chapter 19 Flashcards

PAM administration

1
Q

User authentication issues

user receives an authentication failure

he changed his network password recently and tried to login to the PVWA with his old password.

now he is trying with his new password and it does not work.

he contacts his vault admin

identifying the error in the ITAlog

the vault admin can see in the ITAlog on the vault that the user failed to log in 5 times and then was suspended.

to unsuspend the user

open users and groups on server “prod”

select the user, select trusted net areas and select activate

the vault can be configured to ususpend user automatically after a predefined time period, using the UserLockoutPeriodInMinutes parameter in the (blank) ini file.

A

dbparm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

component connectivity issues

identifying a suspended component

in the PVWA System Health, you can see the CPM user is disconnected

component authentication error

occasionally, the passwords for a component user can get out of sync, the password stored in the vault no longer matches the password stored in the credential file.

there is a tool available in the cyberark support vault that can be used to unsuspend component users. solution 3443

here is how to do it manually for the default CPM component user PasswordManager

Stop the CPM Services

Reset the password in the vault

unsuspend the component user
- in trusted net area, click activate to unsuspend the user

generate a new credential file

in the vault folder under password manager, run the CreateCredFile command
eg: createcredfile.exe user.ini password /username passwordmanager /password cyberark1 /ipaddress /hostname /entropyfile

restart the CPM services

[none]

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

resynch PTA credentials

in the event the PTA connectivity is not working, we may need to resynch the credentials for the PTA Vault users, as well as the credentials stored in the PTA_PAS_Gateway account (used for REST calls between the PVWA and PTA)

This can be done easily by running the VaultPermissionsValidation.sh script located in the utility folder on the PTA server.

You can navigate to the utility folder by entering the following alias: UTILITYDIR

[none]

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what can interfere with the CPM?

Local Computer Policy

The platform and master policy settings must not conflict with the password policy on the target device

Target Windows Accounts

Understanding the problem
- verify/change/reconcile
- API and net use command
- alternative plugins: WMI plugin / powershell plugin

Suggested troubleshooting

  • check windows event viewer
  • check for unusual local security settings
  • run net use manually from the CPM server to verify the connection

Target UNIX account

understand the problem
- which operations are affected, verify/change/reconcile/all

Suggested troubleshooting

  • running plink manually
  • disable DEP / add exceptions for DEP on the CPM server
  • prompts and process files - add a basic prompt

[none]

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Common issues related to PSM

PSM-RDP connection troubleshooting

understanding the problem
- at what stage does the problem occur? PVWA / PSM / target
- one account? multiple accounts? same type?
- is the PSM hardened?
- is the PSM in a domain?
Which connection type is being used? RDP file / remote app
- if there are multiple PSM servers, are they distributed or load balanced?

suggested troubleshooting

  • check the PSM service - is it off/hanging?
  • logs and events on PSM server (system and application)
  • disable NLA on PSM and target
  • initiate a manual connection with PSMConnect and run MSTSC to the target
  • check safe permissions (compare with other safes)
  • disable recording and auditing
  • check PSM protocol version
  • increase time-out values

[none]

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Disable NLA

(blank) NLA requires the connecting user to authenticate themselves before a session is established with the server

you can disable NAL in order to determine if that is causing the problem.

on the PSM machine or target machine: go to control panel > system and security > system > remote settings

A

network level authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Increase Timeouts

Timeout parameters determine how long the (blank) will wait for certain components to work before considering them as failed and ending the session

Overloaded environments may suffer from longer times for certain component to begin working, so it is recommended to double their timeout vaults

A

PSM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

PSM-[Component]

understanding the problem

-PSM users (PSMConnect/Shadow users)
-is it supported?
- is mapping drives enabled?

suggested troubleshooting
- same recommendations as for PSM-RDP
- run component manually using shadow user
-delete shadow users (from PSM computer management)
-adjust AppLocker (or remove it manually in windows for isolation)

[none]

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PSM Shadow users

Shadow users are created by the PSM upon first connection. Shadow users are used to run connection component and store user preferences.

You can isolate problems related to shadow users by:

running the component manually as the shadow user (after password reset)

deleting the user (this will allow the PSM to create the user again)

[none]

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

adjust AppLocker

The PSM uses the windows AppLocker feature which defines a set of rules that allow or deny applications from running on the PSM machine.

When adding a new component, you must also adjust AppLocker by adding an exception to PSMConfigureApplocker.xml
- uncomment the line related to the new component

Running the PSMConfigureApplocker.ps1 script

[none]

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Disable AppLocker

You can also disable AppLocker entirely (for isolating problem only) using the MMC snap ins

on the start screen, type secpol.msc or gpedit.msc

go to computer configuration > windows settings > security settings > application control policies > AppLocker

click on configure rule enforcement and set executables rules to audit only

turn enforce rules back on after testing

[none]

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly