立即与支持人员聊天
与支持团队交流

One Identity Safeguard for Privileged Passwords 7.5.1 - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home page Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Global Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms Importing objects
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions

Password or SSH key is pending a reset

If a user receives a persistent message that states either of the following types of messages, the account password or SSH key is stuck in a pending password/SSH key change state:

  • You cannot checkout the password or SSH key for this account while another request is pending password or SSH key reset
  • This account has password or SSH key requests which have not yet expired or have to be reviewed. It cannot be deleted now"

Possible solutions:

  • Ensure that the service account for the asset associated with this account is working. Then manually change the account password or SSH key . See: Checking, changing, or setting an account password and Checking, changing, or setting an SSH key.
  • Or, if the service account for the asset is working properly and the policy governing the account allows emergency access and has enabled multiple users simultaneous access, you can instruct the user to request the password or SSH key using Emergency Access.

You can allow new access requests whether a prior request is approved or not approved. In other words, no requests will be blocked based on the approval status of a prior request. Setting the Pending reviews do not block access check box only pertains to future requests. For more information, see Workflow tab (create access request policy).

Password or SSH key profile did not run

The password and SSH key management settings enable the automatic profile check and change schedules in partitions. For more information, see Global Services.

Ensure the password and SSH key management settings are enable for profiles to run on schedule:

  • Check Password Management Enabled
  • Change Password Management Enabled
  • Check SSH Key Management Enabled
  • Change SSH Key Management Enabled

Recovery Kiosk (Serial Kiosk)

Safeguard for Privileged Passwords provides a Recovery Kiosk (Serial Kiosk) with the following options.

To start the Recovery Kiosk

On the terminal or laptop running the Recovery Kiosk, you must configure your serial port settings as follows:

  1. Connect a serial cable from a laptop or terminal to the serial port on the back of the appliance marked with |0|0|.

  2. On the laptop or terminal, configure the serial port settings as follows:

    • Speed: 115200

    • Data bits: 8

    • Parity: None

    • Stop bit: 1

  3. These options display on the Recovery Kiosk screen:

    • Appliance Information

    • Backups

    • Power Options

      • Reboot

      • Shut Down

    • Admin Password Reset

    • Factory Reset (Not available for virtual appliances.)

    • Support Bundle

  4. Use the up-arrow and down-arrow to select one of these options.

  5. Use the right-arrow to initiate the option.

  6. Use the left-arrow to return to the option.

Kiosk keyboard shortcuts

Safeguard for Privileged Passwords provides these keyboard shortcuts. If you make the window too small to accommodate the kiosk elements, Safeguard for Privileged Passwords tells you how to readjust the window size.

  • Ctrl+D: Resets the kiosk to its original state.

  • Ctrl+R: Redraws the kiosk to fit a resized window. If you resize the window, press Ctrl + R to reorganize the kiosk elements to fit properly into the newly-sized window.

Appliance information (Recovery Kiosk)

Use the Appliance Information option on the Recovery Kiosk to view basic appliance information and edit the IP addresses.

If you are using Azure, configure the SPP VM with a static IP address in Azure. If you need to change the IP address of the Safeguard appliance, or if it changes due to dynamic configuration in Azure, and the appliance is part of a cluster, the appliance will automatically reset to Standalone Read-only mode on the next boot (effectively leaving the cluster). The Administrator can join the appliance back to the cluster.

To view or edit the appliance information

  1. From the Recovery Kiosk, select the Appliance Information option.
  2. Right-arrow to see:

    • Appliance State: The appliance's current state.
    • Uptime: The amount of time (hours and minutes) the appliance has been running.
    • MGMT (not used Azure): The management host's network interface properties, including the MAC address and IPv4 (and optionally IPv6) properties.
    • X0: The network interface properties for the primary interface that connects your appliance to the network, including the MAC address and IPv4 (and optionally IPv6) properties.
  3. To change the network properties for the primary interface (XO), click Edit next to the appropriate heading. Clicking Edit displays the network interface properties which can be modified. If you are using Azure, the IP address cannot be changed.
  4. After editing the network interface properties, click Submit.

    Once the updates are completed, a Network interface update request accepted message is displayed.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级