Creating a regular account

  1. Click + icon in the main menu next to the Accounts tab, or

Select Management > Accounts and then click Add.

../../_images/5-1-add-account.png
  1. Define object’s name.
  1. Select Blocked option to disable account after it’s created.
../../_images/5-1-add-account-regular.png
  1. Select regular from the Type drop-down list.
  1. Select desired session recording option.

    • all - Fudo PAM saves session metadata (basic session information), records raw network traffic (RAW file) and stores session data in internal file format (FBS). The latter enables session playback using the built-in session player, as well as exporting sessions to a selection of video file formats.
    • raw - Fudo PAM saves session metadata (basic session information) and records raw network traffic (RAW file). The raw data can be downloaded but it cannot be played back in graphical form using the built-in session player (session player only depicts the networks packet exchange between the client and the target host).
    • noraw - Fudo PAM records the session data in a non-raw format that could be played back using the built-in session player.
    • none - Fudo PAM saves only session metadata (basic session information).
  2. In the Notes field, enter a message to Access Gateway users. If permissions are granted, notes can be also edited.

Note

Account notes can be displayed in the User Portal (Access Gateway).

../../_images/user-portal-note.png
  1. In the Category field select privileged or non-privileged account category. The category serves an informational purpose.

  2. In the Data retention section, define automatic data removal settings.

    • Select Override global retention settings option to set different retention values for connections established using this account.
    • Check the Delete session data option to exclude sessions from retention mechanism.
    • Next to the Delete session data field, define the number of days after which the session data will moved to external storage device. Default value when the option is checked, is 30 days.
  3. In the Permissions section, add users allowed to manage this object.

  4. In the Server section, assign account to a specific server by selecting it from the Server drop-down list.

Configuring an account with access to the RDP server, an additional option will show up. In the Inform about existing connection field select to set server settings / disable or enable this option.

../../_images/5-1-account-rdp-inform.png

Note

More about this feature under this link: Account activity in the User Portal (Access Gateway).

  1. In the Credentials section, enter privileged account domain.

  2. Type in login to the privileged account.

  3. From the Replace secret with drop down list, select desired option.

    secret from a different account

    • From the Account drop-down list, select account object, whose credentials will be used to authenticate user when establishing connection with monitored server.

    key

    • Click the i icon and select the key type.
    • Click the i icon and browse the file system to find the file with a non-passphrase protected private key.

    password from external repository

    • Select external repository.

    password

    • Provide account password.
    • Repeat account password.

    Note

    Two-fold authentication

    With two-fold authentication enabled, user is being prompted twice for login credentials. Once for authenticating against Fudo PAM and once again for accessing target system.

    To enable two-fold authentication, select password from the Replace secret with drop-down list and leave the password and login fields empty.

  4. In the Password checkout time limit field, define the time after which the password is returned automatically.

Note

Defining the password checkout time limit automatically enables the Secret Checkout feature for the particular Safe.

  1. For SSH connections, select the SSH Agent forwarding option to authenticate the user against the target host using client’s SSH key. Use -A option for connecting to SSH server.

If password option was chosen as an authentication method, provide additional configuration:

  • Select Password change policy from the list of the configured password change policies.
  • Select Change password after last checkin option to change the password automatically after it has been returned by the last user.

Note

This options is available only for Secret Checkout feature and it’s enabled after specifying the Password checkout time limit.

  • Select Change password after session option to change the account password remotely after the session is ended.

Note

This option requires to choose at least one Password changer and a Password change policy any other than Static, without restrictions.

Refer to the Password changers topic for detailed information on setting up password changers.

  • Check the Password recovery option to set a password verifier, to automatically trigger a password changer if it verifies that the password for an Account was changed and a new password is not stored in Fudo PAM.

Note

Having the Password recovery option enabled, the Password Verifier spawns “Trigger password changer” action in the account. When it’s disabled, the Password Verifier only sends event “Unable to verify password for account <account_name>”.


  • Click Add password changer, to have the password to the account changed automatically according to the password policy.
  • In the Password changers section, from the Password changer drop-down list select password changer specific for given account.
  • In the Timeout field, define the script’s execution time limit.
  • In the Variables section, assign attributes to variables.
../../_images/5-1-unix-pc.png

Fudo PAM allows changing a password on a different node than the one that set as an Active cluster node for Password changers.

../../_images/5-1-pc-active-node.png

In order to have this configured, the following condition should be met:


Setting up a Password Changer / Password Verifier for an account, a value for transport_bind_ip variable should indicate the same cluster node for all password changers as well as password verifiers.

../../_images/5-1-accounts-pc-config.png

If the transport_bind_ip variable values indicate different cluster nodes, the configured password changer/verifier will be running on a node that set as an Active cluster node for Password changers.


Related topics: