Configuration
This section contains parameters for configuring PAM.
System Settings
In this section global system settings are specified. Fine-tuning is performed in the Policies section.
Scheduled jobs
| Option | Description |
|---|---|
| Account checking start time | At this time Axidian Privilege will start checking all active accounts in the Managed state. |
| Resources and accounts syncing start time | At this time Axidian Privilege will start resource information syncing and accounts syncing for resources and domains. |
| Account password reset start time | At this time Axidian Privilege will generate new passwords for accounts. |
| Service connection checking start time | At this time Axidian Privilege will start checking service connection to resources and domains. |
| Session log rotation start time | At this time Axidian Privilege will start session log rotation. |
| Synchronization interval for user groups from the directory | The PAM system updates the list of members of user groups from the directory at a specified interval. |
Video
| Option | Description |
|---|---|
| Video recording codec options | The libx264 codec is used by default with the following settings: libx264 -preset medium -tune zerolatency. |
| Video streaming codec options | The libx264 codec is used by default with the following settings: libx264 -g 10 -tune zerolatency. |
| The duration of the recorded video segment, sec. | You can set the duration at which the video will be saved as an independent segment, the default is 3600 seconds (1 hour). |
Sessions
| Option | Description |
|---|---|
| Gateway connection timeout, sec. | Time after which connection will be closed if gateway isn't responding. Set the value to 0 if you do not want the connection to be interrupted. |
| Time to connect, min. | Close session on the Gateway if a user did not connect to the resource. |
| Legal notice | That text will be shown to user before session. Leave it empty if you don't need it. |
| Maximum amount of sessions per user | Limiting the number of concurrent open sessions per user, 0 is the default with no limit. |
| Notify user about session termination | The user will be notified before the session ends. |
| Notifications threshold | Notification will be shown for the specified time before the session expires. |
| Notification interval | Interval between notifications about expiring session. |
Gateway connections
| Option | Description |
|---|---|
| RDCB address | IP address or DNS name of Remote Desktop Connection Broker |
| RDCB collection name | Remote Desktop Connection Broker collection name for Axidian Privilege Gateway |
| Use RDGW | Check it for connecting to Axidian Privilege Gateway with Remote Desktop Gateway |
| RDGW address | Remote Desktop Gateway address for Axidian Privilege Gateway |
| Gateway RDP file parameters | These parameters will be added to RDP connection settings for Axidian Privilege Gateway. They will replace old ones |
RDP Proxy
In the RDP Proxy Address field, enter the IP address or DNS name of the server with the RDP Proxy. Specify the port or PAM will use the default port.
Web Proxy
In the Web Proxy Address field, enter the IP address or DNS name of the server with the Web Proxy. Specify the port or PAM will use the default port.
PostgreSQL Proxy
In the PostgreSQL Proxy Address field, enter the IP address or DNS name of the server with the PostgreSQL Proxy. Specify the port or PAM will use the default port.
MSSQL Proxy
In the MSSQL Proxy Address field, enter the IP address or DNS name of the server with the MSSQL Proxy. Specify the port or PAM will use the default port.
SSH connection settings
| Option | Description |
|---|---|
| SSH Proxy address | IP or DNS, port (required) Default port: 2222 |
| Authentication of resources using SSH server keys | Selected SSH server key fingerprint adding type. For more information, see the Types of Adding Fingerprints section. |
Web terminal
Activate the Web Terminal using the Enable Web Terminal option.
The Web Terminal allows you to open SSH and RDP sessions in a browser without installing third-party clients. You can open a session via the user's console.
Syslog
The Syslog server is used for integration with a SIEM system and serves as a unified data storage for PAM event records and/or text session logs. Data is updated in real time: during an active remote connection, not after its completion.
To send text logs of sessions, fill in the Syslog server data.
Sending Event log records to the Syslog server is configured via configuration files.
| Option | Description |
|---|---|
| Syslog server | IP address or DNS name of Syslog server |
| Port | Syslog server port |
| Protocol | Network protocol for connection to Syslog server: TCP, UDP |
| Format | Event format used by syslog server: CEF, LEEF |
| IETF standart of Syslog protocol: RFC3164, RFC5424 |
User Authentication
This section specifies the global authentication settings. Fine-tuning authentication is configured in the Policies section.
User Blocking
If the user enters the wrong password or OTP several times in a row, their account will be blocked for the specified time.
| Option | Description |
|---|---|
| Number of Attempts | If this value is exceeded, the user will be temporarily blocked. If the value is 0, the blocking does not apply. |
| Blocking Time | Defines the period of time after which the user will be unlocked and will be able to enter the password or OTP again. |
Automatic logout on inactivity
The Inactivity period in MC/UC interface parameter sets the time after which the user and administrator consoles are automatically logged out. The setting does not affect user access to resources.
Automatic exit occurs if the user:
- authenticated in the user and/or administrator console via IDP;
- did not perform any actions in any browser tab during the specified period of inactivity.
Set the period of inactivity from 0 to 480 minutes, where 0 — means automatic logout is disabled.
Background browser operations, such as updating data or checking system status, are not considered user actions.
SSH Key Authentication
If the Allow users to connect to SSH Proxy using SSH keys option is enabled, users can connect to SSH Proxy without passwords using SSH keys added to Axidian PAM. The requirement to enter OTP remains. If this option is disabled, users can only authenticate using a password.
Session opening without re-authentication
This setting allows you to disable re-authentication when running RDP, SSH, and SQL sessions. A code is added to the connection string or RDP file, which is used to authenticate the user without requesting a password or a second authentication factor. The code is valid only once and for a limited time.
For Web Proxy, this setting does not apply: a code is always used.
How to set the number of authentication codes?
The number of codes is set in the component configuration file Axidian Privilege IdP:
- Windows OS: C:\inetpub\wwwroot\idp\appsettings.json
- Linux OS: /etc/axidian/axidian-privilege/idp/appsettings.json
Set the value from 1 to 100 for the MaxAuthCodesPerUser parameter:
"DirectoryMechanism": "Ldap",
"Authentication": "Local",
"UseDeveloperSigningCredential": false,
"MaxAuthCodesPerUser": 100,
"QaToolClientSecret": "secret"
| Option | Description |
|---|---|
| Allow session opening without re-authentication | If this option is enabled, a one-time authentication code is added to the connection string or RDP file. |
| Authentication code lifetime | Determines the validity period of the authentication code. If you start a session with an expired code, the user will need to enter a password and a second authentication factor. Default value: 60 seconds. Minimum value: 5 seconds. Maximum value: 300 seconds. |
Password Requirements for Internal Users
| Option | Description |
|---|---|
| Password Validity Period | Minimum value: 0—no restrictions. Default value: 45 days. Maximum value: 999 days. |
| Minimum password length | Minimum value: 4 characters. Default value: 8 characters. Maximum value: 255 characters. |
| Lowercase letters | If the option is enabled, the password must contain at least one lowercase Latin letter. |
| Uppercase letters | If the option is enabled, the password must contain at least one Latin capital letter. |
| Digits | If the option is enabled, the password must contain at least one digit 0–9. |
| Special characters | If the option is enabled, the password must contain at least one special character from the list: ~!@#$%^&*()_-+={}|[] \:;"'<>,.?/ |
User Connection
Manage User Connections privileges are required to work with user connections (UserConnectionType.Create, UserConnectionType.Read, UserConnectionType.Update, UserConnectionType.Delete).
Axidian Privilege has the following built-in user connection types:
- RDP
- SSH
- Telnet
- PostgreSQL
- MSSQL
- Web
Built-in types cannot be changed or deleted.
It is also possible to add custom user connection types.
Adding Custom User Connection Types
Add your custom type of user connection and open sessions in the browser without using third-party applications.
- Web application
- Windows application
- Go to the Configuration → User Connection section.
- Click Add.
- Enter a name of the user connection.
- Set the login format or leave the default value.
- Select the Web Application type and click Next.
- Select Session opening method:
- In browser — the session will open in a new browser tab.
Access is provided via Web Access Server. - Via RDP — the session will open via a downloaded RDP file.
Select a browser and enable the Run browser in kiosk mode option. Access is provided via RDS Access Server by publishing the selected browser.
- In browser — the session will open in a new browser tab.
- Click Next.
- Configure the Auto-fill user credentials (SSO) option.
This option allows automatic filling of the login and password on the target resource using privileged account data. After enabling the option, download the SSO template in JSON format for connecting via the browser, and in XML format for the RDP file. - Click Create.
To add a new connection type, you need to research the client application and develop a template for Axidian Privilege ESSO Agent. The new connection type is unique for each application, for development please contact Technical Support.
- Go to the Configuration → User Connection section.
- Click Add.
- Enter a name of the user connection.
- Set the login format or leave the default value.
- Select the Windows Application type and click Next.
- In the Path to executable file field, specify the path to the Windows application.
- In the Command line arguments field, enter the required arguments and click Next.
- Configure the Auto-fill user credentials (SSO) option.
This option allows automatic filling of the login and password on the target resource using privileged account data. After enabling the option, download the SSO template in XML format. - Click Create.
Auto-fill user credentials (SSO)
SSO (Single Sign-On) is a method that allows users to authenticate to multiple web resources with a single set of credentials. To fill in the credentials automatically, create an SSO template file with the login form data.
To connect to a user using the browser session opening method, download the SSO template in JSON format, and to connect via RDP, download it in XML format. To configure the SSO template in XML format, contact technical support.
An example of an SSO template is located in the PAM distribution package \axidian-pam-tools\sso-templates folder.
The credentials for authentication on the web resource must match the data of the privileged account.
{
"username-field": "input[id='login']",
"password-field": "input[id='password']",
"submit": "button[type='submit']",
"cannot-submit": "div[class='v-messages__message']"
}
To automatically authenticate to a web resource, change the values of the CSS selectors.:
username-field— account login, for example:"input[data-marker='login-form/login/input']"password-field— account password, for example:"input[type='password']"submit— login button, for example:"button[data-marker='login-form/login-button']"cannot-submit— authentication error, for example:"div[data-marker='login-form/error']"
Launch the web resource in a browser and navigate to the authentication page. Open DevTools and switch to the Elements panel. Find the desired CSS selector and insert the value into the SSO template.
Service Connection
Manage Service Connection Types privileges are required to work with service connections (ServiceConnectionType.Create, ServiceConnectionType.Read, ServiceConnectionType.Update, ServiceConnectionType.Delete).
Axidian Privilege has the following built-in service connection types:
- Windows
- SSH
- Microsoft SQL Server
- MySQL
- PostgreSQL
- Oracle Database
- Cisco IOS
- Inspur BMC
Built-in types cannot be changed or deleted.
It is also possible to add custom service connection types.
Adding Custom Service Connection Types
If your PAM installation's management server is installed on a Windows host, you can only add connectors with a powershell template.
If your PAM installation's management server is installed on a Linux host, you can only add connectors with a bash template.
- Open the Configuration → Service Connection section.
- Click Add Service Connection Type.
- In the window that opens, upload the ZIP archive with the connector file.
- Specify the Name of the service connection or use the value loaded from the metadata.
- Enter the Description of the service connection. Optional.
- Finish operation by clicking Add.
Connectors preparation
To prepare a ZIP archive with the connector file, use the Connector Creation Tool.
Editing Custom Service Connection Types
- Upload new connector
- Edit name or description
- Open the Configuration → Service Connection section.
- Click Edit next to the desired service connection type.
- Click Download archive and select a folder on your computer to save the current ZIP archive with the connector file. This archive will be needed to restore the previous state of the service connection if an error occurs when loading a new archive.
- Upload a new ZIP archive with connector file.
- If necessary, edit Name and/or Description.
- Finish editing by clicking Save.
- Open the Configuration → Service Connection section.
- Click Edit next to the desired service connection type.
- Edit Name and/or Description.
- Finish editing by clicking Save.
Connector Script Code Viewing
- Open the Configuration → Service Connection section.
- Click Show script code next to the desired service connection type.
Custom Connection Types Deleting
- Open the Configuration → Service Connection section.
- Click Delete next to the desired service connection type.
A service connection type cannot be deleted if a resource with that type exists.
Uploading the SSH Connector Template
The service operations template is unique for each *nix distribution. The PAM distribution includes templates for the *nix distributions listed below. Path to the templates in the PAM distribution: AxidianPAM_3.3\axidian-pam-tools\ssh-templates\.
SSH connector templates included in Axidian Privilege distribution
- CentOS
- Debian
- FreeBSD
- Gentoo
- Oracle
- RHEL
- Rocky
- SLES
- Ubuntu
To add a template to Axidian Privilege:
- Open the Configuration → Service Connection section.
- Inside the SSH block, click Add.
- Select the file with the SSH connector template you need from the distribution by path AxidianPAM_3.3\axidian-pam-tools\ssh-templates\.
If you need help with development of the new template, please contact Technical Support.
Network Location
The section contains information about adding network locations to limit the use of resources issued by addresses.
To add a network location:
- Click Add.
- Enter a Name.
- Add the Network addresses of the resources to which you want to issue a limited connection.
Tags
This section displays all the tags that have been created. By default, tags are sorted alphabetically in direct order. To sort them in reverse order, click on the table header, the Tags column.
To create a tag:
- Click Create.
- Enter tag Name. It can contain from 2 to 50 characters and can consist only of Latin and Cyrillic letters, numbers and special characters. The tag name must be unique regardless of case. For example, if you already have an "important" tag, you won't be able to create an "IMPORTANT" tag.
- Select a color.
- Leave the Display tag in user console (UC) option enabled. If you disable this option, only PAM administrators will be able to use the tag in management console.
- Finish adding by clicking Save.
To find the tag:
- Specify the tag name in the search bar in whole or in part.
In PAM installations with PostgreSQL database, the search is case-sensitive. For example, if you have an "important" tag, it won't appear when you type "IMPORTANT". In PAM installations with Microsoft SQL database, the search is case-insensitive, that is, the tag will be displayed when you enter its name with both uppercase and lowercase letters. - Press ENTER or magnifying-glass-search-icon.
To edit the tag:
- Select the tag from the list.
- Click Edit.
- Make the changes. It is possible to change the tag name, color and visibility of the tag in the user console.
- Finish editing by clicking Save.
To remove one or more tags:
- Select one or more tags from the list.
- Click Remove.
- In the pop-up window, click Remove.
When tag is removed from PAM, the tag will be removed from all the resources to which it was applied.
Monitoring
Axidian Privilege automatically detects unused permissions. Administrator can revoke such permissions to minimize redundant privileges.
Parameter Consider permission unused if it has not been used for more than sets the number of days of inactivity on the permission, beyond which the permission is considered unused.
The following actions are considered to be the use of the permission:
- successful start of the session;
- viewing or changing credentials;
- checking the permission to use pamsu.
Licenses
This section displays data on registered, available, and used licenses. For more information about licenses, see the section Licensing.
Getting
- Open the Configuration → Licenses section.
- Copy the value from the Installation ID field.
- Send this value to technical support and ask them to generate a license file.
- Wait for a response from technical support with a license file in the PAM_yyyy.mm.dd.lic format.
Adding
- Open the Configuration → Licenses section.
- Click Add and select a license file.
Removing
- Open the Configuration → Licenses section.
- Select one or more licenses and click Remove.