Linux, Mac
Replays session recordings recorded with SPS 5 F4 and newer
Replays TN5250 sessions
Extracts files from SCP, SFTP, HTTP and RDP sessions -
Replays HTTP sessions - Only exports raw files from the command line
Replays X11 sessions
Starts replay while rendering is in progress
Follows 4-eyes connections -
Replays live streams in follow mode
Exports to PCAP -
Exports audit trail as video -
Exports screen content text -
Searches in the contents of the session recordings -

Caution:

From version 6.13.0, SPS does not support Internet Explorer 11 (IE11) anymore. SPS version 6.12.0 and previous versions continue to support IE11.

From SPS version 6.10, the Google WebM Video for Microsoft Internet Explorer plugin is not required for replaying audit trails in your browser. The supported browsers are:

  • Google Chrome

  • Firefox

  • Safari

  • Internet Explorer 11 (IE11) - supported until SPS version 6.12.0

For SPS version 6.9 and earlier versions, even though the One Identity Safeguard for Privileged Sessions (SPS) web interface supports Internet Explorer and Microsoft Edge in general, to replay audit trails, you need to use Internet Explorer 11, and install the Google WebM Video for Microsoft Internet Explorer plugin.

If you cannot install Internet Explorer 11 or another supported browser on your computer, use the the Safeguard Desktop Player application. For details, see "Replaying audit trails in your browser" in the Administration Guide and Safeguard Desktop Player User Guide.

NOTE: From SPS version 6.10 and onwards, you can play video files of audit trails both in central and in cluster environments. Previously, you could play the video files only on the Search Master node in a cluster environment. From SPS version 6.10 and onwards, you can play video files on Search Minion nodes as well.

Prerequisites
  • The Safeguard Desktop Player application is installed and properly configured.

    NOTE: Trying to open your session recording in Safeguard Desktop Player while the application is not installed or not properly configured opens a snackbar notification, taking you directly to the Installing Safeguard Desktop Player section in the One Identity Safeguard for Privileged SessionsSafeguard Desktop Player User Guide.

  • At least one recorded session is available on the Search page.

Replaying session recordings with Safeguard Desktop Player started from the SPS UI

With Safeguard Desktop Player installed, and at least one session recorded, you can start replaying started from the SPS UI.

To replay your session recordings with Safeguard Desktop Player started from the SPS UI

  1. On the Search page, select the session recording you want to replay.

  2. To display the details of a connection, click . This page is called the details view.

  3. Next to , click the playback options ( ) and choose .

    Depending on your browser, a confirmation window may appear. Verify that you want to open the Safeguard Desktop Player application.

    TIP: You can set your browser to always allow your localhost:<port-number> to open session recordings in Safeguard Desktop Player.

  4. (Optional) For encrypted sessions, upload any missing private keys or certificates, then click .

    Safeguard Desktop Player opens in a separate window.

    NOTE: SPS saves your most recently selected replay method for recorded sessions. Depending on which method you used before logging out previously, the SPS UI will display or when you next log in to SPS and navigate to the details view of your sessions. You can use replay options () to switch between replay methods.

  5. Authenticate with your SPS username and password.

    The recorded session starts replaying.

    For more information about using the Safeguard Desktop Player, see the One Identity Safeguard for Privileged SessionsSafeguard Desktop Player User Guide.

Viewing encrypted screenshots

This section provides information on how to view encrypted screenshots and on the private keys that are necessary to view them.

Prerequisites

To view encrypted screenshots in the Search interface, you have to upload the necessary private encryption keys to your audit keystore. Only RSA keys (in PEM-encoded X.509 certificates) can be uploaded to the audit keystore.

TIP: One Identity recommends using 2048-bit RSA keys (or stronger).

The private keys are stored locally, in your browser.

NOTE: If you clear your browser’s data, your audit keystore could be deleted. If your audit keystore is deleted, upload your private keys again.

To view encrypted screenshots

  1. On the Search page, select an encrypted audit trail.

  2. To display the details of a connection, click . This page is called the details view.

  3. To access the list of encrypted screenshots of the selected audit trail, click Events in the details view.

  4. Click the screenshot that you want to view.

  5. (Optional) Unlock your keystore.

    If you have private keys stored in your audit keystore, the Unlock keystore dialog is displayed.

    Figure 313: Unlock keystore — Enter your master password

    Enter your master password and click Unlock keystore.

    The keystore is unlocked and you can use your keys or you can add new keys.

  6. (Optional) If there is a missing private key, the Private keys missing dialog opens.

    Figure 314: Private keys missing dialog

    Click Upload private keys, which takes you to User menu > Audit keystore, where you can add the keys.

  7. (Optional) If necessary, add any missing certificates on Basic settings > Local services > Indexer service.

    Previously, the audit keystore was used to store certificates as well as private keys. From SPS version 6.10 and onwards, you must upload the certificates to Basic settings > Local services > Indexer service.

    For more information on how to add certificates, see Configuring the internal indexer.

Result

Once you add the necessary private keys to your audit keystore, you can view the encrypted screenshots in the Search interface.

Replaying encrypted audit trails in your browser

This section provides information on the necessary private keys and certificates for playing encrypted audit trails in your browser and on how to open a video file of an audit trail.

Prerequisites

To replay encrypted audit trails in your browser, you have to upload the necessary private keys to your audit keystore and the corresponding certificates to Basic settings > Local services > Indexer service. Depending on the encryption, decrypting the upstream part of an audit trail may require an additional set of certificates and keys.

Only RSA keys (in PEM-encoded X.509 certificates) can be uploaded to the private keystore.

TIP: One Identity recommends using 2048-bit RSA keys (or stronger).

NOTE: Certificates are used as a container and delivery mechanism. For encryption and decryption, only the keys are used.

Use every keypair or certificate only for one purpose. Do not reuse cryptographic keys or certificates (for example, do not use the certificate of the One Identity Safeguard for Privileged Sessions (SPS) webserver to encrypt audit trails, or the same keypair for signing and encrypting data).

For more information, see Encrypting audit trails and Replaying audit trails in your browser.

NOTE: You can only upload certificates permanently. Uploading certificates temporarily is not supported anymore.

To replay encrypted audit trails in your browser

  1. On the Search page, select the audit trail you want to replay.

  2. To display the details of a connection, click . This page is called the details view.

    NOTE: If you select the Automatic refresh option in User menu > Preferences, all the details of the sessions are refreshed automatically in the details view. For more information on the Automatic refresh option, see Preferences.

  3. To play the video file, click .

  4. (Optional) Unlock your keystore.

    If you have private keys stored in your audit keystore, the Unlock keystore dialog is displayed.

    Figure 315: Unlock keystore — Enter your master password

    Enter your master password and click Unlock keystore.

    The keystore is unlocked and you can use your keys or you can add new keys.

  5. (Optional) If there is a missing private key, the Private keys missing dialog opens.

    Figure 316: Private keys missing dialog

    Click Upload private keys, which takes you to User menu > Audit keystore, where you can add the keys.

  6. (Optional) If necessary, add any missing certificates on Basic settings > Local services > Indexer service.

    Previously, the audit keystore was used to store certificates as well as private keys. From SPS version 6.10 and onwards, you must upload the certificates to Basic settings > Local services > Indexer service.

    For more information on how to add certificates, see Configuring the internal indexer.

    After uploading the private keys and the corresponding certificates, the encrypted upstream traffic elements are decrypted. The trail is decrypted and decompressed on the client-side. As a result, the encrypted elements will be displayed distributed in the video (for more information, see Player window controls in Replaying audit trails in your browser).

  7. (Optional) After uploading any missing private keys or certificates, to play the video, click .

    1. (Optional) If there are more channels that can be played, select the channel that you want to play in the Multiple channels are available dialog and click Play video.

      Figure 317: Multiple channels are available dialog

      The Player window opens.

  8. (Optional) To download the video file, click .

For more information on how to use the browser to play video files, see Using the browser to play video files.

Following active sessions

If a session is not closed but it is still active, the label is displayed in the session details window and you can follow or terminate active sessions.

  1. On the Search page, select the audit trail you want to replay.

  2. To display the details of a connection, click . This page is called the details view.

    NOTE: If you select the Automatic refresh option in User menu > Preferences, all the details of the sessions are refreshed automatically in the details view. For more information on the Automatic refresh option, see Preferences.

  3. Click .

  4. Select where you want to follow the active session.

    1. To follow the session in the browser, select Follow in browser.

    2. To follow the session on Safeguard Desktop Player, select Follow in Safegurad Desktop Player.

      The trail data is exported in .srs format, which you can download and open with Safeguard Desktop Player.

      For more information on the Safeguard Desktop Player, see Safeguard Desktop Player User Guide.

  5. (Optional) To terminate the active session, click .

    This button is displayed only if you have the rights to perform this operation.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级