立即与支持人员聊天
与支持团队交流

One Identity Safeguard for Privileged Passwords 7.5.2 - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Home page Privileged access requests Appliance Management
Appliance Backup and Retention Certificates Cluster Global Services External Integration Real-Time Reports Safeguard Access Appliance Management Settings
Asset Management
Account Automation Accounts Assets Partitions Discovery Profiles Tags Registered Connectors Custom platforms Importing objects
Security Policy Management
Access Request Activity Account Groups Application to Application Cloud Assistant Asset Groups Entitlements Linked Accounts User Groups Security Policy Settings
User Management Reports Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP and SPS join guidance Appendix C: Regular Expressions

Reviewing a completed password release request

The Security Policy Administrator can configure an access request policy to require a review of completed password release requests for accounts in the scope of the policy.

You can configure Safeguard for Privileged Passwords to notify you of a password release request that requires your review. For more information, see Configuring alerts..

To review a completed password release request

Select Reviews on the left of the page to manage reviews. On the Reviews page, you can:

  • View details by selecting a request then looking at the details display on the right of the page, including the workflow.
  • Mark one or more request as reviewed: Select the requests. Do the following:
    • If no comment is needed, click Mark all the selected requests as reviewed.
    • If a comment is needed, this icon will display as One or more of the selected requests requires review comments. Add the comment. Then, click Mark as Reviewed.
  • Change the columns that display: Click Select columns to display then select the columns you want to see.
    • Action: Displays This request requires review comments or Mark only this request as reviewed.
    • Requester: Displays the user name of the requester.
    • Access Type: Displays the type of access (for example, Password, SSH Key, RDP, RDP Application, SSH, API Key, or Telnet).
    • Account: Displays the managed account name.
    • Ticket Number: Displays the ticket number, if required.
    • Request For/Duration: Displays the date and time as well as the window of availability (for example, March 20, 2021 9:56 AM 2 hours).
  • Search: Click Search to see a list of searchable elements. Or, enter search characters. For more information, see For more information, see Search box..

SSH key release request workflow

One Identity Safeguard for Privileged Passwords provides secure control of managed accounts by storing SSH keys until they are needed, and releases them only to authorized persons. Then, Safeguard for Privileged Passwords automatically updates the account SSH keys based on configurable parameters.

Typically, an SSH key release request follows this workflow.

  1. Request: Users that are designated as an authorized user of an entitlement can request SSH keys for any account in the scope of that entitlement's policies.
  2. Approve: Depending on policy configuration, approval can be automatic or require the consent of one or more users which provides closer control over system accounts.
  3. Review: The Security Policy Administrator can optionally configure an access request policy to require a review of completed SSH key release requests for accounts in the scope of the policy.

Requesting an SSH key release

If you are designated as an authorized user of an entitlement, you can request SSH keys for any account in the scope of the entitlement's policies.

You can configure One Identity Safeguard for Privileged Passwords to notify you of pending SSH key release workflow events, such as when an SSH key release request is pending, denied, or revoked, and so forth. For more information, see Configuring alerts..

To request an SSH key release

  1. Click Home then New Request or open My Requests then click New Request.

    NOTE: You can also submit an access request from your Favorites pane, if you previously saved it as a favorite.

  1. On the New Access Request page, select the accounts to be included in the access request and the type of access being requested for each selected account. You can search for accounts based on asset information. The assets available for selection are based on the scope defined in the entitlement's access request policies.

  2. NOTE: Use the button to select the columns to display.

    • Asset: The display name of the managed system.

    • Account: The available account appears in the Account column. When an asset has multiple accounts available, either Select Account(s) or the account name appears as a hyperlink in the Account column. Click the hyperlink in the Account column to display a list of accounts available and select the accounts to be included in the access request.
    • Access Type: The type of access request appears in the Access Type column. If the type is a drop-down, you can click the drop-down then multiple access request types are available. Click the drop-down and select the access type, in this case, SSH Key.

    • Account Description: (When applicable) The description of the account.

    • Asset Description: (When applicable) The description of the asset.

    You can remove an asset or account from the list by clearing the check box associated with an entry in the grid.

  3. Click Next.

  4. On Request Details, configure the following settings, which will apply to all of the selected assets and accounts:
    1. Emergency Access: If the policy has emergency access enabled, select this option to gain immediate emergency access to this SSH key. When you use Emergency Access, the request requires no approval. For more information, see Creating an access request policy.

    2. When: Select one of the following options:

      1. Now: If selected, the request is immediately created.

      2. Later: If selected, fields will appear allowing you to enter a specific date and time for the request in the user's local time.

    3. How Long: Based on the policy, do one of the following:
      • View the Checkout Duration.
      • If the Allow Requester to Change Duration option is enabled in the policy, you can set the days, hours, and minutes that you want to use the password. This overrides the Checkout Duration set in the access request policy. For more information, see Creating an access request policy.
    4. Ticket Number: If the policy requires a ticket number, enter a ticket number. If multiple accounts are in the request and one or more require a ticket number, the ticket number is applied to all of the requests associated with this access request. For more information, see Ticket systems..

    5. Reason: If the policy requires a reason, enter a reason. If multiple accounts are in the request and one or more require a reason. The reason is applied to all of the requests associated with this access request. For more information, see Reasons..

      Select the Description down arrow to view the description defined for the selected reason.

    6. Comment: If required, enter information about this request. When multiple accounts are specified in the request, if any of the selected accounts require a comment, you must enter a comment. The comment will be applied to all of the requests associated with this access request. The limit is 1000 characters.

  5. To save the access request as a favorite, select the Save this request as a favorite check box and enter a name for the request.

    This access request is then added to your Favorites. In the web client, favorites are displayed on the Home page and the My Requests page.

  6. After entering the required information, click Submit Request.

    Additional information displays if the access requests submitted were unsuccessful with information on how to address the issues. Once they have been addressed, you can resubmit the request.

When the request has been approved, you can use the SSH key. For more information, see Taking action on an SSH key release request..

Taking action on an SSH key release request

The actions that can be taken on an SSH key release request depends on the state of the request.

To take action on an SSH key release request

  1. From the web client, click My Requests. Use any of the following methods to control the request displayed:

    • Click then select Check-In All Available to check-in all the available requests, Clear All to remove all requests, or Cancel All Pending Time Requested to cancel and remove all pending requests.

    • Click Sort By then select to sort by Account Name, Asset Name, Due Next, Expiring Next, Most Recent, or Status.
    • Click sort up or sort down to sort in ascending or descending order.
    • Click Filters to filter by the status.
      • Available: Approved requests that are ready to view or copy.
      • Pending Approval: Requests that are waiting for approval.
      • Approved: Requests that have been approved, but the check out time has not arrived. Or, for pending accounts restored when using the SPS suspend feature.
      • Revoked: Approved requests retracted by the approver. The approver can revoke a request after the request has become available.
      • Expired: Requests for which the Checkout Duration has elapsed.
      • Denied: Requests denied by the approver.
    • Click Search to see a list of searchable elements. Or enter search characters. For more information, see Search box.
    • If a denied or revoked request has been commented on by an approver, you can click the button associated with the request to view the comment.
  2. You can take any of the following actions on the SSH key release request:

    • Available request:
      1. The name, account, and remaining time is displayed. Click on the tile to see additional information or use the Fetch SSH Details button.
      2. The Format displays and can be selected, if necessary. Formats include OpenSSH, SSH2, and PuTTY. The Format chosen is preselected as the default for the next access request.
      3. Click Checkout SSH Key to check out the SSH key. This puts the SSH key onto your clipboard, ready for you to use.
      4. Click Start SSH Session to launch the session.
      5. Private Key: You can click Save or Copy.
      6. Passphrase: You can click Show or Copy if Passphrase Protect SSH Key was selected on when creating an access request policy.
      7. The following types of information may display based on the format you select.
        • SHA-1 Fingerprint
        • MD5 Fingerprint
        • Public Key: You can click Save or Copy.

        If the SSH key changes while you have it checked out, and your current request is still valid, you can select the following to obtain an new SSH key, as available: Save, Copy, or Show.

      8. Once you are done working, click  Check-In Request to complete the SSH key check out process.
    • Approved request: Select  Cancel Request to remove the request.

      An SSH key release request changes from Approved to Available when the requested time is reached. It stays available until you either cancel the request or it reaches the end of the duration period.

    • Pending request: Select  Cancel Request to remove the request.
    • Revoked request: Select Resubmit to request the SSH key again.

      Select  Remove to delete the request from the list.

    • Expired request: Select  Remove Request to delete the request from the list.
    • Denied request: Select Resubmit to request the SSH key again.

      Select  Remove Request to delete the request from the list.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级