立即与支持人员聊天
与支持团队交流

One Identity Safeguard for Privileged Passwords 7.5.1 - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home page Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Global Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms Importing objects
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions

System services did not update or restart after password or SSH key change

If the system services do not update or restart after an automatic password or SSH key change, first check your audit logs in the Activity Center.

NOTE: You can also check the Support bundle logs.

If the audit logs do not adequately explain the problem, then check the options on the Change password or Change SSH key tab of the profile that governs the service account.

  1. Navigate to Asset Management > Partitions.
  2. Select a partition then click Password Profiles or SSH Key Profiles.
  3. Double-click the selection in the grid.
  4. On the profile dialog, go to the Change Password or Change SSH Key tab.

For service accounts that run system services or scheduled system tasks, verify the options on the profile's Change password tab or Change SSH Key tab that enable or disable automatic service update, or restart. You must update the setting to change these options.

Test Connection failures

The most common causes of failure in Safeguard for Privileged Passwords are either connectivity issues between the appliance and the managed system, or problems with service accounts.For more information, see Connectivity failures..

Disabling User Account Control (UAC) Admin Approval Mode on a remote host can also resolve Test Connection failures. For more information, see Change password or SSH key fails..

If you have entered values for Specify Domain Controllers and if SPP does not find a domain controller in the list, the test connection fails and an error is returned.

The following topics explain some possible reasons that Test Connection could fail.

Test Connection failures on archive server

There could multiple reasons why you receive an Unexpected copying error... when attempting to run Test Connection on an existing archive server.

When you run Test Connection, Safeguard for Privileged Passwords adds a file named Safeguard_Test_Connection.txt to the Storage Path location of the archive server owned by the Account Name you entered when you created the archive server. To run Test Connection on an existing archive server with a new account name, you must first delete the existing Safeguard_Test_Connection.txt file.

Certificate issue

If you are experiencing Test Connection failures for an asset that uses SSL, these are some possible causes:

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级