Safeguard for Privileged Passwords can be run from:
- The One Identity Safeguard for Privileged Passwords 3000 Appliance or 2000 Appliance (hardware)
- A virtual machine
- The cloud
This section covers the background and steps you need to deploy from the cloud for the first time.
Safeguard for Privileged Passwords can be run from the cloud.
Before you start: platforms and resources
When setting up a virtual environment, carefully consider the configuration aspects such as CPU, memory availability, I/O subsystem, and network infrastructure to ensure the virtual layer has the necessary resources available. See One Identity's Product Support Policies for more information on environment virtualization.
Platforms that have been tested with the cloud deployments follow.
For these deployments, the minimum resources used in test are 4 CPUs, 10GB RAM, and a 60GB disk.
Restricting access to the web management kiosk for cloud deployments
The web management kiosk runs on port 9337 in Azure and is intended for diagnostics and troubleshooting by Appliance Administrators.
CAUTION: The Management web kiosk is available via HTTPS port 9337 for cloud platforms (including Azure). The Management web kiosk gives access to functions without authentication, such as pulling a support bundle or rebooting the appliance.
Azure: Block port 9337
Use the following steps to block access to port 9337 in Azure.
- Navigate to the virtual machine running Safeguard for Privileged Passwords.
- In the left hand navigation menu select Networking.
- Click Add inbound port rule.
- Configure the inbound security rule as follows:
Source port ranges: *
Destination port ranges: 9337
Priority: 100 (use the lowest priority for this rule)
- Click Add.
Safeguard for Privileged Passwords (SPP) can be run in the cloud using Azure. A version of Safeguard for Privileged Passwords is available in the Azure Marketplace and an Azure Virtual Machine (VM) is required. See Windows virtual machines in Azure for details of setting up your VM.
When using Azure, Safeguard for Privileged Passwords is available on HTTPS X0. The Azure deployment does not use the MGMT service. The Recovery (Serial) Kiosk is used to view appliance information, Administrator password reset, power restart or shut down, and generating a support bundle. For more information, see Recovery Kiosk (Serial Kiosk).
Disk size considerations
Safeguard for Privileged Passwords (SPP) deploys with a minimal OS disk size, typically 30GB. You should increase the size of the OS disk based on your estimated usage and budget. SPP on hardware comes with 1TB of disk. You can use more or less than this depending on how many assets, accounts, and daily users you expect to have. 500GB is a minimal production disk size and 2TB is the maximum. Currently, a minimum of 60GB is required for patching up.
- Deploy SPP.
- Verify you can log in.
- Shut down the VM (stopped and deallocated).
- Follow Microsoft’s guidance for increasing the disk size: How to expand the OS drive of a virtual machine.
When you start up the VM, SPP automatically resizes the OS disk volume to use the available space.
Azure security considerations
Running Safeguard for Privileged Passwords (SPP) in Azure comes with some security considerations that do not apply to the hardware appliance. We recommend:
Static IP address recommended
Configure the SPP VM with a static IP address in Azure. In Azure, the IP address must not change after the VM is deployed. If you need to change the IP address, take a backup, deploy again, and restore the backup. You can script the VM deploy to pick up an existing virtual NIC with the IP address configuration. For details, see Microsoft’s Virtual Network documentation.
Safeguard for Privileged Passwords is deployed from the Azure Marketplace. Azure automatically licenses the operating system during the deployment with an Azure KMS.
The Azure base image includes the required configuration necessary to deploy into Azure following Microsoft's guidance, Prepare a Windows VHD or VHDX to upload to Azure.
- Log into the Azure portal.
- Under Azure services, click Create a resource.
Search for “One Identity Safeguard for Privileged Passwords” and click the tile.
- On the One Identity Safeguard for Privileged Passwords screen, click Create.
- Advance through the resource creation screens. Considerations follow:
- For small deployments, it is recommended to choose at least VM size Standard D2s v3. Larger deployments warrant larger sizing choices. Safeguard hardware appliances have 32GB of RAM and 4 processors with at least 1 TB of disk space.
- You must set an administrator user name and password as part of the image creation, however, SPP will disable this account during initial setup.
- Set public inbound ports to None.
- Choose your Windows licensing option.
- Make sure to enable boot diagnostics and the serial kiosk. The Azure Serial console will be used to provide access to the Safeguard Recovery Kiosk.
- Once you are finished configuring the VM, click Create. Azure will deploy the SPP virtual machine.
- When the virtual machine deployment is finished, SPP will automatically start initializing and configuring itself for the first use. This usually takes between 5-30 minutes, depending on the VM sizing. During initialization, Safeguard will enable the firewall and disable remote access to the VM. You can monitor the progress of initialization from the Azure Serial console. While the initialization is running, do not log in to the VM or power off or restart the VM.
- When initialization is complete, you will see the Safeguard Recovery (Serial) Kiosk on the Azure Serial console screen.
- Log in to the appliance via the web using the default username and password admin / Admin123. You should change the admin password immediately. For details, see the Safeguard for Privileged Passwords Administration Guide, Setting a local user's password.
View or change the cloud virtual appliance setup
You can view or change the virtual appliance setup.
The Administrator uses the Recovery Kiosk (Serial Kiosk) to perform the following.
Get appliance information
Reset the Administrator password
Restart or shut down the virtual appliance
Generate a support bundle
- Resolve a quarantine (For more information, see What do I do when an appliance goes into quarantine.)
For more information, see Recovery Kiosk (Serial Kiosk).
To patch to a new version, use the desktop client or API.
Use the following information to back up and recover a Safeguard for Privileged Passwords virtual appliance. Factory reset is not an option for virtual appliances. To factory reset a virtual appliance, just redeploy the appliance.
Backing up the virtual appliance
To ensure security of the hardware appliance, backups taken from a hardware appliance cannot be restored on virtual appliances and backups taken from a virtual appliance cannot be restored on a hardware appliance.
Backup is handled via Administrative Tools | Settings | Backup and Retention. For more information, see the Safeguard for Privileged Passwords Administration Guide, Backup and retention settings.
Recovery of the virtual appliance
A Safeguard for Privileged Passwords virtual appliance is reset by using the following recovery steps.
On-prem virtual appliance (for example, Hyper-V or VMware)
- Redeploy the virtual appliance and run Initial Setup. For more information, see Setting up the virtual appliance.
- Restore the backup. For more information, see Backup and Retention settings. For more information, see the Safeguard for Privileged Passwords Administration Guide, Backup and retention settings.
Cloud virtual appliance (for example, Azure)
- Redeploy using the deployment steps: