Admin Guide
Admin Guide
Administrators Guide
November 2016
Centrify Corporation
Legal notice
This document and the software described in this document are furnished under and are subject
to the terms of a license agreement or a non-disclosure agreement. Except as expressly set forth
in such license agreement or non-disclosure agreement, Centrify Corporation provides this
document and the software described in this document as is without warranty of any kind,
either express or implied, including, but not limited to, the implied warranties of merchantability
or fitness for a particular purpose. Some states do not allow disclaimers of express or implied
warranties in certain transactions; therefore, this statement may not apply to you.
This document and the software described in this document may not be lent, sold, or given away
without the prior written permission of Centrify Corporation, except as otherwise permitted by
law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part
of this document or the software described in this document may be reproduced, stored in a
retrieval system, or transmitted in any form or by any means, electronic, mechanical, or
otherwise, without the prior written consent of Centrify Corporation. Some companies, names,
and data in this document are used for illustration purposes and may not represent real
companies, individuals, or data.
This document could include technical inaccuracies or typographical errors. Changes are
periodically made to the information herein. These changes may be incorporated in new editions
of this document. Centrify Corporation may make improvements in or changes to the software
described in this document at any time.
2004-2017 Centrify Corporation. All rights reserved. Portions of Centrify software are derived
from third party or open source software. Copyright and legal notices for these sources are listed
separately in the Acknowledgements.txt file included with the software.
U.S. Government Restricted Rights: If the software and documentation are being acquired by or
on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at
any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions)
and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the governments rights in the
software and documentation, including its rights to use, modify, reproduce, release, perform,
display or disclose the software or documentation, will be subject in all respects to the
commercial license rights and restrictions provided in the license agreement.
Centrify software is protected by U.S. Patents 7,591,005; 8,024,360; 8,321,523; 9,015,103 B2;
9,112,846; 9,197,670; and 9,378,391.
The names of any other companies and products mentioned in this document may be the
trademarks or registered trademarks of their respective owners. Unless otherwise noted, all of
the names used as examples of companies, organizations, domain names, people and events
herein are fictitious. No association with any real company, organization, domain name, person,
or event is intended or should be inferred.
Contents
Contents 5
Contents 7
Centrify Privilege Service and Centrify Server Suite form the foundation
of Centrifys privileged identity management solution for privileged
users and IT resources. Centrify Privilege Service enables you to
centrally manage account passwords and access rules for both
privileged and unprivileged accounts and to control who can use those
accounts to log on to target resources, such as remote servers and
network devices, inside or outside of a firewall.
With either deployment option, you use the Privilege Manager portal
to add, manage, and access the resources, domains, and databases
and the corresponding accounts you add to the privilege service.
The resources you manage might include servers and network devices
inside of your organizations firewall, outside of the firewall, or a
combination of the two. For example, you might have some users who
can log on to specific resources inside of the firewall and others who
can access specific resources located outside of the firewall.
In the most common scenario, you would add shared local accounts
such as root, patrol, or oraclefor the resources you add to the
Centrify privilege service. You would also specify which users are
allowed to use those shared accounts and what different users are
allowed to do. For example, you can specify which users can connect
using a given account without having to specify the password for the
account.
The diagram illustrates the basic deployment model with only one
connector installed on a Windows server. In practice, however, most
organizations would deploy at least two connectors inside of the
firewall for fault tolerance.
After you install Centrify Privilege Service, you use the Privilege
Manager portal to add, manage, and access the resources, domains,
databases, and corresponding accounts you add to the service.
The diagram illustrates the internal deployment model with only one
connector. In practice, however, most organizations would deploy at
least two connectors inside of the firewall for fault tolerance.
Getting started
Adding a connector
Quick tour
Switching between services and portals
Discovering resources automatically
Adding resources and local accounts
Viewing resource and account details
Using the dashboard and workspace
Adding a connector
The connector is a multipurpose service that enables secure
communication between computers on your internal network. The
Centrify privilege service requires at least one connector to be installed
on your network inside of the firewall.
You can install more than one connector for your organization to
support failover and load balancing. In most cases, you should install
at least two connectors in a production environment.
17
Quick tour
Quick tour
Across the top are the tabs you use to see and work with different
kinds of information. For example, here you see the following tabs:
The first time you log on the Dashboard tab is empty because you have
not yet added any resources, domains, or databases for which you
want to manage accounts. If you want to get started right away, the
first place you need to go after logging on is the Resources, Domains,
or Databases tab.
You can switch from one service to another by clicking on your account
name menu.
When you change from one service to another, the tabs displayed
across the top banner change to reflect the types of tasks you can
perform. For example, if you switch to the User Portal, you see the tabs
for Apps, Devices, Activity, and Account tabs instead of the Privilege
Manager portal tabs.
After you use the account name menu to switch to the administrative
portal for the Centrify identity platform, you will see the Welcome page
for Centrify identity service, where you have the option to Skip or Start
the Wizard. If you want to proceed without configuring information for
the Centrify identity service, select Dont show this to me again, then
click Skip. After clicking Skip, the default Getting Started dashboard is
displayed in administrative portal and you see a different set of tabs
displayed in the top banner. You can follow the steps listed in the
Getting Started dashboard to begin adding users and creating roles.
For Centrify privilege service, at a minimum, you are going to use the
following tabs in the administrative portal for the Centrify identity
platform:
Users to add other users to allow them to enroll devices and access
applications.
Roles to add roles and grant Privilege Management rights.
Reports tab to generate built-in or custom reports.
Settings to add connectors and configure or customize the
environment.
When you are done working in the administrative portal for the
Centrify identity platform, you can open the account name menu and
select Switch to Privilege Manager. For example:
As you can see, the Resources tab is where you can click Add Resources
or Import to begin adding servers, switches, and routers. You can click
Help for details about how to do that, but before you do, there are a
few common motifs to notice here that you will also see on other tabs:
The Actions menu you see in the resource or account details is the
same menu you can display by selecting a row using the check box.
When you are viewing the details for a target resource or account, you
can also set or change resource-specific or account-specific
information.
For example, as with Resources, you can click an account from the
Accounts tab or from within the resource details to see account
information and the account settings you can edit, such as the users
who have access to the account and the permissions different users
have. For more information about the account details you can modify,
see Managing accounts and account permissions.
You can select any stored domain account as the discovery profile
account or provide a user name and password manually. If you
manually specify a user name as the discovery profile account, only
the user name is stored in the discovery profile. The discovery profile
account you specify must have sufficient permissions to perform
computer, domain, application, and account discovery. At a minimum,
the discovery profile account must have:
26
Preparing for discovery
In addition, you can open any available port for discovering scheduled
tasks by using the Windows Firewall control panel.
By default, this rule allows any port to be used if enabled. You can
customize the properties for this rule to be more restrictive, if
needed.
5 Click OK.
You can also create multiple discovery profiles to look for computers,
domains, applications, and accounts that match different criteria. For
example, you might create separate discovery profiles to look for
Windows servers and UNIX workstations.
4 Select the account to use to run the discovery job, then click Next.
If you select Specify User, type the user name for an account with
read permissions and local administrator permissions on the
computers to be discovered.
If you select Domain Account stored in Privilege Service, click
Select and type part of the account name to search for and select
an existing account with read permissions and local
administrator permissions on the computers to be discovered.
6 Review the list of filter options and modify the filters to be used as
needed, then click Next.
Only the Windows services or scheduled tasks that run using a user
account name and password are discovered and only those
applications and their corresponding user accounts are added to
the privilege service. The user accounts can be domain user
accounts or local user accounts. If a domain account is discovered,
the corresponding domain is also added to the privilege service.
8 Click Save to save the discovery profile for future use or click Run to
start the discovery job.
When running the discovery job, keep in mind that the account used to
run the job must have the Privilege Management administrative right
to successfully discover computers, domains, applications, and
accounts on the network.
After you start the discovery job, progress is displayed as the discovery
scans the network for computers matching the criteria you specified in
the discovery profile. Note that only one discovery jobs runs at a time.
If you selected more than one discovery profile, they run one after
another.
3 Select the account, click the Actions menu, then select Update
Password.
The remaining fields are only applicable after you select Enable
management of this application password to automate password
rotation. For more information about configuring automatic
password rotation, see Automating password rotation.
Managing resources
37
Planning to add resources
If you have configured ssh to prevent the root user account from
logging on by opening a secure shell (ssh) connection, you also have
the option to have the password for the proxy account managed by
the Centrify privilege service. If you select Manage this password for a
proxy account, only the Centrify privilege service will know the
password for the account. The managed proxy account password will
not be available to any other applications or users.
1 Select the Resources tab, then click Add Resource to open the Add
Resource Wizard.
If theres an error, test network connectivity and verify that the user
name and password you provided are valid for the resource you are
attempting to add. If verification fails, close the error message,
deselect the Verify Resource Settings option, then click Finish to add
the resource and close the Add Resource Wizard. You can only
deselect the Verify Resource Settings option if the password for the
account is unmanaged. If the password for an account is managed,
the resource settings must be verified to ensure the correct
password is stored by the privilege service.
If you are adding an account, keep in mind that there are two types of
accounts for Windows resources: local accounts and domain accounts.
When you add a user for a Windows resource, the user_name you
specify should always be a local user account. If you want to manage
domain accounts for domain computers, you must first add the
domain to the Centrify privilege service. After adding the domain, you
can add domain accounts and check out the passwords for domain
accounts, and use domain accounts to log on to remote computers.
For information about adding domains and domain accounts to the
Centrify privilege service, see Managing domains.
You can specify any valid local user account and password. In most
cases, however, you would specify Administrator or an account with
similar privileges for which you want to manage the password.
Optionally, you can also type a longer description of the account. For
example, you might want to describe the tasks the account is used to
perform, then click Next to continue.
For any account you add, you can also choose whether or not you want
the Centrify privilege service to manage the account password. If you
select Manage this password, the Centrify privilege service
automatically resets the password after the account and resource are
added and each time the account is checked in.
You should keep in mind that only the Centrify privilege service will
know the managed password being generated and stored. You should
not select this option if you dont want the Centrify privilege service to
manage the password for the account.
When you add Windows resources to the privilege service, the Add
Resource wizard scans for available ports to determine the port to use
for checking the validity of account passwords and managing
password changes. Depending on the results of the scan, the protocol
and port used to validate and manage password changes might be set
to one of the following:
Remote Procedure Call (RPC) protocol over TCP and port 135.
Server Message Block (SMB) protocol and port 445.
Windows Remote Management (WinRM) over HTTPS if port 5986 is
open
You can use Resource Settings after adding a resource to manually set
a management protocol and port or to select Auto-Detect to try to
detect an appropriate port again if the first attempt failed.
You should note that the proxy user account is only used for password
management and account validation. It is not used for opening remote
desktop sessions.
In addition to the common resource settings you can change for any
type of resource, there are a few Windows-specific resource settings.
For example, you can use Resource Settings to update the following
after adding a resource:
You can manually select secure shell or remote desktop and change
the port number for remote sessions. If you dont specify a session
type and port, the Remote Desktop Protocol (RDP) and port 3389 are
used by default.
Select a resource time zone
You can manually select the time zone you want to use for any
resource. If you dont specify a time zone, the local time zone of the
resource is used by default.
Change proxy account settings
You can add a proxy user name and password to manage password
validation and updates on a target resource. If you dont specify a
proxy user, the account credentials used to log on are used to
manage passwords and validate accounts.
Select a protocol and port for password management
You can manually set the management mode to change the protocol
and port used for password management on target resources. If you
dont select a management mode, the default protocol and port that
were identified when you added the resource are used.
Add or modify the optional description of the resource.
You can update the description for a target resource at any time.
You can specify any valid user account and password. In most cases,
however, you would specify root or an account with similar privileges
for which you want to manage the password.
Optionally, you can also type a longer description of the account. For
example, you might want to describe the tasks the account is used to
perform, then click Next to continue.
For any account you add, you can also choose whether or not you want
the Centrify privilege service to manage the account password. If you
You should keep in mind that only the Centrify privilege service will
know the managed password being generated and stored. You should
not select this option if you dont want the Centrify privilege service to
manage the password for the account.
If you selected UNIX as the resource type and added root as the
account to use with the server, you are prompted to specify whether
the root user account is allowed to log on using secure shell (ssh)
connections.
Select Yes if the root user account is allowed to log on using secure
shell (ssh) connections, then click Next to continue.
Select No if you have configured ssh to prevent the root user
account from logging on using secure shell connections. If
necessary, you can open the /etc/ssh/sshd_config file on the
server to verify whether the PermitRootLogin parameter is set to
no.
If you have configured ssh to prevent the root user account from
logging on by opening a secure shell (ssh) connection, you must add a
user name and password for an account that can open a secure shell
connection on the target resource. The account name and password
you specify becomes a proxy account used in place of the root
account. The account used as the proxy for the root account must be
able to open secure shell sessions on the target resource, but no other
special privileges are required. After the proxy account opens the
If you are adding a proxy account to open secure shell sessions, you
also have the option to have the password for this account managed
by the Centrify privilege service. If you select Manage this password for
the proxy account, only the Centrify privilege service will know the
password for the account from this point on. The managed proxy
account password will not be available to any other applications or
users.
In addition to the common resource settings you can change for any
type of resource, there are a few UNIX-specific resource settings. For
example, you can use Resource Settings to update the following types
of information after adding a resource:
You can manually select secure shell or remote desktop and change
the port number for remote sessions. If you dont specify a session
type and port, the secure shell client and port 22 are used by default.
Select a resource time zone
You can manually select the time zone you want to use for any
resource. If you dont specify a time zone, the local time zone of the
resource is used by default.
Change proxy account settings
If you configure ssh to prevent the root user account from logging
on using secure shell connections, you can select the Enable Proxy
Account option to set the proxy user name and password.
Add or modify the optional description of the resource.
You can specify any valid user account and password. In most cases,
however, you would specify admin or an account with similar
privileges for which you want to manage the password.
Optionally, you can also type a longer description of the account. For
example, you might want to describe the tasks the account is used to
perform, then click Next to continue.
For any account you add, you can choose whether or not you want the
Centrify privilege service to manage the account password. If you
select Manage this password, the Centrify privilege service
automatically resets the password immediately after the account and
resource are added and each time the account is checked in.
For Cisco IOS resources, the following additional password rules apply:
If you select Manage this password for Cisco IOS and NX-OS devices,
you should keep in mind that the Centrify privilege service can only
manage passwords for privileged user accounts that have sufficient
rights to configure and save settings. In addition, if there are any
pending changes for other user accounts, those changes will be saved
when the privilege service updates a managed password.
You should also keep in mind that only the Centrify privilege service
will know the managed password being generated and stored. You
should not select this option if you dont want the Centrify privilege
service to manage the password for the account.
You can use the Resource Settings to update the following types of
information after adding a resource:
You can manually select secure shell or remote desktop and change
the port number for remote sessions. If you dont specify a session
type and port, the secure shell client and port 22 are used by default.
Select a resource time zone
You can manually select the time zone you want to use for any
resource. If you dont specify a time zone, the local time zone of the
resource is used by default.
Add or modify the optional description of the resource.
You can specify any valid user account and password. In most cases,
however, you would specify admin or an account with similar
privileges for which you want to manage the password.
Optionally, you can also type a longer description of the account. For
example, you might want to describe the tasks the account is used to
perform, then click Next to continue.
For any account you add, you can choose whether or not you want the
Centrify privilege service to manage the account password. If you
select Manage this password, the Centrify privilege service
automatically resets the password immediately after the account and
resource are added and each time the account is checked in.
If you select Manage this password for Juniper Junos OS devices, you
should keep in mind that the Centrify privilege service can only
manage passwords for privileged user accounts that have sufficient
rights to configure and save settings. In addition, if there are any
pending changes for other user accounts, those changes will be saved
when the privilege service updates a managed password.
You should also keep in mind that only the Centrify privilege service
will know the managed password being generated and stored. You
should not select this option if you dont want the Centrify privilege
service to manage the password for the account.
If you selected Juniper as the resource type and added root as the
account to use with the device, you are prompted to specify whether
the root user account is allowed to log on using secure shell (ssh)
connections.
Select Yes if the root user account is allowed to log on using secure
shell (ssh) connections, then click Next to continue.
Select No if you have configured ssh to prevent the root user
account from logging on using secure shell connections.
You can disable secure shell (ssh) connections for root on Juniper
devices by running the following command:
If you have disabled secure shell (ssh) connections for root and want
to manage the password for the account, you must add a user name
and password for an account that can open a secure shell connection
on the target resource.
If you are adding a proxy account to open secure shell sessions, you
also have the option to have the password for this account managed
by the Centrify privilege service. If you select Manage this password for
the proxy account, only the Centrify privilege service will know the
password for the account from this point on. The managed proxy
account password will not be available to any other applications or
users.
You can use the Resource Settings to update the following types of
information after adding a resource:
You can manually select the time zone you want to use for any
resource. If you dont specify a time zone, the local time zone of the
resource is used by default.
Change proxy account settings
If you configure ssh to prevent the root user account from logging
on using secure shell connections, you can select the Enable Proxy
Account option to set the proxy user name and password.
Add or modify the optional description of the resource.
You cannot use the privilege service to manage account passwords for
generic SSH resources. However, you can use the privilege service to
store the account information securely, then use the account to open
secure shell sessions on target resources without knowing the
password.
You can specify any valid user account and password. In most cases,
however, you would specify root or an account with similar privileges
for which you want to manage the password.
You can also use Resource Settings to specify a time zone or to add or
modify the optional description of the device.
4 Click File > Save As to save the file using a new name in a location you
can browse to from Privilege Manager.
5 Edit your custom file so that each line provides the following
information for a specific resource:
Windows
Unix
GenericSsh
CiscoIOS
CiscoNXOS
JuniperJunos
Description Type any descriptive information you want to
add for the resource. This field is optional.
ProxyUserPassword Provide the password for the proxy user for
a resource. This field is optional.
8 Verify the email address is the email address where you want to be
notified of the import result, then click Import.
For example, click the arrow next to All Resources to view the list of
filtering options:
You can then use the drop down menu to select resources of a specific
type. You can also filter the list of resources displayed by typing a
search string, or by combining a filter and a search string. If you type a
search string, resources and network devices with either a display
name or a DNS name matching the string are included.
Within the resource list, you can click column headers to change how
the listed resources are sorted.
Identifying favorites
As you add servers, workstations, and network devices to the resource
list, you might find it convenient to identify the ones you work with
most frequently as favorites. You can identify the resources as your
favorites by clicking the star icon next to the resource name.
You can then filter the resource list to only display the servers,
workstations, and network devices that you work with most often.
Identifying a resource as a favorite also adds that resource to the
workspace you see when you click the Workspace tab, enabling you to
see activity and take action at a glance without navigating the full list of
resources that have been added to the privilege service.
Selecting a resource
You can select a resource to work with by clicking anywhere in the row
that contains the resource name to display the resource details or by
clicking the check box for a row. Selecting a resource displays the
Actions menu to select the action you want to perform.
For example, select a resource using the check box, then click Actions
to display the list of potential actions.
Account Actions to select a local account and what you want to do,
such as request login access or check out the password for the
account.
AD Account to log on to a selected domain computer using a stored
Active Directory account without specifying a password.
Manual Login to log on by specifying a user name and password.
Delete to remove a resource from the list.
You can also select an action from the Actions menu when viewing the
details for an individual resource or view and modify resource-specific
information. For example, when you are displaying the details for a
selected resource, you can do the following:
Change resource settings such as the resource name and
description.
Add accounts and view account activity, such as the date and time of
the last password reset and the number of active sessions for the
account.
Specify the connectors to use for the resource.
Set resource-specific policies.
View recent activity for the resource, including who has logged on,
and who has checked out or checked in a password for the resource.
For example, if you select Account Actions, you can view the list of
shared local accounts and select the appropriate action to take:
In most cases, you add the account to use for accessing a resource
when you initially add the resource to the Centrify privilege service.
From the list of Accounts for a resource, you can then view the
following information:
Last reset specifies the date and time the account password was last
reset.
Sessions specifies the number of currently active sessions for the
account.
Checkouts specifies the number of password checkouts for the
account.
Status indicates the result of the most recent password check for an
account. If the password stored by the Centrify privilege service is no
longer valid, the column displays Failed. If the state of the password
cannot be determinedfor example, because the port used to
check account health is blocked, the account is in an untrusted
forest, or the account is an unmanaged accountthe column
displays Unknown.
Proxy Account displays a check mark if the account uses the proxy
account defined for root at the resource level.
Managed displays a check mark if the password for the account is
managed through the Centrify privilege service.
When you are viewing the accounts for a resource, you can also select
any account in the list, then click the Actions menu to check out the
password for the account, log on to the target resource using the
stored password for the account, or delete the account. If the account
4 Type the user name and password for an account you want to use to
access the currently selected resource.
5 Select the Manage this password option if you want the Centrify
privilege service to manage the password for the specified account.
This option is not displayed if the resource type is Generic SSH for a
network device.
6 Select the Use proxy account option if you want the account you are
adding to use the proxy account defined for the resource.
This option is not displayed if the resource type is Cisco IOS, Cisco NX-
OS, or Generic SSH for a network device.
You can view the accounts that have been added for individual
resources from the resource details. To see a list of all local accounts
for all resources, you can click the Accounts tab, then select Local
Accounts.
From the Local Accounts list, you can filter or search for local accounts
across all resources. You can also select an individual account for any
resource to perform account-related actionssuch as log on to a
target resource, check out an account password, or update the
accounts stored password. The information displayed on the Local
Accounts list is the same as the information displayed for accounts
when you are viewing the details for a specific resource.
3 Click Accounts.
4 Select the account that no longer has a valid password stored in the
privilege service.
6 Type the current password for the account you are updating.
You should update the password stored in the privilege service any
time the password for an account has been changed locally on the
target resource. You also might need to update the password if a
network failure or other event occurs and the password cannot be
recovered automatically.
3 Click Connectors.
4 Select Choose, then select the specific connectors to use for the
resource from the list of available connectors.
5 Click Save.
Checkout lifetime
Enable periodic password cleanup
Allow periodic password rotation
Allow periodic health check
Resource login challenge rules and default profile
3 Click Policy.
5 Click Save.
Select Yes if you want to allow multiple users to have the account
password checked out at the same time for a selected resource. If you
select Yes, multiple administrators can access the resource without
waiting for the password to be checked in.
Select Yes if you want to allow connections from outside of the firewall
to access the selected resource. If you select No, administrators will be
denied access if they attempt to log on to the selected resource from a
connection outside of the firewall.
Checkout lifetime
You can extend the checkout time for a password as long as you do so
before the initial checkout period expires. For example, if the
maximum checkout lifetime is 60 minutes and you extend the
checkout time before the 60 minute period is over, the password
expiration is reset to the 60 minute checkout lifetime. For more
information about configuring the Checkout lifetime policy, see
Extending the password checkout time.
If you select yes, you can also specify the maximum number of days of
password history to keep. For example, if you have a requirement to
keep a record of passwords used for three years, you might set the
cleanup interval to 1096 days to maintain the password history for that
period of time. If you select the default setting, retired passwords are
automatically deleted after 365 days. You cannot set a cleanup interval
less than 90 days.
If you select Yes, you should also specify the password rotation interval
in days. Type the maximum number of days to allow between
automated password changes for managed accounts. You can set this
policy to comply with your organization's password expiration policies.
For example, your organization might require passwords to be
changed every 90 days. You can use this policy to automatically update
Select Yes if you want to allow periodic connections from the Centrify
privilege service to the selected resource to determine if the resource
is reachable and to check the validity of the managed and unmanaged
accounts stored in the Centrify privilege service. Select No if you want
to prevent periodic connections to the resource. For example, you
might want to select No if you are only using the Centrify privilege
service to store and check out passwords, if you know a resource is not
reachable, or if the accounts stored for a resource use multi-factor
authentication. If you select No, keep in mind that any account
information you add will not be verified.
If you select Yes, you should also specify the health check interval in
hours.
You should note that only the authentication challenges that are
available in a user profile can be presented. For example, you might
select Phone call and Email confirmation code in the authentication
profile, but these challenges are only valid if users have both a phone
number and email address stored for their accounts.
If users only have a phone number and not an email address stored,
they will receive a phone call to complete the authentication process
rather than be prompted to select an authentication option. If users
have both a phone number and an email address stored, they will be
prompted to select which form of authentication to use.
You can configure the settings for a custom Simple Mail Transport
Protocol (SMTP) mail server and a Twilio in the administrative portal. To
support the Mobile Authenticator as a challenge, you must have a
properly enrolled mobile device. For details about post-installation
configuration steps when you deploy Centrify Privilege Service as an
on-site service, see the Installation and Configuration Guide for On-Site
Deployment.
3 Click Policy.
For example, click Add Rule, select a condition such as IP Address and
inside of the corporate range, then click Add. You can add more than
one condition to the rule. However, all conditions must be true for
the rule to apply.
6 Select the authentication profile to use when all of the conditions you
specify are true, then click OK.
You can select any existing authentication profile if an appropriate
profile has been previously-defined in the administrative portal for
the Centrify identity platform.
You can select Not Allowed as the authentication profile if you
want to prevent users from logging on using a stored account
password when the conditions for this authentication rule are
met. For example, you might want to select Not Allowed to prevent
login access when the request comes from an IP address outside
of the corporate IP range.
You can select Add New Profile if you want to create a new
authentication profile to use when the selected conditions.
3 Click Activity.
3 Click Permissions.
4 Click Add to search for and select the users, groups, roles, or
computers to which you want to grant resource-specific permissions,
then click Add.
4 Find the appropriate account from the list of shared accounts, then
click Checkout or Request Checkout.
5 Click Display if you want to view the password for the selected
account as plain text or click Clipboard to copy the password without
viewing it.
6 Click Close.
7 Log on to the remote computer using the selected account name and
password.
After taking the appropriate action on the target resource, close the
session to log off and check in the password. For more information
about checking in a password, see Checking in a password.
minutes and you extend the checkout time before time runs out, the
password expiration is reset to 60 minutes.
You can extend the checkout time for a password indefinitely at any
point in its lifetime as long as you extend the checkout time before the
checkout period expires. For example, if you have extended the
checkout time for 60 minutes, but need more time to resolve an issue,
you can extend the checkout time for another 60 minutes as long as
you do so before the first 60 minutes expires. For more information
about configuring the Checkout lifetime policy, see Setting
resource-specific policies.
4 Find the appropriate account from the list of shared accounts, then
click the Extend Checkout Time icon.
After you extend the checkout time for a password, the activity is
logged on the Privilege Manager dashboard.
5 Click Close.
Checking in a password
After you check out a password, you have a limited period of time in
which the password you checked out is valid for activity on a remote
resource. If the Centrify privilege service manages the password for the
account, you should check in the password when you end the session
on the remote resource, so that a new secure password can be
generated for the account you used.
You can check in a password you have previously checked out from the
Resources, Accounts, or Workspace tab. For example, if you are viewing
the list of resources or the details for an individual resource, you can
navigate to Account Actions to check in a password that you currently
have checked out.
4 Find the appropriate account from the list of accounts, click Checkin,
then click Close.
You can also check in an account password when you are viewing your
own activity on the Workspace tab. or when viewing accounts on the
Accounts tab. For more information about reviewing the summary of
your activity, see Using the workspace. For more information about
working with accounts directly, see Managing accounts and account
permissions.
4 Find the appropriate account from the list of shared accounts, then
click Login or Request Login.
If you have the Login permission and the stored credentials are valid,
clicking Login starts a new interactive secure shell or remote desktop
session on the target resource. Within the secure shell or remote
desktop session, most operationssuch as cut and paste or resizing
of windowswork as you would expect them to. For more
information about working in the remote session, see Connecting
remotely to a target resource.
If you dont have the Login permission and click Request Login, your
request is sent to a designated user or to the members of a
designated role for approval. If your request is approved, you have
limited period of time to start a new interactive secure shell or
remote desktop session on the target resource. For more
information about the request and approval work flow, see
Managing access requests.
Successful and failed login attempts and active sessions are recorded
as recent activity in the dashboard, in your workspace, and in the list
of resource activity.
If the credentials you specified are valid for the target resource, logging
on starts a new interactive secure shell or remote desktop session on
the target resource. Within the secure shell or remote desktop session,
most operationssuch as cut and paste or resizing of windowswork
as you would expect them to. For more information about working in
the remote session, see Connecting remotely to a target resource.
Successful and failed login attempts and active sessions are recorded
as recent activity in the dashboard, in your workspace, and in the list of
resource activity.
SSH, the connection opens a new browser window with the secure
shell session:
The secure shell terminal works as you would expect. For example, you
can resize the window by dragging the window borders. You can also
maximize or minimize the window to change your working area while
the session is open or close the window to end the session. You must
use a mouse to copy and paste in the secure shell, however, because
Ctrl-C is used to terminate an operation in UNIX-based environments.
The remote desktop works as you would expect. For example, you can
resize the window by dragging the window borders. You can also
maximize or minimize the window to change your working area while
the session is open or close the browser window to end the session.
Menus and keyboard shortcuts operate in the same way as when you
log on locally to a Windows computer.
can continue to use the account with its correct password after
removing it from the Centrify privilege service.
4 Find the appropriate account from the list of shared accounts, then
click the Delete icon.
5 Click Display if you want to view the password for the selected
account as plain text or click Clipboard to copy the password without
viewing it.
Deleting a resource
You can remove a resource from the Resources list and the Centrify
privilege service only if you have removed all account information from
the server.
5 Click Yes to confirm that you want to proceed with deleting the
resource.
Managing domains
The Domains tab lists all of the Active Directory domains you have
added to the Centrify privilege service. If you are a member of a role
with the appropriate privilege management rights, you can view, add,
modify, or delete domains from this list.
For more information about adding and managing domains and Active
Directory accounts, see the following topics:
80
Adding a domain
The most likely candidates for being managed accounts are Active
Directory administrative accounts and application service accounts.
You can use the Centrify privilege service to manage the password for
any of these accounts or add any other accounts of your choice to
securely store the account information without having the password
managed by the Centrify privilege service.
You should note, however, that you must add domain accounts to the
domain where they belongs. For example, if you want to manage a
domain account that is in a child domain instead of the forest root
domain, you must add the child domain to the Centrify privilege
service first, then add the domain accounts you want to manage for
the child domain under the child domain.
Adding a domain
Before you can store and manage passwords for Active Directory
domain accounts, you must add the appropriate domains to the
Centrify privilege service.
4 Select Verify Domain to test access to the domain, then click Add.
If you have configured subnet mapping for connectors, you might need
to modify the subnet settings to ensure you have a connector that can
access an appropriate domain controller.
After you display the details for a selected domain, you can also
change the domain description, add accounts from the domain to the
Centrify privilege service, specify the domain-specific connectors to
use, set domain-specific policies, view recent activity for the domain,
and set domain-specific permissions.
2 Type a new name for the domain if you added the wrong domain
name and skipped verification of connectivity.
3 Type the user name and password for the account you want to use
to access the currently selected domain.
Note that you should specify the user name by typing the
userPrincipalName account attribute.
4 Select the Manage this password option if you want the Centrify
privilege service to manage the password for the specified account.
For any account you add, you can also choose whether or not you want
the Centrify privilege service to manage the account password. If you
select Manage this password, the Centrify privilege service
automatically resets the password after the account and resource are
added and each time the account is checked in.
You should keep in mind that only the Centrify privilege service will
know the managed password being generated and stored. You should
not select this option if you dont want the Centrify privilege service to
manage the password for the account.
Last reset specifies the date and time the account password was last
reset.
Sessions specifies the number of currently active sessions for the
account.
Checkouts specifies the number of password checkouts for the
account.
Status indicates the result of the most recent password check for an
account. If the password stored by the Centrify privilege service is no
longer valid, the column displays Failed. If the state of the password
cannot be determinedfor example, because the port used to
check account health is blocked, the account is in an untrusted
forest, or the account is an unmanaged accountthe column
displays Unknown.
Managed displays a check mark if the password for the account is
managed through the Centrify privilege service.
When you are viewing the accounts for a domain, you can also select
any account in the list, then click the Actions menu to check out the
password for the account, update the account password, or delete the
account.
For more information about performing these tasks, see the following
topics:
use. The password remains checked out until either you check it back
in or the Centrify privilege service checks it automatically.
3 Click Accounts.
6 Click Display if you want to view the password for the selected
account as plain text or click Clipboard to copy the password without
viewing it.
7 Click Close.
After taking the appropriate action, close the session to log off and
check in the password. For more information about checking in a
password, see Checking in a password.
Checking in a password
After you check out a password, you have a limited period of time in
which the password you checked out is valid for activity on a domain
computer. If the Centrify privilege service manages the password for
the account, you should check in the password when you end the
session, so that a new secure password can be generated for the
account you used.
You can check in a password you have previously checked out from the
Accounts list when viewing domain details, the Accounts tab directly, or
the Workspace tab. For more information about working with accounts
directly, see Managing accounts and account permissions. For more
information about checking in passwords while reviewing the
summary of your activity, see Using the workspace.
3 Click Accounts.
4 Select the account that no longer has a valid password stored in the
privilege service.
6 Type the current password for the account you are updating.
From the Domain Accounts list, you can search for domain accounts
across all domains. You can also select an individual account for any
domain to perform account-related actionssuch as check out an
account password or update the accounts stored password. The
information displayed on the Domain Accounts list is the same as the
information displayed for accounts when you are viewing the details
for a specific domain.
5 Select the Active Directory account you want to use to log on to the
domain computer, then click Login.
If you want to specify the connectors for an individual domain, you can
do so when viewing the details for the domain. Domain-specific
settings take precedence over any global connector subnet mapping
you have configured.
3 Click Connectors.
4 Select Choose, then select the specific connectors to use for the
domain from the list of available connectors.
5 Click Save.
If you are not using global policies, only want to set policies on
individual domains, or want to override global policies on specific
domains, you can set the following policies on a case-by-case basis:
3 Click Policy.
For more information about how to set the domain policies, click the
policy link or the information icon in the Privilege Manager portal.
Select Yes if you want to allow multiple users to have the account
password checked out at the same time for a selected domain. If you
select Yes, multiple administrators can access the domain with a
domain account without waiting for the password to be checked in.
If you select Yes, you should also specify the health check interval in
hours.
If you select yes, you can also specify the maximum number of days of
password history to keep. For example, if you have a requirement to
keep a record of passwords used for three years, you might set the
cleanup interval to 1096 days to maintain the password history for that
period of time. If you select the default setting, retired passwords are
automatically deleted after 365 days. You cannot set a cleanup interval
less than 90 days.
If you select Yes, you should also specify the password rotation interval
in days. Type the maximum number of days to allow between
automated password changes for managed accounts. You can set this
policy to comply with your organization's password expiration policies.
For example, your organization might require passwords to be
changed every 90 days. You can use this policy to automatically update
managed passwords at a maximum of every 90 days. If the policy is not
defined, passwords are not rotated.
Checkout lifetime
Type the maximum number of minutes administrators are allowed to
have a password checked out. After the number of minutes specified,
the Centrify privilege service automatically checks the password back
in. The minimum checkout lifetime is 15 minutes. If the policy is not
defined, the default checkout lifetime is 60 minutes.
You can extend the checkout time for a password as long as you do so
before the initial checkout period expires. For example, if the
maximum checkout lifetime is 60 minutes and you extend the
checkout time before the 60 minute period is over, the password
expiration is reset to the 60 minute checkout lifetime. For more
information about configuring the Checkout lifetime policy, see
Extending the password checkout time.
3 Click Activity.
3 Click Permissions.
4 Click Add to search for and select the users, groups, roles, or
computers to which you want to grant domain-specific permissions,
then click Add.
Deleting a domain
You can remove a domain from the Domains list and the Centrify
privilege service only if you have removed all account information for
the domain.
5 Click Yes to confirm that you want to proceed with deleting the
domain.
94
Planning to add database accounts
You can only use the Centrify privilege service to manage passwords
for local SQL Server Login database accounts that use SQL Server
authentication.
You cannot rotate or manage expired passwords for managed
accounts.
If you are using Windows authentication to connect to the SQL
Server database, you should add domain accounts to Centrify
privilege service to manage those accounts.
The accounts used to communicate with databases fall into two major
categories: administrative accounts and application accounts.
Administrative accounts are used by the database administrator to
connect to the database to perform administrative tasks, such as
adding new databases or database users or managing database tables.
Application accounts are used by application serverssuch as Tomcat,
JBoss, or IISto authenticate to the database before storing or
retrieving application-specific information in the database. Centrify
privilege service supports password management for the
administrative database accounts.
Windows authentication
SQL Server authentication
You can use the Centrify privilege service to manage the password for
both Windows authentication database accounts and SQL Server
authentication database accounts for standalone SQL Server
instances.
If you have a SQL Server cluster configured for high availability using
automatic fail over, the administrative database accounts you manage
should be domain accounts that use Windows authentication domain
to avoid the replication issues.
If you use SQL Server authentication for the database account you
want to manage, the SQL Server cluster must be configured to use
failover clustered instances. For managed SQL Server database
accounts, only failover clustered instances are supported because
other high-availability features might result in replication delays and
authentication failures.
You can only use the Centrify privilege service to manage passwords
for local Oracle database accounts.
You should only add Oracle 11g or Oracle 12c databases to the Centrify
privilege service. For more details about which versions of the Oracle
database are supported in the current release, see the release notes.
1 Select the Databases tab, then click Add Database to open the Add
Database Wizard.
Optionally, you can also type a longer description for the database.
For example, you might want to make note of the applications the
database supports or the physical location of the server, then click
Next to continue.
3 Add a user name and password for an account used to access the
database and specify whether the password for the account is
managed by the privilege service, then click Next.
If theres an error, test network connectivity and verify that the user
name and password you provided are valid for the database you are
attempting to add. If verification fails, close the error message,
deselect the Verify Database Settings option, then click Finish to add
the database and close the Add Database Wizard. You can only
deselect the Verify Database Settings option if the password for the
account is unmanaged. If the password for an account is managed,
the database account must be verified to ensure the correct
password is stored by the privilege service.
Selecting a database
You can select a database to work with by clicking anywhere in the row
that contains the database name to display the database details or by
clicking the check box for a row. Selecting a database displays the
Actions menu to select the action you want to perform.
For example, select a database using the check box, then click Actions
to display the list of potential actions. After selecting the Actions menu,
you can click Delete to remove a database from the list.
You can also select an action from the Actions menu when viewing the
details for an individual database or view and modify database-specific
information. For example, when you are displaying the details for a
selected database, you can do the following:
Last reset specifies the date and time the database account
password was last reset.
Checkouts specifies the number of password checkouts for the
database account.
Status indicates the result of the most recent password check for an
account. If the password stored by the Centrify privilege service is no
longer valid, the column displays Failed. If the state of the password
cannot be determinedfor example, because the account is an
unmanaged accountthe column displays Unknown.
Managed displays a check mark if the password for the account is
managed through the Centrify privilege service.
When you are viewing the accounts for a database, you can also select
any account in the list, then click the Actions menu to check out the
password for the account, update the password stored in the privilege
service for the account, or delete the account.
You can view the accounts that have been added for individual
databases from the database details. To see a list of all database
accounts for all databases in the privilege service, you can click the
Accounts tab, then select Database Accounts.
From the Database Accounts list, you can search for database accounts
across all databases. You can also select an individual account for any
database to perform account-related actionssuch as check out an
account password or update the accounts stored password. The
information displayed on the Database Accounts list is the same as the
information displayed for accounts when you are viewing the details
for a specific database.
4 Type the user name and password for a database account you want
to use to connect to the currently selected database.
5 Select the Manage this password option if you want the Centrify
privilege service to manage the password for the specified account.
For any database account you add, you can also choose whether or not
you want the Centrify privilege service to manage the account
password. If you select Manage this password, the Centrify privilege
service automatically resets the password after the account and
resource are added and each time the account is checked in.
You should keep in mind that only the Centrify privilege service will
know the managed password being generated and stored. You should
not select this option if you dont want the Centrify privilege service to
manage the password for the account.
3 Click Accounts.
4 Select the account that no longer has a valid password stored in the
privilege service.
6 Type the current password for the account you are updating.
You should update the password stored in the privilege service any
time the password for an account has been changed locally on the
target database. You also might need to update the password if a
3 Click Connectors.
4 Select Choose, then select the connectors to use for the database
from the list of available connectors.
5 Click Save.
If you are not using global policies, only want to set policies on
individual databases, or want to override global policies on specific
databases, you can set the following policies on a case-by-case basis:
3 Click Policy.
5 Click Save.
Select Yes if you want to allow multiple users to have the database
account password checked out at the same time for a selected
database. If you select Yes, multiple administrators can check out the
password for the database without waiting for the account password
to be checked in.
Checkout lifetime
You can extend the checkout time for a password as long as you do so
before the initial checkout period expires. For example, if the
maximum checkout lifetime is 60 minutes and you extend the
checkout time before the 60 minute period is over, the password
expiration is reset to the 60 minute checkout lifetime. For more
information about configuring the Checkout lifetime policy, see
Extending the password checkout time.
Select Yes if you want to allow periodic connections from the Centrify
privilege service to the selected database to determine if the database
is reachable and to check the validity of the managed and unmanaged
accounts stored in the Centrify privilege service. Select No if you want
to prevent periodic connections to the database. For example, you
might want to select No if you are only using the Centrify privilege
service to store and check out passwords, if you know a database is
not reachable, or if the database accounts stored for a database use
multi-factor authentication. If you select No, keep in mind that any
database accounts you add will not be verified.
If you select Yes, you should also specify the health check interval in
hours.
If you select yes, you can also specify the maximum number of days of
password history to keep. For example, if you have a requirement to
keep a record of passwords used for three years, you might set the
cleanup interval to 1096 days to maintain the password history for that
period of time. If you select the default setting, retired passwords are
automatically deleted after 365 days. You cannot set a cleanup interval
less than 90 days.
If you select Yes, you should also specify the password rotation interval
in days. Type the maximum number of days to allow between
automated password changes for managed accounts. You can set this
policy to comply with your organization's password expiration policies.
For example, your organization might require passwords to be
changed every 90 days. You can use this policy to automatically update
managed passwords at a maximum of every 90 days. If the policy is not
defined, passwords are not rotated.
3 Click Activity.
3 Click Permissions.
4 Click Add to search for and select the users, groups, roles, or
computers to which you want to grant database-specific
permissions, then click Add.
4 Click Display if you want to view the password for the selected
account as plain text or click Clipboard to copy the password without
viewing it.
5 Click Close.
After taking the appropriate action on the database, close the session
to log off and check in the password. For more information about
checking in a password, see Checking in a password.
You can extend the checkout time for a password indefinitely at any
point in its lifetime as long as you extend the checkout time before the
checkout period expires. For example, if you have extended the
checkout time for 60 minutes, but need more time to resolve an issue,
you can extend the checkout time for another 60 minutes as long as
you do so before the first 60 minutes expires. For more information
about configuring the Checkout lifetime policy, see Setting
database-specific policies.
After you extend the checkout time for a password, the activity is
logged on the Privilege Manager dashboard.
4 Click Close.
Checking in a password
After you check out a password, you have a limited period of time in
which the password you checked out is valid for database activity. If
the Centrify privilege service manages the password for the account,
you should check in the password when you end the database session,
so that a new secure password can be generated for the account you
used.
You can check in a password you have previously checked out from the
Accounts or Workspace tab. For example, if you are viewing the list of
database accounts, you can select an account and click the Actions
menu to check in a password that you currently have checked out.
You can also check in an account password when you are viewing your
own activity on the Workspace tab. or when viewing accounts on the
Accounts tab. For more information about reviewing the summary of
your activity, see Using the workspace. For more information about
working with accounts directly, see Managing accounts and account
permissions.
4 Click Delete.
5 Click Display if you want to view the password for the selected
account as plain text or click Clipboard to copy the password without
viewing it.
Deleting a database
You can remove a database from the Databases list and the Centrify
privilege service only if you have removed all database accounts for
the database.
5 Click Yes to confirm that you want to proceed with deleting the
database.
Identifying favorites
Selecting an account
Viewing account details
Changing account settings
Setting account permissions
Changing access for an account
Checking out account passwords
Logging on without a password
114
Identifying favorites
Identifying favorites
As you add accounts to the privilege service, you might find it
convenient to identify the ones you work with most frequently as
favorites. You can identify accounts as your favorites by clicking the
appropriate Local Accounts, Domain Accounts, or Database Accounts
tab, then clicking the star icon next to the account name.
For more information about working with favorite accounts, see the
following topics:
Filtering favorite accounts
Accessing favorites from the User Portal
You should note that you can only select local account and resource
combinations as favorites to be added to the User Portal. You cannot
add favorite domain or database accounts as application tiles in the
User Portal.
Selecting an account
You can select an account to work with by clicking anywhere in the row
that contains the account name to display the account details or by
clicking the check box for a row. Selecting an account displays the
Actions menu to select the action you want to perform.
For example, you can select an account using the check box, then click
Actions to display the list of potential actions. The actions available
depend on the type of account you have selected and the permissions
you have been granted. For example, you might see some or all of the
following actions on the Actions menu:
For more information about the actions available when you select an
account, see Selecting an account.
If the target resource type is UNIX or Juniper and the root account is
not allowed to open secure shell sessions, select this option to use
the proxy account defined for the resource to start secure shell
sessions on the target resource.
If the target resource type is Windows and you are using Windows
Remote Management to manage passwords, select this option to
use the proxy account defined for the resource to validate and
manage account passwords on the target resource.
If you are viewing an account for a generic SSH device, you can edit the
account description. You cannot manage account passwords, use a
proxy account, or change the account name.
5 Type all or part of the user, group, role, or computer name you want
to find.
For example, if you have added the account root-1 for a target
resource, you might want to add the [email protected] role and
the [email protected] role to specify what members of each
role can do when using the root-1 account.
You must select at least one permission for the user, group, or role
before you can save changes to the account.
For more information about settings permissions for other users, see
Granting account-specific permissions. For more information about
global account permissions, see Setting global account permissions.
You should note that some tasks require multiple permissions. For
example, users must have both the Delete and Checkout permission to
delete accounts because they must be able to display or copy the
password for an account before deleting it. To give other users the
authority to configure a request and approval work flow, you must
assign them both the Grant and Edit permission.
Depending on the account type, you can control what members are
allowed to do using the following permissions:
Grant
Checkout
Login
Edit
Delete
Update Password
Portal Login
Rotate
For more information about any permission, click the permission type.
Grant
Checkout
You should not select this option if the account is used to access a
network device with the resource type of Generic SSH. You cannot
manage passwords for devices that only support generic secure shell
connections. Because the password doesnt change after being viewed
or copied, this permission would make the device vulnerable to attack.
This vulnerability also applies to any unmanaged account. However, in
some rare cases, granting the Checkout permission might be useful if
you want the ability to view or copy the password for an account that is
stored but not managed by the Centrify privilege service.
Login
Select Login to allow a selected user to use the selected account to log
on to the target resource using a secure shell (ssh) session or a remote
desktop (rdp) connection.
If you select the Login permission, the selected user, group, or role who
has access to the account can log on without knowing the account
password. This is the most common permission to grant because it
secures access to both managed and unmanaged accounts. Because
the password is not visible to the user who is using the account, you
should select this option if the account is used to access a network
device.
Edit
Select Edit to allow a selected user to edit information for the selected
account.
Delete
Update Password
Select Update Password to allow a user to update the password for the
selected account. For more information about updating the password
stored for an account, see Updating the password for stored accounts.
Portal Login
Rotate
Only users who have requested and been granted temporary access by
a designated approver display an expiration. The Expires column is
blank for users who are explicitly granted a permission outside of the
request and approval work flow. For more information about
enabling a request and approval work flow, see Managing access
requests.
about global permission settings for users, see Setting global account
permissions.
3 Select the specific account from which you want to remove access.
5 Select the user, group, or role you want to remove to display the
Actions menu.
6 Click Display if you want to view the password for the selected
account as plain text or click Clipboard to copy the password without
viewing it.
7 Click Close.
After taking the appropriate action on the remote computer, log off,
and check in the password. For more information about checking in a
password, see Checking in a password or Checking in a password from
the Workspace.
1 Select the Accounts tab and verify you are viewing Local Accounts.
4 Click the Actions menu, then click Login to open a secure shell
session or remote desktop connection on the target resource.
Successful and failed login attempts and active sessions are recorded
as recent activity in the dashboard, in your workspace, and in the list
of resource activity.
The password history lists all password change events for an account,
regardless of whether they are caused by automatic password
rotation, by checking in a managed password, or by manually updating
the password for an unmanaged account. Each time a password is
retired, the password history is updated with a new event that records
the password that has been retired.
3 Select the specific account for which you want to review password
history.
The password history lists the date and time of each password
change event and the user who checked the password in, causing the
old password to be replaced with a new password. If the password
checkout period expired or the password was changed automatically
because of a password rotation policy, the Retired by column
5 Select the password change event in which you are interested, then
select View Password from the Actions menu.
6 Click Display if you want to view the password for the selected
account as plain text or click Clipboard to copy the password without
viewing it.
The checkout is recorded as recent activity in the dashboard and in
the list of resource activity.
7 Click Close.
You can also explicitly prevent an account from being available for
access requests. For example, you might configure a request and
approval work flow for all accounts, then identify a few accounts
which do not allow access requests.
1 Select the Accounts tab, then click Local Accounts, Domain Accounts,
or Database Accounts to select the type of account you want to
modify.
4 Select Yes.
6 Click Save.
For more information about setting the password checkout policy, see
the following topics:
profile, but these challenges are only valid if users have both a phone
number and email address stored for their accounts.
If users only have a phone number and not an email address stored,
they will receive a phone call to complete the authentication process
rather than be prompted to select an authentication option. If users
have both a phone number and an email address stored, they will be
prompted to select which form of authentication to use.
You can configure the settings for a custom Simple Mail Transport
Protocol (SMTP) mail server and a Twilio in the administrative portal. To
support the Mobile Authenticator as a challenge, you must have a
properly enrolled mobile device. For details about post-installation
configuration steps when you deploy Centrify Privilege Service as an
on-site service, see the Installation and Configuration Guide for On-Site
Deployment.
4 Click Policy.
For example, click Add Rule, select a condition such as IP Address and
outside of the corporate range, then click Add. You can add more
than one condition to the rule. However, all conditions must be true
for the rule to apply.
7 Select the authentication profile to use when all of the conditions you
specify are true, then click OK.
You can select any existing authentication profile if an appropriate
profile has been previously-defined in the administrative portal for
the Centrify identity platform.
You can select Not Allowed as the authentication profile if you
want to prevent password checkouts when the conditions for this
authentication rule are met. For example, you might want to select
Not Allowed to prevent password checkouts when the request
comes from an IP address outside of the corporate IP range.
You can select Add New Profile if you want to create a new
authentication profile to use when the selected conditions.
Deleting accounts
If you have both the Delete and Checkout permissions, you can
remove an account from the Centrify privilege service while viewing
the accounts stored for a resource, domain, or database. For
information about setting account permissions to control which users,
groups, or roles are allowed to delete accounts, see Setting account
permissions.
To remove an account
Optionally, you can display the account details and click Permissions
to verify you have the Delete and Checkout permissions. However,
you must have the Grant permission to verify permission settings.
4 Click the Actions menu for the account, then click Delete.
For example:
5 Click Display if you want to view the password for the selected
account as plain text or click Clipboard to copy the password without
viewing it.
For more information about the global settings you can configure for
the Centrify privilege service, see the following topics:
136
Setting global account permissions
you set apply to all resources, domains, or databases you add to the
privilege service except when you explicitly set permissions differently
for a specific account and resource, domain, or database combination.
4 Click Add to search for and select users, groups, roles, or computers.
Type a search string to search for the users, groups, roles, or
computers to which you want to grant global permissions.
Select the appropriate users, groups, roles, or computers from the
search results.
Click Add.
Select Login to allow the selected user to use the shared account
to log on to resources without knowing the account password.
Select Edit to allow the selected user to edit information for all
accounts.
Select Delete to allow the selected user to delete accounts stored
in the Centrify privilege service.
Select Update Password to allow the selected user to update the
password for managed and unmanaged accounts.
Select Rotate to allow the selected user global permission to rotate
the password for managed accounts immediately without waiting
for the rotation period to expire. This permission enables selected
users to rotate the password on demand if there has been
suspicious activity or a risk that the password has been
compromised.
Only users who have requested and been granted temporary access by
a designated approver display an expiration. The Expires column is
blank for users who are explicitly granted a permission outside of the
request and approval work flow or granted a permanent permission
by a designated approver.
4 Click Add to search for and select users, groups, roles, or computers.
Type a search string to search for the users, groups, roles, or
computers to which you want to grant global permissions.
Select the appropriate users, groups, roles, or computers from the
search results.
Click Add.
After you set a policy, that setting becomes the default used for all
resources, domains, and databases unless you explicitly set a
resource-specific, domain-specific, or database-specific policy.
For more information about these policies, see the information pop-
up help or the descriptions of the resource-specific policies in Setting
resource-specific policies.
5 Click Save.
Note that you must have the SafeNet KeySecure appliance installed
and configured and available on the network before configuring it for
the storage of Centrify privilege service passwords. You can use client
certificates created by the Centrify service or a client certificate you
have created on your own.
After you start the job, you can view the status and results of the job by
clicking View Migration Job Status and Reports or wait to receive email
notification that migration is complete. The email notification will
provide a link to the job history. You can then click the link in the email
to see details about the migration results. Because the job history
report can list details for different types of jobs, you can use the Search
field to filter the jobs displayed.
3 Click Workflow.
5 Click Select and type a search string to search for and select a user or
role with authority to approve login and password checkout
requests, then click Add.
6 Click Save.
After you have configured the work flow for all accounts, users with
Privilege Management (Limited) rights can request login and password
checkout access for the accounts stored in the Centrify privilege
service. You can use account-specific settings to override the global
work flow. For example, you can use account-specific settings to
prevent access requests for some accounts or to modify the user or
role with approval authority.
4 Click Add.
6 Click Choose and select the specific connectors you want to use for
resources in the specified subnet.
Alternatively, you can select Any available if you want to allow any
connector available on your network for resources in the specified
subnet.
To automate the enrollment process and avoid storing any user names
or passwords in automation scripts, you can create one or more
enrollment codes that specify a domain pattern to identify the
computers you want to add. You can also specify how many times the
code can be used, that is, the maximum number of computers the
code can be used to add, and when the enrollment code should expire.
2 Select Enrollment Codes from the list of settings, then click Add.
Click Select to select a role to control who will own the computers
being added.
Type an optional description.
6 Click Save to generate the enrollment code, then click Copy to copy it
to the clipboard.
For more information about the Centrify agent and enrollment, see the
following topics:
After you download the agent, you can using a native package
manager to install. For more information about the Centrify agent, see
the following topics:
The Centrify agent replaces the CLI Toolkit, which was available in
previous releases. If you downloaded and installed the CLI Toolkit and
have scripts that used the commands included in previous releases,
you might need to modify the scripts to work with the Centrify agent.
For more information about migrating scripts from the CLI Toolkit to
3 Select a default shell from the list of available shells to use for the
agent service user.
4 Specify the template to use for the home directory for the agent
service user.
5 Click Save.
you must download and install Centrify Server Suite 2015, or later, to
work with Centrify privilege service.
If you are familiar with auditing using Centrify Server Suite, you might
have an agent installed on some or all of your target resources.
However, the agent is not required when you are using the Centrify
privilege service to audit session activity. Instead, you can use the
Centrify connector to send session activity directly to the collector
without installing an agent or the auditing service on the target
resource. The only additional requirement to enable auditing using the
connector is that the computer you are using for the connector must
be within the scope of an audit storethat is, the computer must be
included in the site, subnet, or IP address identified as the audit store.
The session activity for all target resources will be sent to the audit
store that includes the computer where the connector is installed.
For more information about defining the scope for an audit store, see
the Auditing with Centrify Server Suite Administrators Guide.
You must have the Enterprise Edition of Centrify Server Suite 2015 (or
later) to audit the sessions you open from Privilege Manager. If you
have an older version of Centrify Server Suite, you must upgrade
before enabling auditing using the connector.
3 Select Enable Auditing and type the name of the audit installation if
you want to audit user activity on the resources you manage.
Privilege Management
Only users with the System Administrator role or a role with one of
these administrative rights can access the Privilege Manager portal or
the resources and accounts that have been added to the Centrify
privilege service. You can then use global or resource-specific
permissions to further control what users in each role can do. For
example, some users who have the Privilege Management (Limited)
administrative right might be granted the global Login permission so
that they can log on to any resource without knowing any account
passwords. Other users might be granted the Login permission only
for a specific account and resource combination, such as the oracle
shared account on the db-main.ajax.org server.
3 Click Add Role or select an existing role to display the role details.
If you are creating a new role, you must provide at least a unique
name for the role.
In most cases, you give users access to shared accounts and resources
by assigning them to a role with Privilege Management or Privilege
Management (Limited) administrative rights and granting
account-specific, resource-specific, or global permissions for what they
can do. As an alternative to explicitly granting permissions, you can
establish a request and approval work flow that gives specific users
or members of specific roles the ability to approve or reject access
requests.
You can enable a request and approval work flow for any or all
accounts stored in the Centrify privilege service. Users who dont have
access can then submit requests to a designated approver who has the
authority to grant or deny them access. By enabling a work flow, users
can request access to the privileged accounts you specify and, if their
request is approved, check out the account password or use the
account to log on remotely.
156
Authorizing global approval for access requests
You can configure the settings for a custom Simple Mail Transport
Protocol (SMTP) mail server in the administrative portal. For details
about post-installation configuration steps when you deploy Centrify
Privilege Service as an on-site service, see the Installation and
Configuration Guide for On-Site Deployment.
At a high level, the steps involved in configuring a work flow are these:
Create one or more roles that can enable a request and approval
work flow.
Members of the sysadmin role can enable work flow globally for all
accounts. Users with the Privilege Management or
Privilege Management (Limited) administrative right can enable work
flow and select an approver for specific accounts where they have
the Grant and Edit permissions.
Create one or more roles that can approve access requests for
accounts.
Create one or more roles that can request access to privileged
accounts.
Any member of a role with the Privilege Management or Privilege
Management (Limited) right can request access to any account
where work flow is enabled. The appropriate permissions are
granted if the request is approved.
Determine whether to enable the work flow globally for all accounts,
individually for specific accounts, or a combination of both.
Enable the work flow option where appropriate and select the user
or role with authority to approve requests.
If you are configuring a request and approval work flow for privileged
accounts, you must create at least one role for users who are allowed
to view resources and accounts. Only the members of a role with either
the Privilege Management or Privilege Management (Limited)
administrative right can request login and password checkout access.
Only members of the sysadmin role or a role with the Privilege
Management or Privilege Management (Limited) administrative right
can enable a request and approval work flow for stored accounts
where they have the Grant and Edit permissions.
3 Click Add Role or select an existing role to display the role details.
If you are creating a new role, you must provide at least a unique
name for the role.
5 Type a search string to search for and select users and groups for this
role.
Only members of the sysadmin role can enable work flow globally
for all accounts. Members of a role with the Privilege Management or
Privilege Management (Limited) right can enable work flow for
accounts where they have the Grant and Edit permissions.
Keep in mind that if you are creating a role with permission to approve
access requests to stored accounts with managed or unmanaged
passwords, you must include the Privilege Management or Privilege
Management (Limited) administrative right in the role. You can select
any additional rights you want included in this role, but you must select
at least one of the required administrative rights.
3 Click Workflow.
5 Click Select and type a search string to search for and select a user or
role with authority to approve login and password checkout
requests, then click Add.
6 Click Save.
After you have configured the work flow for all accounts, users with
Privilege Management or Privilege Management (Limited) rights can
request login and password checkout access for the accounts stored in
the Centrify privilege service.
4 Click Workflow.
5 Set the Enable Account Workflow to Yes if you want to select a user
or role with authority to approve access requests.
If you enabled work flow for all accounts, selecting Yes allows you to
select a different user or role with approval authority. If you are not
enabling work flow for all accounts, selecting Yes makes this specific
account available for users requesting login or password checkout
access.
If you disabled work flow for all accounts, selecting No prevents users
from requesting login or password checkout access.
6 Click Save.
After you have configured the work flow for an account, users can
request login or checkout access to the account through the Privilege
Manager portal.
If you select a resource or account, what you can do will depend on the
permissions you have available. For example, if you dont have the
Login permission granted, you cannot log on to target resources using
stored account information. However, if the privilege service is
configured to use a request and approval work flow for stored
accounts, you will be able to request login access from a designated
user or member of a designated role. It is at the approvers discretion
to approve or reject your request, and if approved, to grant you
permanent or temporary Login permission.
If your request is approved and you are only temporarily granted the
Login permission, you will have a limited period of time in which to log
on to the selected resource using the selected account. If you are
granted temporary Login permission, you can continue to use the
session on the target resource after the approved period of time
expires. If you exit the session, however, and attempt to log on after
the temporarily approved period expires, you must submit a new Login
access request.
If you select a resource or account, what you can do will depend on the
permissions you have available. For example, if you dont have the
Checkout permission granted, you cannot check out the password for
3 Click Request Password Checkout for the account you want to use.
4 Type the business reason for requesting permission to check out the
password for the selected resource and account combination, then
click Submit.
After you respond to the request, the Requests tab is also updated with
the latest activity and email is sent to the requester as notification of
your response to the request.
Regardless of the entry point for viewing the Requests tab, the list of
requests includes the following information:
If you have the authority to approve requests and the request is still
pending a response, you can click Approve or Reject from the Request
details. For more information about approving or rejecting a request,
see Responding to access requests.
Regardless of the entry point for viewing request details, the request
information table displays details appropriate for the current state of
the request. For example, you might see the following information:
Posted displays the date and time of the most recent activity for
each request.
Description provides a brief summary of the request indicating the
type of access or application requested.
Requestor displays the user who submitted the request.
Requestors Reason displays the business reason provided by the
user who submitted the request.
Approver displays the user or role designated for approving access
requests if the approval is pending or the specific user who
approved or rejected the request if the request has been resolved.
Status displays the current status of the request as Pending,
Approved, Rejected, or Failed.
Depending on the status of the request, you might see the reason the
request was rejected or the reason why the request failed.
Deleting requests
If you have the Delete permission, you can remove requests from the
Requests list if the request history is no longer needed.
To remove a request
4 Click Yes to confirm that you want to proceed with deleting the
request.
You can greatly improve security for the accounts used to run
applications by storing and managing these accounts and their
passwords in the Centrify privilege service. After you identify the
applications that run using a local or domain service account you can
automate password rotation without interrupting application
availability.
170
Viewing the list of applications
Name indicates the service name used to run the Windows service
or the full path to the scheduled task.
Description displays the display name associated with the
Windows service or scheduled task.
Resource indicates the target resource where the application runs.
Multiplexed account is empty until you configure automatic
password management for the application. For example, this field
is blank for newly-discovered applications.
Current account displays the local or domain account that the
application is currently configured to run as.
Application type indicates whether the application is a Windows
service or a scheduled task.
Active indicates whether the Windows service or scheduled task
with automatic password management is currently running on the
resource.
Issues displays additional information about the status of the
application. For example, if an application failed to restart or was
not found on a target resource, a message indicating the status is
displayed.
5 Type the application service name or the full path to the scheduled
task. For example, the service name for the Virtual Disk service is
vds.
7 Click Select to search for and select a stored domain account you
want to use to manage the password for the application.
Type a search string to locate an appropriate domain account
that is stored in the privilege service and has the sufficient
permissions to modify the application account password.
Select the account in the list of results, then click Add.
8 Click Select to search for and select a multiplexed account to run the
application.
If you select the Restart option, you can also select the Enforce restart
time restrictions option to specify time constraints that will control
when the application is restarted. For example, you might want to only
allow an application service to be restarted on Saturday or Sunday
between 2:00AM and 3:00AM based on your local time zone.
For example:
The sub-accounts for the multiplexed account must meet the following
criteria:
The domain where the sub-accounts are used must have periodic
password rotation enabled and an interval set at the domain or
global security settings level.
By testing the sub-accounts first, you can ensure they dont cause
service interruptions, application failures, or account locking problems.
5 Click Select for Account 1 to search for and select a stored domain
account that is managed by the Centrify privilege service.
The domain account you select must have the appropriate
permissions to run the target service or scheduled task.
The domain account password must be managed by the Centrify
privilege service.
You must have periodic password rotation enabled at the
domain or global security settings level.
When you type a search string to locate the account, only accounts
that meet the criteria are returned. Select the appropriate
sub-account in the list of results, then click Add.
6 Click Select for Account 2 to search for and select a stored domain
account that is managed by the Centrify privilege service.
The multiplex account ensures that all of the computers where the
managed application account is used are synchronized before the
password is rotated. If your password rotation interval is 90 days, for
example, the application might run for 45 days using the subaccount1
managed password, then switch to using the identical subaccount2
managed password.
4 Click Select for Account 1 to search for and select a stored domain
account that is managed by the Centrify privilege service.
The domain account you select must have the appropriate
permissions to run the target service or scheduled task.
The domain account password must be managed by the Centrify
privilege service.
You must have periodic password rotation enabled at the
domain or global security settings level.
When you type a search string to locate the account, only accounts
that meet the criteria and are not already associated with another
multiplexed account are returned. Select the appropriate
sub-account in the list of results, then click Add.
5 Click Select for Account 2 to search for and select a stored domain
account that is managed by the Centrify privilege service.
4 Click Activity.
4 Click Permissions.
If you have completed these tasks, you are ready to update the
application to use a multiplexed account.
3 Click Select to search for and select the stored domain account that
will manage the password for the application, if needed.
7 Type the application service name or the full path to the scheduled
task. For example, the service name for the Virtual Disk service is
vds.
8 Click Select to search for and select a multiplexed account to run the
application.
If you select the Restart option, you can also specify time
constraints to control when the application is restarted. For
example, you might want to only allow an application to be
restarted on Sundays between 2:00AM and 3:00AM based on the
local time zone.
If there are time restrictions for restarting the application that are
in effect when you are attempting to start password management,
you are prompted to confirm restarting the application.
6 Click Close.
To use the Edit permission, however, users must also have Edit
permission on the target resource, Checkout permission for the
application administrative account, and Checkout and Edit permission
for the sub-accounts associated with the multiplexed account for the
application.
3 Click Permissions.
4 Click Add to search for and select the users, groups, roles, or
computers to which you want to grant application-specific
permissions, then click Add.
For more information about installing and using the Centrify agent
package, see the following topics:
186
After you import the key, run the appropriate package manager
command to install the package.
For more information about installing and using the Centrify agent
package, see the following topics:
After you install the package using a native package manager, you can
find the command line programs and sample scripts in the
/usr/share/centrifycc directory. For examples of how you can
use the command-line programs in scripts to manage passwords for
local or privileged accounts, see the sample scripts included in the
/usr/share/centrifycc/samples directory.
For more information about the Centrify agent package, see the
following topics:
For more information about copying and modifying the sample scripts,
see the files in the /usr/share/centrifycc/samples directory.
Enrolling a computer
There are two ways you can enroll a computer in the Centrify identity
platform:
Note that the network address you specify when enrolling whether
by DNS name or IP addressmust be able to connect to the Centrify
identity platform. If the address is protected inside of a firewall or not
accessible for other reasons, enrollment will fail.
After you have configured at least one role for enrollment, you can run
a command similar to the following to enroll a local computer in the
Centrify identity platform:
If you satisfy these prerequisites, you can run the cenroll command
using the --code option. To use an enrollment code, you can run a
command similar to the following to enroll a computer in the Centrify
identity platform:
Enrollment confirmation
If the cenroll command connects to the Centrify identity platform
successfully, you might see confirmation similar to the following in
standard output (stdout) or recorded in a log file.
Enrolling Centrify Identity Platform
https://abc0271.my-dev.centrify.com/ using user credential...
You may need to restart other services that rely upon PAM and NSS or
Automating enrollment
You can use the commands included in the agent package and
enrollment codes to automate the deployment and removal of virtual
machine instances such as Amazon Machine Instances (AMI) in an
Amazon Web Services (AWS) cloud environment.
Verifying enrollment
A successful enrollment updates the Centrify identity platform with
new information in several places. After enrollment, you can verify the
new information associated with the computer.
3 Click the Resources tab and select the computer you enrolled in
Step 1 to display its details.
4 Click Permissions.
5 Click Add, if necessary, to find and select the user account, then select
Agent Auth.
6 Click Save.
automatically add these roles to the resource with the Agent Auth
permission set.
Both remote access and the ability to change passwords are required
to support application-to-application password management (AAPM).
Therefore, if you want to enable application-to-application password
management, you must have at least one connector installed.
By default, the service user is assigned the Grant, Edit, and Delete
permissions on its enrolled computer and can get and set passwords
for that computer. For the service user to get passwords for accounts
on another computer, however, you must add the service account to
the remote computer manually. This additional step is required to
support application-to-application password management. For more
information about setting and retrieving passwords for
application-to-application password management, see Managing
passwords for applications.
With Centrify privilege service, you can address both of these issues.
You simply need to do the following:
If you enroll a computer and enable the aapm feature, the service user
account for the computer is automatically added to an Agent
Management role with administrative rights to use commands such as
the csetaccount, cgetaccount, and cdelaccount commands. You
can then use these commands in scripts to set, retrieve, and delete
manged account passwords. The permissions required are set
automatically as part of enrollment.
For example, you can type the following command to set the password
interactively for the local root account and add the password for the
account to the Centrify privilege service:
csetaccount root
This command prompts you for the account password, then stores the
account name and password as an unmanaged password in the
privilege service.
To protect the passwords for accounts with privileged access, you can
have the passwords managed by the Centrify privilege service. For
example, you might have a local administrative account of myoracle
that require access to the root account on a remote computer.
If you type the correct password for the account, the account is added
to the Centrify privilege service and a new randomly-generated
password is set. You can verify the new account is listed for the
resource in the Privilege Manager portal.
If you view details for the account, you can confirm the account
password is managed by the privilege service.
If you dont already have local accounts for running applications and
scripts, you can create them using a program such as useradd or by
using Access Manager, adedit, or the Access Module for PowerShell if
your organization also uses Centrify Server Suite 2016 (or later). If you
use Centrify Server Suite, you can also define command rights and
roles for users who have access to privileged account passwords.
2 Click the Resources tab to select the server resource (centos-6) with
the accountsuch as the local root accountthe client service user
(sles12$) needs to access.
For example, select the root account for the centos-6 computer to
display the account details.
4 Click Permissions, then click Add to add the service user that needs
to check out the password for the account on the resource.
For example, if the service user for client computer where the script
will run is [email protected], you might type sl to find the
account.
8 Click Save.
If you have configured the sudoers file for the myoracle account, you
might retrieve the password for the root account interactively by
running commands similar to the following:
Because this is a managed account you might need to display and copy
the password. You can then use the myoracle account to get the
password for the root account
su myoracle
sudo cgetaccount --lifetime 30 CentOS-6.cpubs.net/root
myoracle's password:
If you have configured a command right using Centrify Server Suite for
the myoracle account, you might retrieve the password for the root
account interactively by running a command similar to the following:
su myoracle
dzdo cgetaccount CentOS-6.cpubs.net/root
You can call the cgetaccount command from within a script to silently
retrieve an account password from the privilege service. By calling the
command within a script using a dedicated user account such as the
myoracle account, you can prevent other applications or scripts from
using the client service user account to retrieve a server account
password. If you want to use the cgetaccount command to check
out, use, and update a managed password from within a script,
Most of the commands included in the agent package are the same as
the commands included in the CLI Toolkit, but the options supported
by each command might be different. In addition, the agent package
has two new commandscenroll and cunenrollthat replace the
cjoin and cleave commands in the CLI Toolkit. For details about the
options supported for each command, see the man page for that
command.
You should also use the native package manager to remove the CLI
toolkit from the computer. For example, on Red Hat Linux, you might
run a command like this:
rpm -e CentrifyCC
If there are errors, you can review the operation details logged in the
/var/log/centrifycc-install.log file.
The Centrify agent for Linux communicates with the Centrify identity
platform through HTTPS, which requires a trusted root certificate to
be available. By default, Linux computers will not trust the Centrify
identity platform self-signed certificate.
You must specify either all or aapm for the --feature option
during enrollment to use cgetaccount, csetaccount, and
cdelaccount commands.
Grant permissions
Users must have the Grant permission for a privilege service account
to grant the Checkout permission to other users, groups, or roles. By
default, members of the System Administrator role and the user or
role who enrolled a computer are assigned the Grant permission.
207
Checking in a password from the Workspace
The actions available on the Actions menu depend on what you have
selected. For example, if you select a favorite resource, you would
see the following:
Click Account Actions to work with shared local accounts for the
selected server or network device.
Click AD Account Login to select an Active Directory account to use
to log on to the selected server or network device.
After you select an action, the next steps depend on the specific action
you selected. For example, if you select Account Actions, you can view
the list of shared accounts and select the appropriate action to take as
described in Selecting account actions for a resource.
2 Select an active session from the My Active Sessions list to display the
Actions menu.
3 Select Watch to view the activity taking place in the selected session
or Terminate to end the selected session.
210
Managing an active session
Active Sessions lists the resources where there are sessions initiated
from Privilege Manager using stored account information or
manually-entered credentials.
2 Select an active session from the Active Sessions list to display the
Actions menu.
3 Select Watch to view the activity taking place in the selected session
or Terminate to end the selected session.
By default, the passwords for the accounts you add to the Centrify
privilege service are stored securely in a local repository if you are
managing the service on your own network or in the Centrify cloud if
you are using the cloud-based service. If you prefer to store them in a
key management or hardware security appliance such as an on-site or
off-site SafeNet KeySecure appliance, you can configure the Centrify
privilege service to store and retrieve account passwords using the
supported external appliance.
212
Note that you must have the SafeNet KeySecure appliance installed
and configured in your environment and available on the network
before configuring it for storage of Centrify privilege service
passwords.
2 Click the Security tab to display the Device CAs and SSL Certificates
section, then click Local CA.
If you create a self-signed root CA, you must also specify certificate
duration and a maximum user certificate duration. If you are creating
a self-signed root CA, you must also manually add it to the list of
trusted CAs before it can be used.
Alternatively, you can click Add to create a new profile, then select the
new profile and click Properties.
9 Select the self-signed root CA from the list of Available CAs, click Add,
then click Save.
1 On the Security tab, under Device CAs and SSL Certificates, click SSL
Certificates.
7 In the Local Certificate Authority List, select the local CA, then click
Sign Request.
14 Paste the text from the signed certificate into the Certificate
Response field, then click Save.
The options to add, edit, and delete key server instances are
restricted. If you dont see these options, you need to log on using
different administrative account credentials.
3 Select KMIP as the server protocol, type the port number and select
Use SSL, then select the KeySecure server certificate from the list of
available certificates.
4 Click Save.
5 Click the Security tab, then under Device CAs and SSL Certificates,
click Local CA.
The certificate you download in this step is the certificate you need to
upload to the Centrify privilege service to enable secure
communication between the KeySecure appliance and the
connector.
The first two options assume you are signing the certificate with a
trusted local certificate authority and require you to upload the signed
client certificate to the connector. The third option requires you to
download the Centrify CA certificate onto the KeySecure appliance.
After you have selected an option for obtaining the client certificate,
you have all of the information required to configure SafeNet
KeySecure as the password storage location for the accounts you add
to the Centrify privilege service.
3 Select Network from the list of setting categories, then select SafeNet
KeySecure Configuration.
8 Select the client certificate you installed in Step 5, then click Add to
add the certification to the list of trusted certificates.
9 Click Save.
If you dont migrate passwords, they remain in the location where they
were initially added. For example, if you have three accounts you
added before changing the password storage location to SafeNet
KeySecure, the passwords for those three accounts remain stored in
the Centrify privilege service until you choose to migrate them. The
passwords for all of the accounts you add after changing the password
storage location to SafeNet KeySecure are saved in the KeySecure
appliance.
5 Click Save.
Changing the storage location will prompt you to specify whether you
want to migrate passwords to the new location. If you want to
migrate existing passwords to the new location, specify the email
address where you want to receive notification of the migration
results, then click Yes. If you want existing passwords to remain in
their current location, click No.
When you add resources and accounts using the Add Resources
wizard, import resources and accounts from a file, or add accounts to a
selected resource, passwords are saved in the new storage location. If
you use proxy accounts for any resources, the passwords for those
accounts are also stored in the selected password storage location.
After you start the job, you can view the status and results of the job by
clicking View Migration Job Status and Reports or wait to receive email
notification that migration is complete. The email notification will
provide a link to the job history. You can then click the link in the email
to see details about the migration results. Because job history reports
can list details for different types of jobs, you can use the Search field
to filter the jobs displayed.
Use a colon (:) to separate the IP addresses within the same tier.
Use a pipe character (|) to separate the IP addresses in different
tiers.
192.168.1.2:192.168.1.3|192.168.1.4:192.168.1.5|192.16
8.1.6:192.168.1.7
KMIP_IP.1=192.168.1.2:192.168.1.3
KMIP_IP.2=192.168.1.4:192.168.1.5
KMIP_IP.3=192.168.1.6:192.168.1.7
The connectors will always try to connect to the appliances in the first
tier, distributing the workload to both the 192.168.1.2 and
192.168.1.3 appliances. If the appliance with the IP address
192.168.1.2 goes down, all connector traffic is routed to the
appliance with the IP address 192.168.1.3. The connector will
continue to use only the appliances in the first tier as long as there are
appliances available in that tier. If no appliances are available in the
first tierthat is, both 192.168.1.2 and 192.168.1.3 become
unavailablethe connector will try to connect to the appliances in the
second tier.
4 Click Delete.
To create and review reports for managed resources, you must switch
to the administrative portal, then click the Reports tab. The Reports tab
lists all of the built-in, private, and shared reports that are currently
available for the Centrify identity platform and related services. Open
the Builtin Reports, then select Resources to see the built-in reports for
the Centrify privilege service. For example:
228
After you select a report, click Actions to display the list of potential
actions. From the Actions menu, you can click:
Troubleshooting
There are a few common errors you might see when using Centrify
Privilege Service, particularly if you have set up a demonstration
environment for evaluation and testing. This section describes the
most common errors, how to check the cause of the error, and what
you can do to prevent the error from occurring.
230
Unable to update account password
If this policy is defined, you can either wait more than one day before
adding the account with a password to be managed to the privilege
service or you can disable the policy while testing with newly-created
local accounts on computers joined to the domain. The issue doesnt
exist on computers that are not joined to the domain where the
policy is set or for local accounts with a password exceeding the
Minimum password age.