Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Safeguard for Privileged Sessions On Demand Hosted - Administration Guide

Preface Introduction The concepts of One Identity Safeguard for Privileged Sessions (SPS)
The philosophy of One Identity Safeguard for Privileged Sessions (SPS) Policies Credential Stores Plugin framework Indexing Supported protocols and client applications Modes of operation Connecting to a server through One Identity Safeguard for Privileged Sessions (SPS) Archive and backup concepts Maximizing the scope of auditing IPv6 in One Identity Safeguard for Privileged Sessions (SPS) SSH host keys Authenticating clients using public-key authentication in SSH The gateway authentication process Four-eyes authorization Network interfaces High Availability support in One Identity Safeguard for Privileged Sessions (SPS) Versions and releases of One Identity Safeguard for Privileged Sessions (SPS) Accessing and configuring One Identity Safeguard for Privileged Sessions (SPS)
Cloud deployment considerations The Welcome Wizard and the first login Basic settings
Supported web browsers and operating systems The structure of the web interface Network settings Configuring date and time System logging, SNMP and e-mail alerts Configuring system monitoring on SPS Data and configuration backups Archiving and cleanup Using plugins Forwarding data to third-party systems Starling integration
User management and access control Managing One Identity Safeguard for Privileged Sessions (SPS)
Controlling One Identity Safeguard for Privileged Sessions (SPS): reboot, shutdown Managing One Identity Safeguard for Privileged Sessions (SPS) clusters Managing a High Availability One Identity Safeguard for Privileged Sessions (SPS) cluster Upgrading One Identity Safeguard for Privileged Sessions (SPS) Managing the One Identity Safeguard for Privileged Sessions (SPS) license Accessing the One Identity Safeguard for Privileged Sessions (SPS) console Sealed mode Out-of-band management of One Identity Safeguard for Privileged Sessions (SPS) Managing the certificates used on One Identity Safeguard for Privileged Sessions (SPS)
General connection settings HTTP-specific settings ICA-specific settings MSSQL-specific settings RDP-specific settings SSH-specific settings Using Sudo with SPS Telnet-specific settings VMware Horizon View connections VNC-specific settings Indexing audit trails Using the Search interface Advanced authentication and authorization techniques Reports The One Identity Safeguard for Privileged Sessions (SPS) REST API One Identity Safeguard for Privileged Sessions (SPS) scenarios Troubleshooting One Identity Safeguard for Privileged Sessions (SPS)
Network troubleshooting Gathering data about system problems Viewing logs on One Identity Safeguard for Privileged Sessions (SPS) Changing log verbosity level of One Identity Safeguard for Privileged Sessions (SPS) Collecting logs and system information for error reporting Collecting logs and system information of the boot process for error reporting Support hotfixes Status history and statistics Troubleshooting a One Identity Safeguard for Privileged Sessions (SPS) cluster Understanding One Identity Safeguard for Privileged Sessions (SPS) RAID status Restoring One Identity Safeguard for Privileged Sessions (SPS) configuration and data VNC is not working with TLS Configuring the IPMI from the BIOS after losing IPMI password Incomplete TSA response received Using UPN usernames in audited SSH connections
Using SPS with SPP Configuring external devices Using SCP with agent-forwarding Security checklist for configuring One Identity Safeguard for Privileged Sessions (SPS) Jumplists for in-product help Configuring SPS to use an LDAP backend Glossary

Setting the SSH host keys offered to the clients

By default, SPS automatically generates the private host keys for all supported host key algorithms when creating a new connection. You only have to make the settings described below if you would like to use your own host keys, or you would like to remove certain host keys.

The following describes how to upload or paste the private part of the SSH host key. SPS will offer the host keys to the clients.

To set the SSH host keys offered to the clients

  1. Navigate to SSH Control > Connections and click to display the details of the connection.

    Figure 228: SSH Control > Connections — Client side host key settings

  2. Upload or paste the private part of the SSH host key.

    SPS allows you to use the following SSH host keys:

    • RSA (ssh-rsa), which is the most widely used public-key algorithm for the SSH key. In SPS, uploading RSA SSH host keys are supported in PKCS #1 PEM, PKCS #8 PEM, OpenSSH (openssh-key-v1), and PuTTY private key formats.

      NOTE:

      TIP: One Identity recommends using 2048-bit RSA keys (or stronger).

    • Ed25519 (ssh-ed25519), which offers a better security and faster performance compared to RSA.

      In SPS, uploading Ed25519 SSH host keys are supported in PKCS #8 PEM, OpenSSH (openssh-key-v1), and PuTTY private key formats.

    • ECDSA NIST P-256 (ecdsa-sha2-nistp256), which is a variant of the Digital Signature Algorithm (DSA). In SPS, uploading ECDSA SSH host keys are supported in SEC1 PEM, PKCS #8 PEM, OpenSSH (openssh-key-v1), and PuTTY private key formats.

    You can have multiple SSH server host keys on SPS for the same server, however, you cannot set more than one key for each type. For example, you can keep your old RSA SSH key and generate a new Ed25519 key but you cannot set two RSA keys.

    TIP: Click on the fingerprint to display the public part of the key.

Supported SSH channel types

The available SSH channel types and their functionalities are described below. For details on configuring Channel Policies, see Creating and editing channel policies. For a list of supported client applications, see Supported protocols and client applications.

  • Agent: Forwards the SSH authentication agent from the client to the server.

    NOTE: To perform agent-based authentication on the target server, it is not required to enable the Agent-forwarding channel in the Channel Policy used by the connection. The Agent-forwarding channel is needed only to establish connections from the target server to other devices and authenticate using the agent running on the client.

  • X11 Forward: Forwards the graphical X-server session from the server to the client. Enter the address of the client into the Allow client address field to permit X11-forwarding only to the specified clients. Specify IP addresses or networks (in IP address/Prefix format).

    NOTE: Certain client applications send the Target address as a hostname, while others as an IP address. If you are using a mix of different client applications, you might have to duplicate the channel rules and create IP-address and hostname versions of the same rule.

  • Local Forward: Forwards traffic arriving to a local port of the client to a remote host. To enable forwarding only between selected hosts, enter their IP addresses into the Details field. If the Details field is empty, local forwarding is enabled without restriction, the client may forward any traffic to the remote host. Enter the source of the forwarded traffic into the Originator, the target of the traffic into the Target field. Specify IP addresses or networks (in IP address/Prefix format). These parameters are the end-points of the forwarded traffic (that is, the local host that sends data to the remote host), and not the SSH server or the client.

    For example, to enable forwarding from the 192.168.20.20 host to the remote host 192.168.50.50, enter 192.168.20.20 into the Originator, and 192.168.50.50 into the Target field.

    Figure 229: Local TCP forwarding

    NOTE: Certain client applications send the Originator and Target addresses as hostnames, while others as IP addresses. If you are using a mix of different client applications, you might have to duplicate the channel rules and create IP-address and hostname versions of the same rule.

    Caution:

    Port forwarding across One Identity Safeguard for Privileged Sessions (SPS) may fail for certain SSH client-server combinations. This happens if within the protocol, the address of the remote host is specified as a hostname during the port-forwarding request (SSH_MSG_GLOBAL_REQUEST), but the hostname is resolved to IP address in the channel opening request (SSH_MSG_CHANNEL_OPEN. By default, SPS rejects such connections.

    To enable these connections, navigate to SSH Control > Settings, and disable the Strict mode option.

  • Remote Forward: Forwards traffic arriving a remote port of the server to the client. To enable forwarding only between selected hosts, enter their IP addresses into the Details field. If the Details field is empty, remote forwarding is enabled without restriction, the SSH server may forward any traffic to the client. Enter the source of the forwarded traffic into the Originator, the target of the traffic into the Target field. Specify IP addresses or networks (in IP address/Prefix format). These parameters are the end-points of the forwarded traffic (that is, the remote host that sends data to the client), and not the SSH server.

    For example, to enable forwarding from the 192.168.20.20 remote host to the client 192.168.50.50, enter 192.168.20.20 into the Originator, and 192.168.50.50 into the Target field.

    Figure 230: Remote TCP forwarding

    NOTE: Certain client applications send the Originator and Target addresses as hostnames, while others as IP addresses. If you are using a mix of different client applications, you might have to duplicate the channel rules and create IP-address and hostname versions of the same rule.

    Caution:

    Port forwarding across SPS may fail for certain SSH client-server combinations. This happens if within the protocol, the address of the remote host is specified as a hostname during the port-forwarding request (SSH_MSG_GLOBAL_REQUEST), but the hostname is resolved to IP address in the channel opening request (SSH_MSG_CHANNEL_OPEN. By default, SPS rejects such connections.

    To enable these connections, navigate to SSH Control > Settings, and disable the Strict mode option.

  • Session Exec: Execute a remote command (for example rsync) without opening a session shell. Enter the permitted command into the Permitted commands field. You can use regular expressions to specify the commands. This field can contain only letters (a-z, A-Z), numbers (0-9), and the following special characters ({}()*?\\|[]).

    Caution:

    Restricting the commands available in Session Exec channels does not guarantee that no other commands can be executed. Commands can be renamed, or executed from shell scripts to circumvent such restrictions.

  • Session Exec SCP: Transfers files using the Secure Copy (SCP) protocol.

    • To make the list of file operations available in the File operations column of the Search page, navigate to the Channel Policies page of the protocol, and enable the Log file transfers to database option. This option is disabled by default.

    • To send the file operations into the system log, enable the Log file transfers to syslog option. This option is disabled by default.

      NOTE: Turning logging on might result in a slight performance penalty. If traffic load slows processes down, disable the option.

    Caution:

    The WinSCP application does not follow the RFC of the SCP protocol properly, but transfers files in a Session Shell channel instead of a Session Exec SCP channel. This has the following results:

    • If the Session Shell channel is enabled in a Channel Policy (this is needed for SSH terminal sessions as well), and your users use WinSCP using the File protocol > SCP option, they will be able to transfer files to and from the server. Also, these files will not be listed in the File operations field of the Search page.

    • To avoid these problems, you have to enforce that your clients use WinSCP with the File protocol > SFTP option. WinSCP uses SFTP by default, but can be changed manually to use SCP, and also falls back to using SCP if a server rejects SFTP.

    • To terminate the connection when a user transfers a file with WinSCP using the Session Shell channel, create a Content Policy that matches the WinSCP: this is end-of-file string in screen content, and use this policy in your Connection Policies. For details on Content Policies, see Real-time content monitoring with Content Policies. This solution has been tested with WinSCP version 5.1.5: if it does not work for your version, contact our Support Team.

  • Session Subsystem: Use a subsystem. Enter the name of the permitted subsystem into the Permitted subsystem field.

  • Session SFTP: Transfers files using the Secure File Transfer Protocol (SFTP).

    • To make the list of file operations available in the File operations column of the Search page, navigate to the Channel Policies page of the protocol, and enable the Log file transfers to database option. This option is disabled by default.

    • To send the file operations into the system log, enable the Log file transfers to syslog option. This option is disabled by default.

      NOTE: Turning logging on might result in a slight performance penalty. If traffic load slows processes down, disable the option.

  • Session Shell: The traditional remote terminal session.

    Caution:

    The WinSCP application does not follow the RFC of the SCP protocol properly, but transfers files in a Session Shell channel instead of a Session Exec SCP channel. This has the following results:

    • If the Session Shell channel is enabled in a Channel Policy (this is needed for SSH terminal sessions as well), and your users use WinSCP using the File protocol > SCP option, they will be able to transfer files to and from the server. Also, these files will not be listed in the File operations field of the Search page.

    • To avoid these problems, you have to enforce that your clients use WinSCP with the File protocol > SFTP option. WinSCP uses SFTP by default, but can be changed manually to use SCP, and also falls back to using SCP if a server rejects SFTP.

    • To terminate the connection when a user transfers a file with WinSCP using the Session Shell channel, create a Content Policy that matches the WinSCP: this is end-of-file string in screen content, and use this policy in your Connection Policies. For details on Content Policies, see Real-time content monitoring with Content Policies. This solution has been tested with WinSCP version 5.1.5: if it does not work for your version, contact our Support Team.

Sharing SSH connection policies with SPP

The Share connection policy with SPP option enables you to use SSH connection policies in SPP to initiate sessions.

Prerequisites

Link an SPP appliance to SPS. For more information, see Linking SPS to SPP.

To share an SSH connection policy

  1. Navigate to SSH Control > Connections.

    Figure 231: SSH Control > Connections — Functions shared with SPP

  2. Select Share connection policy with SPP.

    NOTE: The Share connection policy with SPP checkbox is enabled only if you have linked an SPP appliance to SPS.

  3. Set the following configuration for the SSH connection policy:

    • In Target, select Inband destination selection.

    • Unselect Require Gateway Authentication on the SPS Web Interface.

    • In AA plugin, select SGAA plugin.

      NOTE: The SGAA plugin option is available only if you have linked an SPP appliance to SPS.

    • In Credential Store, select SGCredStore.

      NOTE: The SGCredStore option is available only if you have linked an SPP appliance to SPS.

    • In Authentication policy, select an authentication policy.

      After that, navigate to SSH Control > Authentication Policies and open the respective authentication policy. In Relayed authentication methods, select Keyboard-interactive and Password.

  4. To save your changes, click Commit.

Authentication Policies

An authentication policy is a list of authentication methods that can be used in a connection. Connection definitions refer to an authentication policy to determine how the client can authenticate to the target server. Separate authentication methods can be used on the client and the server-side of the connection.

Figure 232: Authentication policies

Topics:
Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation