The process for creating the relying party trust in your STS (Security Token Service) will differ between applications and services. However, as stated earlier, you can download a copy of Safeguard for Privileged Passwords's federation metadata by clicking the link when you entered the STS information in Safeguard for Privileged Passwords. You can also download the Safeguard for Privileged Passwords federation metadata at any time using one of the following methods:
- Click Settings | External Integration |Identity and Authentication. Click Download Safeguard Federation Metadata.
- Download the file from the following URL:
https://<Safeguard for Privileged Passwords server>/RSTS/Saml2FedMetadata
If the STS does not support importing federation metadata, but instead requires you to manually input values, you will typically need an App ID and Login or Redirect URL. Both of these values can be copied from the Safeguard for Privileged Passwords federation metadata XML file you downloaded.
You must then configure or ensure that the STS returns the authenticated user's email address as a SAML attribute claim. The email address must appear in either the standard SAML email address claim or name claim:
If the emailaddress and name attribute claims are not present in the SAML assertion, the SAML Subject NameID can be used.
NOTE: Any other attributes or claims will be ignored.
The SAML Response or Assertion must be signed, but not encrypted. When the signing certificate used by your STS expires, you must update the metadata in Safeguard for Privileged Passwords by uploading a new copy of your STS's metadata file. Safeguard for Privileged Passwords will not automatically attempt to refresh the metadata.
NOTE: Your STS's metadata can contain more than one signing certificate to allow for a grace period between an expiring certificate and a new one.
For further details regarding specific STS servers, see the following knowledge base articles on the One Identity support site:
- Configuring Microsoft's AD FS Relying Party Trust for Safeguard for Privileged Passwords: KB Article 233669
- Configuring Microsoft's Azure AD for Safeguard for Privileged Passwords: KB Article 233671
It is the responsibility of either the Authorizer Administrator or the User Administrator to add an associated external federation Safeguard for Privileged Passwords user.
NOTE: You must add external federation service providers to Safeguard for Privileged Passwords before you can add external federation users.
NOTE: No user information, such as first name, last name, phone number, email address, is ever imported from the STS claims token. You must enter that information manually when creating the user in Safeguard for Privileged Passwords if you need it.
To add a user
- Navigate to Administrative Tools | Users.
- In Users, click Add User from the toolbar.
- In the User dialog, provide information in each of the tabs:
Safeguard for Privileged Passwords makes it possible for you to manage passwords for accounts on unsupported platforms and not addressed by a Custom platforms.
You will use a profile with a manual change password setting.
For example, you may have an asset that is not on the network. The manual change password setting allows you to comply with your company policies to change account passwords on a regular schedule without using the Safeguard for Privileged Passwords automatic change password settings. Safeguard for Privileged Passwords notifies you by email, toast notification, or both on a set schedule to change account passwords manually. You can then reset the password yourself, or allow Safeguard for Privileged Passwords to generate a random password according to the password rule selected in the profile.
Important: After you change the password in Safeguard for Privileged Passwords you must remember to change the password on the account; Safeguard for Privileged Passwords does not do that automatically for you.
The following summarizes the general workflow for managing accounts on unsupported platforms.
To manage account passwords manually
- Configure a profile with a manual change password setting and assign asset accounts to it. For more information, see Adding change password settings.
- Ensure toast notifications or email notifications are properly configured. For more information, see Settings (desktop client) or Enabling email notifications.
- When notified to change an account password, choose the Set Password option you prefer:
- Generate Password: To have Safeguard for Privileged Passwords generate a new random password , that complies with the password rule that is set in the account's profile.
- Click Generate Password to display the Password Change dialog.
- Click Show Password to reveal the new password.
Click Copy to place the value into your copy buffer.
- Log in to your device, using the old password, and change it to the value in your copy buffer.
- Click Success to change the password in the Safeguard for Privileged Passwords database.
- Manual Password: To manually set the account password in the Safeguard for Privileged Passwords database.
- Click Manual Password to display the Set Password dialog.
- Enter and save a new password.
OK updates the Safeguard for Privileged Passwords database.
- Set the account password on the physical device to synchronize it with Safeguard for Privileged Passwords.
Note: This topic assumes you have already performed the initial appliance installation and configuration steps in the One Identity Safeguard for Privileged Passwords Appliance Setup Guide provided in the box with your hardware equipment.
(web client) To modify the appliance configuration settings
- Log in to the Safeguard for Privileged Passwords web client using the Appliance Administrator account.
- Click Settings to go to the Settings: Appliance page.
- Click Networking to configure the appliance. For more information, see Networking.
On the Appliance Configuration page, configure the following:
- Network (X0): Enter the DNS Server address information for your primary interface.
- Sessions (X1): Configure the sessions interface. If one or more Safeguard Sessions Appliances are joined to Safeguard for Privileged Passwords, X1 is not available in Safeguard for Privileged Passwords.
- Click Save.
- Click Time to enable and view information about the Network Time Protocol (NTP):
- Select Enable NTP.
- Set the primary and secondary NTP servers, if desired.
- The Last Sync Time is displayed. To view or hide details, click Show Last Sync Details or Hide Last Sync Details. For more information, see Time.
- Click Save.
(desktop client) To modify the appliance configuration settings
- Log in using the Appliance Administrator account.
- Navigate to Administrative Tools | Settings | Appliance.
- Expand the Time pane to enable NTP and set the primary and secondary NTP servers. Click OK. For more information, see Time.
Expand the Appliance Information pane to change the appliance name.
- To change the appliance's name, click Edit next to the Appliance Name.
Expand the Networking pane to add or modify DSN suffixes and to configure the network interface for the embedded sessions module for Safeguard for Privileged Passwords. For more information, see Networking.
To change the DNS suffixes for your primary interface, click Edit next to the Network Interface X0 heading.
- Enter the DSN suffixes to be used.
- Click OK.
To configure the sessions interface, click Edit next to the Network Interface X1 heading. If one or more Safeguard Sessions Appliances are joined to Safeguard for Privileged Passwords, X1 is not available in Safeguard for Privileged Passwords.
- Enter the IP Address, netmask, and gateway information, and the DNS servers and suffixes.
- Click OK.