Session monitor options plugin
You can use a plugin to activate session monitoring based on the requester, privileged account, or system, and override policy settings. The input into the plugin can include the:
Requester’s profile ID
Requester’s group memberships
Requester’s profile attributes
Requested account
Managed system
Managed system’s attributes
If enabled, the plugin is called when a user checks out privileged access or a product administrator accesses a password directly. This applies only to disclosure methods that support session monitoring. The output of the plugin contains session monitoring settings that override managed system policy settings.
You enable this plugin by typing the name of the program or script in the SMON OPTIONS PLUGIN field on the Manage the system > Modules > Session monitor page.
Some data is not input by default. You must manually enable specific registry settings to allow the plugin to receive this information.
Warning
Ensure that you are comfortable and knowledgeable in the mechanics of the registry before you attempt to change any configuration settings. Contact support@bravurasecurity.com if in doubt.
There is a sample plugin script, plugin-smon-options.psl
, located in the samples\ directory. You can copy the script to the \<instance>\plugin\ directory and modify it to suit your environment.
To enable additional SMON OPTIONS PLUGIN input, set these entries in the following key:
HKLM\SOFTWARE\Bravura Security\Bravura Security Fabric\<instance>\idarch
Groups
Entry name plugin_smon_options_groups
Value 0—1
Data type DWORD
Default 0
Profile attributes
Entry name plugin_smon_options_profile_attrs
Value 0—1
Data type DWORD
Default 0
Discovered system attributes
Entry name plugin_smon_options_found_comp_attrs
Value 0—1
Data type DWORD
Default 0
Discovered system multi-value attributes
Entry name plugin_smon_options_found_comp_mv_attrs
Value 0—1
Data type DWORD
Default 0
Requirements
See Writing plugins for general requirements.
Execution points
When configured, the plugin is called for each applicable access disclosure plugin when a user checks out privileged access or a product administrator accesses a password directly.
Input
The plugin will receive the following input:
# KVGROUP-V1.0 "" "" = { "ead_computer_attributes" "" = { "mv_attributes" "" = { "<attribute key>" = "<attribute value>" # 0 or more } # if plugin_smon_options_found_comp_mv_attrs is set "sv_attributes" "" = { "<attribute key>" = "<attribute value>" # 0 or more } # if plugin_smon_options_found_comp_attrs registry entry is set # See Subsection 31.5.1. } "groups" "" = { "<targetid>" = "<groupid>" } # if plugin_smon_options_groups registry entry is set "managedaccount" "" = { "accountid" = "<Managed Account>" "msp" = "<Managed System Policy>" "resourceid" = "<Managed System>" } "plugin" "" = { "accessdisclosure" = "<ActiveX control name>" } "request" "" = { "requestID" = "<Request ID>" # if applicable } "smonvars" "" = { "<smon variable name>" = "<value>" # 1 or more } "viewer" "user" = { "id" = "<Profile ID>" "attribute" "<Profile attribute key>" = { "value" "" = { "value" = "<Profile value>" # 0 or more } } # if plugin_smon_options_profile_attrs registry entry is set } }
Output
The plugin returns:
"" "" = { "retval" = "<#>" # 0 on success; Otherwise, failure "<smon variable name>" = "<value>" # Optional; 0 or more }