Configuring global access disclosure options
You configure access disclosure plugins globally, and then override settings and behavior for different managed system policies if necessary. Attributes control the behavior of the access disclosure plugins.
Getting started
To configure system-wide access disclosure options:
Click Manage the system > Privileged access > Access disclosure plugins.
To define a:
New access disclosure plugin, click Add new… .
Existing access disclosure plugin, select the plugin you want to view or modify.
You can now:
Define common access disclosure parameters.
Modify attributes that control disclosure
Add attributes that control disclosure
Defining access disclosure plugins
You can add custom access disclosure plugins to make them available to managed system policies. For each access disclosure plugin, you can configure one or more attributes that modify the behavior of the plugin.
To define common parameters for an access disclosure plugin:
Navigate to the access disclosure plugin configuration page
Set the access disclosure plugin options as described in Table 1, “Access disclosure plugin global options”.
Caution
For existing plugins, it is recommended that you only modify Description or the options to automatically add this plugin to new managed system policies.
Click Update to modify an existing plugin, or Add new… to add a new plugin.
Option | Description |
---|---|
ID | Automatically generated ID |
Filename | The filename of the access disclosure plugin. The file must either be deployed to client workstations or located in the \<instance>\wwwdocs\ directory on the Bravura Security Fabric server |
Class ID | The GUID of the access disclosure plugin. This is not applicable for Guacamole access disclosure plugins. |
ActiveX server/type | The server name of the access disclosure plugin. This is not applicable for Guacamole access disclosure plugins |
Version | The version of the access disclosure plugin |
Description | The plugin description presented to users |
Notes | Additional details about this plugin to be displayed under the description |
Allow this as a selectable option for group sets | Check to make group sets selectable during managed system policy configuration |
Allow this as a selectable option for current passwords | Check to make current passwords selectable during managed system policy configuration |
Allow this as a selectable option for old passwords | Check to make old passwords selectable during managed system policy configuration |
Allow this as a selectable option for SSH keys | Check to make SSH keys selectable during managed system policy configuration |
Automatically enable for group sets on new managed system policies | New managed system policies created will include this plugin to access the current group sets |
Automatically enable for current passwords on new managed system policies | New managed system policies created will include this plugin to access the current privileged password |
Automatically enable for old passwords on new managed system policies | New managed system policies created will include this plugin to access old privileged passwords |
Automatically enable for SSH keys on new managed system policies | New managed system policies created will include this plugin to access privileged accounts using SSH keys |
Defining access disclosure attributes
You can add or modify attributes to customize the plugin behavior.
To define access disclosure plugin attributes:
Navigate to the access disclosure plugin configuration page
Select to update and modify an existing plugin, or Add new.. to add a new plugin
Option | Description |
---|---|
Name | The name of the plugin attribute. Cannot be modified after attribute has been added. |
Description | The description of the plugin attribute. |
Type | Choose the plugin attribute type:
|
User access | Sets the options that a user has for the attribute:
|
Default value | Use only if the user does not override the value, or it is not overridden at the managed system policy level. |
Allowed values (comma-delimited list) | A restricted list of values that the attribute value can take. This option is only displayed for type integer and strings. |
Value must match this regular expression | A value must be validated with this regular expression in order for the plugin to be enabled. This option is only displayed for type integer and strings. |
Minimum | If set, no value can be less than the value set. This option is only displayed for type integer. |
Maximum | If set, no value can be more than the value set. This option is only displayed for type integer. |
Value is required | If checked, a value must be set in order for the plugin to be enabled. This option is only displayed for type integer and strings. |
You can override these default settings on the managed system policy level. See Overriding global settings in managed system policies .
Configuring string plugin attribute values
All access disclosure plugin attributes of type String can be defined with variables. You can define discovered system attribute values in this manner.
To use the discovered system attribute as-is, simply enter the following in the attribute’s Default value field:
% <attribute name> %
For example, the default domain value for a remote desktop plugin is:
%netBIOSDomainName%
String attributes can be manipulated by using the following syntax:
%k:(start position):(end position):<attribute name>%
For example:
%netBIOSDomainName% = corporate.domain %k:3:12:netBIOSDomainName% = porate.dom %username% = CORP\account00 %k:5:username% = account00
Cloning access disclosure plugins
In some scenarios, it may be desirable to have multiple instances of the same access disclosure plugin but with different settings; for example:
Some end users like to use a PuTTY terminal; others prefer Tera Term.
A product administrator defines two disclosure plugins; one for PuTTY, one for Tera Term.
The PSW disclosure plugin dynamically selects which disclosure plugin to display to an end user using a request or profile attribute.
Product administrators can create new instances of the same access disclosure plugin by cloning.
To clone an access disclosure plugin:
Navigate to the access disclosure plugin configuration page
Select to update and modify an existing plugin.
Click Clone .
Specify a description and modify other options as needed.
Click Add.
When using the
pswdisclosure
script, you will need to know the new disclosure plugin’s ID in order for it to be available to the plugin.
You can also clone access disclosure plugins in managed system policies. See Cloning access disclosure plugins within a managed system policy .
You can set up access disclosure plugins to allow end users to save sessions with their preferred settings. See Enabling saved sessions .
Enabling saved sessions
In scenarios where end users can override disclosure plugin attributes, they may want to save their modified values as a saved session ; for example if they want to:
Specify a webpage to log into with a directory account
Specify an RDP destination to log into with a directory account
Choose a synthetic attribute that expresses a common set of values that will be used to gain access to a system
This allows end users to save their preferences, improves usability and reduces the likelihood of error. It also requires less administrative work than cloning.
To enable users to save sessions for a disclosure plugin, at least one attribute must be set to allow overrides , on either the global or managed-system-policy level.
This capability is not available for Copy, Display, or Run command plugins.
The Functional.pam_saved_session_policy
component allows administrators to configure global saved sessions that are available for all end users.
To learn how to save sessions as an end user, see Saving sessions in the User Guide.
Configuring pam_saved_session_policy
To configure saved session policies:
Install the
Functional.pam_saved_session_policy
component.Click Manage external data store to edit the following tables in the external data store (
extdb
) :pam_saved_session_policy
Define the policy to apply the saved session.
pam_saved_session_action
Define the saved session to apply to the selected policy.
If the saved session overrides multiple disclosure attributes, then an entry needs to be created for each disclosure attribute that will be modified.
If there are multiple entries with the same SavedSessionName value, those entries will be treated as the same saved session.
If there are multiple entries with the same SavedSessionName value but different SavedSessionCategory and SavedSessionNotes values, the value from the latest entry will be used (unless the value is empty).
If any entries are modified or added to an existing saved session, end-users will need to remove the existing saved session from the Privileged Access App in order to use the saved session with the updated settings.