The simplest form of access control in Hitachi ID Privileged Access Manager is based on managed system policies (MSPs). MSPs link collections of managed systems and managed accounts to groups of users and operational policies.
Individual systems may either be attached to a policy explicitly (e.g., "attach system SYS0123 to policy MSP-A") or implicitly, using an expression such as "all systems of type Linux at 10.0.1.0/24 are attached to MSP-B". Expressions may be based on the operating system type, IP address, MAC address, system name or other metadata acquired from an inventory source.
Managed system policies are configured with operational and access control rules, including:
- Which accounts' passwords to randomize on attached systems, and how often.
- Which groups' membership may be temporarily granted to authorized users.
- How to compose random passwords (e.g., length, complexity, etc.).
- What actions to take after successful or failed attempts to disclose access.
- What access disclosure methods to offer authorized users -- e.g., launch a given type of client program with ID/password from the credential vault, display a password, copy buffer integration, temporary group membership or SSH trust, etc.
Privileged Access Manager users are likewise grouped, either explicitly or implicitly. Most commonly, users are assigned to Privileged Access Manager user classes through their membership in Active Directory or LDAP groups. User classes are then assigned specific rights with respect to specific managed system policies. For example, "every user in group A may launch RDP sessions to privileged accounts on systems in policy B."
Business rules, such as segregation of duties between different sets of users, can also be enforced. This is done by examining, managing and limiting group membership on reference systems, such as Active Directory or LDAP.
Privileged Access Manager includes the same authorization workflow engine as is used in Hitachi ID Identity Manager. Workflow enables users to request access to a privileged account that was not previously or permanently authorized. When this happens, one or more additional users are invited (via e-mail or SMS) to review and approve the request. Approved requests trigger a message to the request's recipient, including a URL to Privileged Access Manager where he or she can re-authenticate and "check out" access.
The workflow process is illustrated by the following series of steps:
- User UA signs in and requests that access to privileged account PA on system S be made available to user UB at some later time T. UA may be the same person as UB (a self-service request).
- Privileged Access Manager looks up authorizers associated with LA on S.
- Privileged Access Manager may run business logic to supplement this authorizer list, for example, UA or UB's manager. The final list of authorizers is LA. There are N authorizers but approval by just M (M ≤ N) is sufficient to disclose the password to PA.
- Privileged Access Manager sends e-mail invitations to authorizers LA.
- If authorizers fail to respond, they get automatic reminder e-mails.
- If authorizers still don't respond, Privileged Access Manager runs business logic to find replacements for them, effectively escalating the request. Privileged Access Manager will invite replacement authorizers next.
- Authorizers receive invitation e-mails, click on a URL embedded in the e-mail invitation, authenticate themselves to the Privileged Access Manager web portal, review the request and approve or deny it.
- If any authorizers deny the request, e-mails are sent to all participants (UA, UB and LA) and the request is terminated.
- If M authorizers approve the request, thank-you e-mails are sent to all participants. The e-mail sent to the recipient includes a URL to an access disclosure page.
- UB clicks on the e-mail URL and authenticates to Privileged Access Manager.
- UB clicks on a button in the web portal to check-out privileged access.
- UB then may click on a button to do one of the following (the options
available will vary based on policy):
- Display the password (rarely allowed).
- Place a copy of the password in the operating system copy buffer (sometimes allowed).
- Launch an RDP, SSH, vSphere, SQL Studio or similar login session to PA on S (most common).
- Randomize Privileged Account Passwords
Eliminate static, well-known passwords through scheduled and event-triggered randomization.
- Secure Credential Vault
Store passwords in a highly available, geographically redundant, access controlled vault.
- Policy to Control Access
Grant pre-authorized access to frequent users and authorize one-time requests for others.
- Flexible Access Disclosure Mechanisms
Grant temporary access through single sign-on, security groups and SSH trust.
- Session Recording
Generate forensic audits of privileged logins with video and keyboard capture.
- SSH Key Management
Discovering SSH trust relationships and granting access using SSH trust injection.
- Secure and Monitor Vendor Access
Secure vendor access with 2FA, session request/approval, web session proxy and video capture.
- Change Windows Service Account Passwords
Automatically map Windows accounts to services and safely, periodically change passwords.
- Secure Application-to-Application Passwords
Replace static, embedded passwords with a secure password-retrieval API.
- Reports, Dashboards and Analytics
Monitor use of elevated privileges to identify high-risk users, systems, accounts and events.