Website access disclosure plugins
Secure browser plugin: securebrowser
The securebrowser
access disclosure plugin provides users with brokered access to a website without the need to enter the administrative credentials for the managed account and is compatible with session recording.
This requires installation of the Secure Browser app.
The securebrowser
plugin is primarily used in conjunction with team management .
You can modify the following default attributes to control the behavior of securebrowser
:
configuration_file
The configuration file in JSON format.webappjson_create
If enabled, the user checking out the managed account can upload their own website applications. This is disabled by default.webappjson_search
By default, the user checking out the managed account has the ability to search and select a desired website application.
Collecting logs when the secure browser disclosure has issues
The secure browser extension uses a different technology to the native plugins and doesn't provide logging data to the logutil
tool that is normally used for troubleshooting.
You can instead compare server logs for a successful attempt with those for a failed attempt, and try to identify the difference.
Determine a way to get all user HTTP calls to the same server for testing.
Increase logging to only the smonotu binary to Verbose (in the util\ directory on the server being contacted):
psdebug -prog smonotu -level 99
Rotate the log:
..\service\idmlogsvc -trace-restart
Perform a successful disclosure for a user whose access works.
Check
idmsuite.log
to ensure thatsmonotu
logs at Verbose level (search for a line that contains both "smonotu.exe" and "Verbose"If you find it, rename that log to
idmsuite-success.log
.If not, verify the
psdebug
command was run in an administrative command prompt.
Rotate the log again.
Perform an unsuccessful disclosure for a user whose access doesn't work.
If you can't get the issue to reproduce, it may be that the load balancer causes it, by not providing sticky sessions and sending disclosure HTTP requests to different servers.
If the issue is reproduced, verify there are
smonotu
log entries, and if so, rename the log toidmsuite-failed.log
.Remove the verbose logging:
psdebug -prog smonotu -remove
Zip up the two log files and send the resulting archive to Bravura Security Support.
Web app privileged sign-on: pswxwebapp
The pswxwebapp
access disclosure plugin provides users brokered access to a website without the need to enter the administrative credentials for the managed account.
This is compatible with desktop Chrome browsers and requires installation of the Bravura Security browser extension.
The pswxwebapp
plugin is primarily used in conjunction with Team Management.
You can modify the following default attributes to control the behavior of pswxwebapp
:
configuration_file
The configuration file in JSON format.webappjson_create
If enabled, the user checking out the managed account can upload their own website applications. This is disabled by default.webappjson_search
By default, the user checking out the managed account has the ability to search and select a desired website application.
Note
The logutil
utility cannot capture pswxwebapp
plugin activity.