立即与支持人员聊天
与支持团队交流

Safeguard for Privileged Passwords On Demand Hosted - Administration Guide

Introduction System requirements and versions Using API and PowerShell tools Using the virtual appliance and web management console Cloud deployment considerations Setting up Safeguard for Privileged Passwords for the first time Using the web client Getting started with the desktop client Using the desktop client Activity Center Search box Privileged access requests Toolbox Accounts Account Groups Assets
General/Properties tab (asset) Accounts tab (asset) Account Dependencies tab (asset) Owners tab (asset) Access Request Policies tab (asset) Asset Groups tab (asset) Discovered SSH Keys (asset) Discovered Services tab (asset) History tab (asset) Managing assets
Asset Groups Discovery Entitlements Linked Accounts Partitions Profiles Settings
Access Request settings Appliance settings Asset Management settings Tags Backup and Retention settings Certificates settings Cluster settings Enable or Disable Services settings External Integration settings Password Management settings Real-Time Reports Safeguard Access settings SSH Key Management settings Security Policy Settings
Users User Groups Disaster recovery and clusters Administrator permissions Preparing systems for management Troubleshooting Frequently asked questions Appendix A: Safeguard ports Appendix B: SPP 2.7 or later migration guidance Appendix C: SPP and SPS join guidance Appendix D: Regular Expressions About us

Access Request Policies tab (entitlements)

The Access Request Policies tab displays the password and SSH key request policies that govern the accounts in the selected entitlement.

To access Access Request Policies:

  • desktop client: Navigate to Administrative Tools | Entitlements | Access Request Policies.
  • web client: Navigate to Security Policy Management | Entitlements | (Edit) | Access Request Policies.

IMPORTANT: The selection made on the Entitlement | Access Request Policy tab takes precedence over the selections on ( desktop client) Settings | Cluster | Managed Networks/( web client) Appliance Management | Cluster | Managed Networks page. If a Managed Networks rule includes nodes from different SPS clusters, SPP will only select the nodes from the same cluster that was assigned on the Session Settings page of the Access Request Policy tab.

Click Create Access Policy/New Access Policy from the details toolbar to add a policy to the selected entitlement.

History tab (entitlements)

The History tab allows you to view or export the details of each operation that has affected the selected entitlement.

To access History:

  • desktop client: Navigate to Administrative Tools | Entitlements | History.

    The top of the History tab contains the following information:

    • Items: Total number of entries in the history log.
    • Refresh: Update the list displayed.
    • Export: Export the data to a .csv file.
    • Search: For more information, see Search box.

    • Time Frame: By default, the history details are displayed for the last 24 hours. Click one of the time intervals at the top of the grid to display history details for a different time frame. If the display does not refresh after selecting a different time interval, click Refresh.
  • web client: Navigate to Security Policy Management | Entitlements | (Edit) | History.

    The top of the History tab contains the following information:

    • Date Range: By default, the history details are displayed for the last 24 hours. From the drop-down, select one of the time intervals to display history details for that time frame.

    • Refresh: Update the list displayed.

    • Search: For more information, see Search box.

Table 121: Entitlements: History tab properties
Property Description
Date/Time The date and time of the event.
User The display name of the user that triggered the event.
Source IP The network DNS name or IP address of the managed system that triggered the event.
Object Name The name of the selected entitlement.
Event

The type of operation made to the selected entitlement:

  • Create
  • Delete
  • Update
  • Add Membership
  • Remove Membership

NOTE: A membership operation indicates a relationship change with a related or parent object such as a user or user group was added or removed from the membership of an entitlement.

Related Object The name of the related object.
Related Object Type The type of the related object.
Parent The name of the object to which the selected entitlement is a child.
Parent Object Type The parent object type.

For some types of events, you can select an event to display this additional information (for example, create and update events).

Table 122: Additional History tab properties
Property Description
Property The property that was updated.
Old Value The value of the property before it was updated.
New Value The new value of the property.

Managing entitlements

Use the controls and tabbed pages on the Entitlements page to perform the following tasks to manage Safeguard for Privileged Passwords entitlements:

Adding an entitlement (desktop client)

NOTE: For information on adding an entitlement via the web client, see Adding an entitlement (web client).

It is the responsibility of the Security Policy Administrator to add entitlements to Safeguard for Privileged Passwords.

( desktop client) To add an entitlement

  1. Navigate to Administrative Tools | Entitlements.
  2. Click  Add Entitlement from the toolbar.
  3. In the Entitlement dialog, provide the following information on the General tab:

    Table 123: Entitlement: General tab properties
    Property Description
    Name

    Enter a unique name for the entitlement.

    Limit: 50 characters

    Description

    Enter descriptive text about the entitlement.

    Limit: 255 characters

    Priority

    The priority of this entitlement compared to other entitlements.

    If a user desires to access an account in the scope of two different entitlements, then the entitlement with the highest priority (that is, the lowest number) takes precedence. For more information, see How Safeguard for Privileged Passwords evaluates policy when a user submits an access request.

  4. Time restrictions control when the entitlement is in effect relative to the user's time zone.

    An entitlement's time restrictions enforce when Safeguard for Privileged Passwords uses a policy. A policy's time restrictions enforce when a user can access the account passwords. If the entitlement and the policy both have time restrictions, the user can only check out the password for the overlapping time frame.

    Time restrictions control when the entitlement or policy is in effect relative to a user's time zone. Although Safeguard for Privileged Passwords Appliances run on Coordinated Universal Time (UTC), the user's time zone enforces the time restrictions set in the entitlement or policy. This means that if the appliance and the user are in different time zones, Safeguard for Privileged Passwords enforces the policy in the user's time zone set in their account profile.

    User can change their time zone, by default. Or, the User Administrator can prohibit a user from changing the time zone, possibly to ensure adherence to policy. For more information, see Time Zone.

    Provide the following information on the Time Restrictions tab:

    Table 124: Entitlement: Time Restrictions tab properties
    Property Description
    Use Time Windows

    Select this option to enforce time windows.

    Daily calendar

    Select and drag to highlight the hours you want to allow. Colored tiles are blocked times. Clear are available times.

    Have the Entitlement Expire on Date and Time

    Select this option to enforce an expiration date, then enter the date and time.

    When an entitlement expires, all the access request policies associated with the entitlement also expire. To set an expiration date on a policy, see Creating an access request policy (desktop client).

Related Topics

How Safeguard for Privileged Passwords evaluates policy when a user submits an access request

Adding users or user groups to an entitlement

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级