Website access disclosure plugins
Secure browser plugin: securebrowser
The securebrowser access disclosure plugin provides users with brokered access to a website without the need to enter the administrative credentials for the managed account and is compatible with session recording.
This requires installation of the Secure Browser app.
The securebrowser plugin is primarily used in conjunction with team management .
You can modify the following default attributes to control the behavior of securebrowser :
configuration_fileThe configuration file in JSON format.webappjson_createIf enabled, the user checking out the managed account can upload their own website applications. This is disabled by default.webappjson_searchBy default, the user checking out the managed account has the ability to search and select a desired website application.
Collecting logs when the secure browser disclosure has issues
The secure browser extension uses a different technology to the native plugins and doesn't provide logging data to the logutil tool that is normally used for troubleshooting.
You can instead compare server logs for a successful attempt with those for a failed attempt, and try to identify the difference.
Determine a way to get all user HTTP calls to the same server for testing.
Increase logging to only the smonotu binary to Verbose (in the util\ directory on the server being contacted):
psdebug -prog smonotu -level 99
Rotate the log:
..\service\idmlogsvc -trace-restart
Perform a successful disclosure for a user whose access works.
Check
idmsuite.logto ensure thatsmonotulogs at Verbose level (search for a line that contains both "smonotu.exe" and "Verbose"If you find it, rename that log to
idmsuite-success.log.If not, verify the
psdebugcommand was run in an administrative command prompt.
Rotate the log again.
Perform an unsuccessful disclosure for a user whose access doesn't work.
If you can't get the issue to reproduce, it may be that the load balancer causes it, by not providing sticky sessions and sending disclosure HTTP requests to different servers.
If the issue is reproduced, verify there are
smonotulog entries, and if so, rename the log toidmsuite-failed.log.Remove the verbose logging:
psdebug -prog smonotu -remove
Zip up the two log files and send the resulting archive to Bravura Security Support.
Web app privileged sign-on: pswxwebapp
The pswxwebapp access disclosure plugin provides users brokered access to a website without the need to enter the administrative credentials for the managed account.
This is compatible with desktop Chrome browsers and requires installation of the Bravura Security browser extension.
The pswxwebapp plugin is primarily used in conjunction with Team Management.
You can modify the following default attributes to control the behavior of pswxwebapp :
configuration_fileThe configuration file in JSON format.webappjson_createIf enabled, the user checking out the managed account can upload their own website applications. This is disabled by default.webappjson_searchBy default, the user checking out the managed account has the ability to search and select a desired website application.
Note
The logutil utility cannot capture pswxwebapp plugin activity.