One Identity Safeguard for Privileged Passwords provides secure control of managed accounts by storing account files until they are needed, and releases them only to authorized persons.
Typically, a file release request follows this workflow.
-
Request: Users that are designated as an authorized user of an entitlement can request files for any account in the scope of that entitlement's policies.
-
Approve: Depending on how the Security Policy Administrator configured the policy, a file release request will either require approval by one or more Safeguard for Privileged Passwords users, or be auto-approved. This process ensures the security of account files, provides accountability, and provides dual control over the system accounts.
-
Review: The Security Policy Administrator can optionally configure an access request policy to require a review of completed file release requests for accounts in the scope of the policy.
If you are designated as an authorized user of an entitlement, you can request a file for any account in the scope of the entitlement's policies.
To request a file release
-
Click Home then New Request or open My Requests then click New Request.
NOTE: You can also submit an access request from your Favorites pane, if you previously saved it as a favorite.
-
On the New Access Request page, select the accounts to be included in the access request and the type of access being requested for each selected account. You can search for accounts based on asset information. The assets available for selection are based on the scope defined in the entitlement's access request policies.
-
NOTE: Use the button to select the columns to display.
-
Asset: The display name of the managed system.
-
Account: The available account appears in the Account column. When an asset has multiple accounts available, either Select Account(s) or the account name appears as a hyperlink in the Account column. Click the hyperlink in the Account column to display a list of accounts available and select the accounts to be included in the access request.
-
Access Type: The type of access request appears in the Access Type column. If the type is a drop-down, you can click the drop-down then multiple access request types are available. Click the drop-down and select the access type, in this case, File.
-
Account Description: (When applicable) The description of the account.
-
Asset Description: (When applicable) The description of the asset.
You can remove an asset or account from the list by clearing the check box associated with an entry in the grid.
-
Click Next.
-
On Request Details, configure the following settings, which will apply to all of the selected assets and accounts:
-
When: Select one of the following options:
-
Now: If selected, the request is immediately created.
-
Later: If selected, fields will appear allowing you to enter a specific date and time for the request in the user's local time.
-
How Long: Based on the policy, do one of the following:
-
View the Checkout Duration.
-
If the Allow Requester to Change Duration option is enabled in the policy, you can set the days, hours, and minutes that you want to use the password. This overrides the Checkout Duration set in the access request policy. For more information, see Creating an access request policy.
-
Comment: If required, enter information about this request. When multiple accounts are specified in the request, if any of the selected accounts require a comment, you must enter a comment. The comment will be applied to all of the requests associated with this access request. The limit is 1000 characters.
-
To save the access request as a favorite, select the Save this request as a favorite check box and enter a name for the request.
This access request is then added to your Favorites. In the web client, favorites are displayed on the Home page and the My Requests page.
-
After entering the required information, click Submit Request.
Additional information displays if the access requests submitted were unsuccessful with information on how to address the issues. Once they have been addressed, you can resubmit the request.
When the request has been approved, you can use the file. For more information, see Taking action on a file release request.
The actions that can be taken on a file release request depends on the state of the request.
To take action on a file release request
-
From the web client, click My Requests. Use any of the following methods to control the request displayed:
-
Click then select Check-In All Available to check-in all the available requests, Clear All to remove all requests, or Cancel All Pending Time Requested to cancel and remove all pending requests.
-
Click Sort By then select to sort by Account Name, Asset Name, Due Next, Expiring Next, Most Recent, or Status.
-
Click sort up or sort down to sort in ascending or descending order.
-
Click Filters to filter by the status.
-
Available: Approved requests that are ready to view or copy.
-
Pending Approval: Requests that are waiting for approval.
-
Approved: Requests that have been approved, but the check out time has not arrived. Or, for pending accounts restored when using the SPS suspend feature.
-
Revoked: Approved requests retracted by the approver. The approver can revoke a request after the request has become available.
-
Expired: Requests for which the Checkout Duration has elapsed.
-
Denied: Requests denied by the approver.
-
Click Search to see a list of searchable elements. Or enter search characters. For more information, see Search box.
-
If a denied or revoked request has been commented on by an approver, you can click the button associated with the request to view the comment.
-
You can take any of the following actions on the file release request:
-
Available request:
-
The name, account, and remaining time is displayed. Use the drop-down menu to select the Download File or the Fetch File Details button.
-
The following types of information are display if you click Fetch File Details button.
-
Name
-
Version
-
File Size
-
File Hashes
-
Once you are done working, click Check-In Request to complete the file check out process.
The Enterprise vault, similarly to the Personal password vault, extends security and credential protection to users to store and manage passwords, but it adds more capabilities. Users must have the Enterprise Vault permission granted.
Capabilities include:
-
Users can store any number of passwords, set optional expiration dates, and share passwords.
-
Users can set a time-based one-time password (TOTP) authenticator.
-
Users can use the Safeguard Enterprise Password Vault browser extension, which provides easy access to the username and password information for websites without opening the SPP web client.
-
Users have a history of personal password changes. This is handy if the user changes the password in the vault but not on the target account or if the user needs to work from a backup.
-
Users can share a password with multiple users and groups. For example, when one person owns an account used by a team, they can give coworkers access to a password.
-
Users can store passwords in an organization sanctioned and controlled tool.
-
Passwords are secured and encrypted. They are stored separately from managed account passwords.
-
Users can recover passwords of a disabled user by reassigning them to a new user.
-
The enterprise vault audits the retrieval and change of passwords so administrators know when users pulled information from the vault.
IMPORTANT: The Enterprise Vault permission, like any other permission, can be set explicitly on a user or inherited from a Directory Group. If a user with the Enterprise Vault permission stores one or more passwords and then later has the permission revoked, either explicitly or by having been removed from all Directory Groups from which they inherited it, the user will no longer be able to access Enterprise Vault features, but the user’s data within the vault will still be maintained. If at any point the user is granted the Enterprise Vault permission again, they regain access to all of their existing data.
For more information, see Permissions tab (add user)..
The Enterprise Vault page toolbar functions follow.
Table 15: Enterprise Vault: Toolbar
New |
Add an entry to the enterprise vault. |
Remove |
Remove one or more selected entries from the enterprise vault. After an entry is removed, you will not have access to the credentials. |
Refresh |
Refresh the list of entries. |
Edit |
Modify the selected entry. |
Stop Sharing |
Select one or more entries and click Stop Sharing.
NOTE: Only the owner of the entry can stop all sharing. |
Copy Account Name |
Copy the account name of the selected entry. |
Copy |
Copy the password of the selected entry. |
Open URL |
Click to open the URL web address entered when the password was added or edited. |
Browser Extension |
Click to get the Safeguard Enterprise Password Vault browser extension from the Chrome Web Store or to download it from the web client. |
Columns |
Click to select the columns you want to display.
NOTE: The following columns are not displayed by default:
|
Search |
Click to see a list of searchable elements, or enter search characters. For more information, see Search box. |
The grid displays entry details for various applications and systems.
Table 16: Enterprise Vault: grid
Name |
A meaningful name given to the application or account to access, for example Company X (Twitter). |
Account Name |
The user name used for log on authentication. |
URL |
The URL the credential applies to. This column is not displayed by default. |
Notes |
The notes added to the entry. This column is not displayed by default. |
Expires |
The date the credential is expired. |
Shared |
Shows if the credential is shared. Click the filter to filter based on whether the credential is shared or not.
|
Owner |
The owner of the enterprise vault entry. |
For more information on managing the Enterprise vault, see the following sections: