Product administrators
The tasks that product administrators can perform depend on their administrative privileges.
These privileges control access to the administrative web modules and the Bravura Security Fabric API. Product administrators may or may not have an account on a target system.
Topics in this section show you how to add product administrators using the:
Web interface using the Manage the system > Security menu.
Command-line using the
adm_set
program
Product administrator types
Product administrators are categorized into the following subtypes:
Console-only user | These product administrators:
|
Superuser | These product administrators:
The user that you created during installation (named superuser by default) is a superuser. Superuser does not have administrative privileges to call an API. This privilege is assigned explicitly to the IDAPI caller product administrator. |
Console user with help desk/self-service access | These product administrators:
|
Report reader/creator | These product administrators:
|
IDAPI caller | A product administrator who has administrative privileges (IDAPI caller , OTP IDAPI caller , and Guacamole IDAPI caller) to connect to the Bravura Security Fabric API. This product administrator cannot have any other administrative privileges. Bravura Security Fabric includes these built-in users:
|
Anonymous user | Bravura Security Fabric includes the built-in _IDMSUITE_USER_ANONYMOUS user that is used to provide anonymous API access for any Ajax plugin endpoint defined in the hid_ajax_routing table. This user is disabled by default. When this caller is enabled, any Ajax plugin endpoint defined in the hid_ajax_routing table with Authenticated = false will automatically log in as _IDMSUITE_USER_ANONYMOUS and does not require a session to call. The CIDR for the anonymous user should be respected (via X-Forwarded-For if the TRUSTED_REVERSE_PROXY variable is enabled and not if disabled). |
Defining product administrators from the web interface
Individual product administrator privileges can be assigned by navigating to Manage the system > Security > Access to product features > Individual administrators.
Product administrators can be assigned privileges based on an administrator user group. These are accessed by navigating to Manage the system > Security > Access to product features > Administrator groups. By using administrator user groups, you assign privileges based on their user class membership.
You cannot grant any administrative privileges that you do not have.
Individual administrators
To define a product administrator :
Click Manage the system > Security > Access to product features > Individual administrators.
Click Add new… .
In the ID field, do one of the following:
Search for, or type the profile ID of an existing user.
This allows you to grant administrative privileges to a user who may also have access to self-service and help desk menus (depending on user access rules).
Type a new profile ID to create a new Bravura Security Fabric user who only performs administrative tasks (console-only access).
Users created this way are not mapped to accounts on target systems, and cannot access the self-service or help desk menus.
Optional: type the user’s full name in the Name field.
If the user is an existing user whose full name is stored in Bravura Security Fabric , you do not need to type a full name. The Name value is populated automatically after you submit the form.
Type the product administrator ’s password in the Password and Confirm password fields if you want the user to authenticate using a password stored in Bravura Security Fabric .
This is only required if the user is not an account-holder; that is, if you are creating a console-only user.
Enable the Password never expires checkbox if you do not want the product administrators password to expire.
This option applies only to product administrators whose passwords are stored in the Bravura Security Fabric database. It overrides the ADMIN PASSWORD EXPIRE setting, which you can set by clicking Manage the system > Policies > Options.
Assign Allowed privileges by choosing:
All privileges to give the user the same access rights as the superuser you created during setup.
Selected privileges if you want the user to retain any access to self-service or help desk menus.
Caution
If you grant all administrative privileges to an existing user, they lose access to the self-service modules and the Help users (IDA) module.
You cannot grant any administrative privileges that you do not have.
The IDAPI caller privilege cannot be combined with any other privileges.
If the IDAPI caller , OTP IDAPI caller , or Guacamole IDAPI caller privilege is selected, you must configure the Allowed network addresses for remote API access field. This is used to specify the IP addresses from which the product administrator is allowed to connect to the Bravura Security Fabric API.
If Bravura Security Fabric is behind a reverse proxy, you can get the original Client IP from HTTP header X-Forwarded-For by enabling the system variable TRUSTED REVERSE PROXY.
This field uses Classless Inter-Domain Routing (CIDR).
If the OTP IDAPI caller privilege is selected, you can configure the Number of hours between password randomizations field. By default, the OTP user’s password will randomize on every login.
Click Add at the bottom of the form.
Administrator groups
To define an Administrator group:
Click Manage the system > Security > Access to product features > Administrator groups.
Click Add new… .
Type an ID and Description for the new Administrator group.
Assign Allowed privileges by choosing:
All to give the group the same administrative privileges as the superuser you created during setup.
Selected privileges if you want users in the group to retain any access to self-service or help desk menus.
You cannot modify any privileges that you do not have.
Click Add at the bottom of the form.
Bravura Security Fabric displays the page.
Click the Membership criteria tab to select or create user classes that define group membership.
Define group membership criteria by:
Selecting existing user classes:
Click Select… .
If required, click Edit
for any user classes that need to be modified before you select them.
Enable the checkboxes for the user classes you want to select as membership criteria, then click Select.
Creating a new user class:
Click
Create a new user class.
See Adding user classes for details on how to create a new user class.
If you have selected multiple user classes, select whether the participants are required to match All of the user classes or Any of the user classes . The default setting is All of the user classes .
Once you have finished defining membership criteria, you can click the Test tab to test membership of individual product administrators or List members.
Membership of non-built-in user classes can be cached to improve performance. There are options to recalculate or invalidate the cache on the user class configuration page.
Note
In a replicated environment, cache recalculation can only be performed on the instance which runs psupdate
.
Example: Create a console-only product administrator
This example shows you how to create a product administrator who has limited access to product features. This will create a profile ID with a password that is verified against the Bravura Security Fabric database only; the user will not have an account on a target system. For a detailed procedure see Defining product administrators from the web interface .
Click below to view a demonstration.
To create a console-only product administrator:
Log in to the Bravura Security Fabric Front-end (PSF) as superuser .
Click Manage the system > Security > Access to product features > Individual administrators.
Click Add new...
Enter the following values:
ID: admin1
Name: admin1
Password / Confirm password: North*1
Select the Password never expires checkbox.
Select
All
Allowed privileges :Click Add at the bottom of the page to add the user.
This creates a user who can only perform administrative tasks (console-only access). Because the ID is not mapped to accounts on target systems, the user cannot access the self-service or help desk menus.
Test the administrative privileges
The Show effective privileges function allows you to view the product administrator privileges for any user.
To do this:
Click Manage the system > Security > Access to product features > Show effective privileges.
Type the ID of the User you just created,
admin1
.Click Test.
Bravura Security Fabric displays the results of the test.
You will notice that the privileges listed are the ones setup during the admin1 administrator creation.
Login as the product administrator
Log in to the Front-end (PSF) as admin1
to review the menu options the privileges provide.
You will notice this user has the same administrator menu options as superuser.
Example: Define a product administrator group
This example defines a product administrator group of auditors who have limited access to product features. It shows how to use the built-in REPORT_READERS administrator group, and include users who also have accounts on target systems. For a detailed procedure see Defining product administrators from the web interface .
Requirements
This example assumes that:
Bravura Security Fabric and Connector Pack are installed.
An Active Directory target system has been configured.
Click below to view a demonstration.
Define the product administrator group
To define a product administrator group:
Log in to the Bravura Security Fabric Front-end (PSF) as superuser .
Click Manage the system > Security > Access to product features > Administrator groups.
Select REPORT_READERS .
Leave the default settings. This group has the following allowed privileges:
Manage reports
Click the Membership criteria tab.
The membership of the REPORT_READERS administrator group is defined by the _REPORT_READERS_ user class.
Click the edit icon
next to _REPORT_READERS_.
In the user class configuration pop-up window, click the Criteria tab.
In the group memberships table, click Add new…
In the Target system field, enter
AD
.Search for and select the AUDIT-GENERAL group.
Click Add.
Click the Test tab and click List to see the users that are now members of the _REPORT_READERS_ user class.
Return to the General tab and next to the option for Membership cache valid click Recalculate.
Close the user class configuration window.
Click the General tab of the REPORT_READERS administrator group.
If the Membership cache valid value is "No", click Recalculate.
Click Update.
This puts members of the AUDIT-GENERAL group in the REPORT_READERS administrator group. These users can perform some administrative tasks, and can also access the self-service menus.
Test the administrative privileges
To test the administrative privileges:
Click Manage the system > Security > Access to product features > Show effective privileges.
In the User field, type the name of a user in the AUDIT-GENERAL group that was added to the _REPORT_READERS_ user class.
Click Test.
Bravura Security Fabric should list ’Manage reports’ as a privilege for this user.
Login as a REPORT_READERS administrator group member
Log in to the Front-end (PSF) as the named user. You should see that the user now has access to the Manage reports option in the Administrative options section.
Defining product administrators from the command prompt
As an alternative to using the web interface , you can define product administrators from the command prompt using the adm_set
program; for example:
adm_set.exe -user SmithJ -acl <ACL list>
You cannot grant any administrative privileges that you do not have.
Administrative privileges
The following table describes all available administrative privileges. It also includes the internal keyword – used in configuration files, plugin input/output, and by the adm_set
program – for each privilege.
Right | Keyword | Description |
---|---|---|
General system configuration | ||
Manage resources | resource | The product administrator can manage target systems, auto-discovered objects, and other resources. |
Manage policies | policy | The product administrator can manage user classes, segregation of duties (SoD), authentication and identification policies, authentication chains, question sets, import rules, login options. |
Manage notifications | mngnotifs | The product administrator can manage notifications and notification-related scheduled jobs. |
Configure workflow setup | workflow | The product administrator can configure workflow. |
Configure modules | module | The product administrator can modify web modules configuration. |
Maintain servers | maintain | The product administrator can manage services, schedule jobs, and configure auto discovery. |
Manage reports | runreport | The product administrator can run or schedule reports from the Manage reports app. |
Analytics | analytics | The product administrator can run, save or read reports from the Analytics app. |
Recompute Analytics cache | recanalyticscasch | The product administrator can update the cached data on dashboards from the Analytics app. |
Configure Login Manager | managesso | The product administrator can configure Login Manager. |
Manage external data store | extdb | The product administrator can Manage external data store. |
Dashboards | ||
View certification dashboard | viewcertdash | The product administrator can use the View dashboards to view the certification dashboard. |
View privileged access dashboard | viewpswdash | The product administrator can use the View dashboards to view the privileged access dashboard. |
View workflow dashboard | viewworkdash | The product administrator can use the View dashboards to view the workflow dashboard. |
View enrollment dashboard | viewpsadash | The product administrator can use the View dashboards to view the enrollment dashboard. |
View OrgChart dashboard | vieworgdash | The product administrator can use the View dashboards to view the OrgChart dashboard. |
View helpdesk dashboard | viewhelpdeskdash | The product administrator can use the View dashboards to view the help desk dashboard. |
Recompute dashboard cache | recdashcache | The product administrator can use the View dashboards to update the cached data on dashboards. |
Security administration | ||
Manage security | security | The product administrator can manage User access rules and Options in the Manage the system Security menu. |
Manage product administrator | console | The product administrator can create and manage other product administrators. A product administrator may only manage or create new product administrators with equal or lesser rights assigned to them. A product administrator cannot manage his or her own rights. |
Manage user groups | mngacl | The product administrator can manage user access controls in the Manage the system module. |
Privileged access management | ||
Create managed system policies | creategroup | The product administrator can create managed system policies in the Manage the system . As owner of the managed system policy, the product administrator has access to the policy but not the passwords managed by the policy - that permission must be specifically assigned via user group access controls. |
Manage orphan managed systems | mngorphanres | The product administrator can manage orphaned systems (not a member of a managed system policy) in the Manage the system . |
Create managed systems | createres | The product administrator can add a user-managed system in the Manage the system . |
Manage managed system policies | groupmgmt | The product administrator can be granted access to modify or remove existing managed system policies in the Manage the system . Access to managed system policies must also be granted in the Manage the system > Security > Privileged access to systems menu. The product administrator cannot update user groups of which they are a member. This right does not give the product administrator access to orphan managed systems, nor access groups of which they are an existing member. |
Recover last managed password | recoverpwd | The product administrator can recover the last stored managed password for a managed account, regardless of the state of the target (whether it is managed, unmanaged or remanaged) using the RecoverKeyByAccount function call and OTP caller and LogonEx to connect to the API service. |
Access certification | ||
Manage certification process | certify | The product administrator can manage the access certification process, by which one or more reviewers confirm or remove access privileges of users, and remove stale users. |
Initiate entitlement certification campaigns | singleusercertify | The product administrator can initiate a access certification process, by which a single reviewer can confirm or remove access privileges of users, and remove stale users. |
OrgChart management | ||
Start Org building rounds | createorg | The product administrator can use the Manage the OrgChart to initiate OrgChart building rounds. |
Manage the OrgChart | updateorg | The product administrator can use the Manage the OrgChart to manually change the OrgChart structure. |
Remote API | ||
IDAPI caller | apicaller | The product administrator can access the API Service ( This right can only be combined with other rights by adding an individual administrator with the IDAP caller right to an administrator group with other rights. |
OTP IDAPI caller | otpcaller | The product administrator can access the API Service LoginEx function from the IP addresses specified in the IP address with CIDR bitmask field. The LoginEx function gains access to the KMKeyGetByAccount function, which is used to retrieve passwords that Bravura Privilege manages. This right can only be combined with other rights by adding an individual administrator with the OTP IDAP caller right to an administrator group with other rights. |
Guacamole IDAPI caller | guacamolecaller | The product administrator can access the API Service Login function from the IP addresses specified in the IP address with CIDR bitmask field. The Login function gains access to the CheckoutParamsGet and CheckoutStatusGet functions, which is used for a Guacamole gateway to periodically check whether a managed account checkout is still valid during an active Guacamole access disclosure session. This right can only be combined with other rights by adding an individual administrator with the Guacamole IDAPI caller right to an administrator group with other rights. |
Replication | ||
Configure replication | replication | The product administrator can configure database replication (Manage the system > Maintenance > Database replication) |
View information | ||
View information:Target systems | viewhost | The product administrator can view additional information about target systems via embedded links. |
View information:Managed groups | viewmgrp | The product administrator can view additional information about managed groups via embedded links. |
View information:Roles | viewrole | The product administrator can view additional information about roles via embedded links. |
View information:Segregation of duties rules | viewsod | The product administrator can view additional information about segregation of duties rules via embedded links. |
View information:User classes | viewuc | The product administrator can view additional information about user classes via embedded links. |
View information:Accounts | viewacct | The product administrator can view additional information about accounts via embedded links. |
View information:Pre-defined requests | viewpdr | The product administrator can view additional information about pre-defined requests via embedded links. |
View information:Template accounts | viewtpl | The product administrator can view additional information about template accounts via embedded links. |
View information:User notifications | viewntf | The product administrator can view additional information about user notifications via embedded links. |
View information:Certification campaigns | viewcert | The product administrator can view additional information about certification campaigns via embedded links. |
Testing administrative privileges
The Show effective privileges function allows you to view the product administration privileges for any user. To do this:
Click Manage the system > Security > Access to product features > Show effective privileges.
Search for, or type the ID of the User you want to test.
Click Test.
Bravura Security Fabric displays the results of the test.
Enabling, disabling and unlocking product administrator profiles
You can enable, disable or unlock the profile of product administrators using the Manage the system (PSA) module. Users with console-only access can only have their profile status updated using the Manage the system (PSA) module.
To enable, disable or unlock a product administrator ’s profile:
Click Manage the system > Security > Access to product features > Individual administrators.
Select the product administrator.
Click Enable, Disable or Unlock.