chapter 8 Flashcards
Accessing and
Using Accounts
Users who have (blank) and (blank) Accounts permissions are able to click on Show and Copy
- Users who have (blank) and (blank) Accounts permissions are able to click on Connect
- CyberArk PAM provides
advanced workflows on top of these permissions to determine how users can access accounts and for how long
list
retrieve
list
use
the allow EPV transparent connections ‘click to connect’ option which is under privileged access workflows which is a part of the master policy, does what?
provided corporate level control over user’ ability to view passwords or launce privileged sessions
Allow Transparent
Connections:
Advanced Settings
By clicking the Edit settings button, we can see that the following options are the default
1
2
connect transparently using privileged accounts and view passwords
by default, the require users to specify reason for access is (blank)
inactive
the setting: require users to specify reason for access option can have pre-defined responses which are set at the (blank) level
In the Privileged Account Request
section for a given Platform, we can
add the Predefined Reasons to
create a list of choices for our users
when accessing a password in the
(blank)
platform
pvwa
the option: require dual control password access approval - requires end users to get authorization before
accessing privileged accounts.
Depending on the configuration, authorization must be
given by one or more managers or peers
blank
Dual Control – Safe Membership
Dual Control is controlled
through Safe membership
- (blank) are the people who want to use the privileged accounts. They need the permissions Use (and/or Retrieve) and List
- Approvers accept or reject requests to privileged accounts but generally do not use the accounts. They will need (blank) and (blank)
permissions
requestors
list
authorize
when a requestor requires a connection to a system that has dual control enabled, he will need to submit a request and provide the reason for the request, and the time frame he needs access. He will see which users or groups need to provide the access
how is the approver notified?
Bypass
Dual Control
We may want to allow certain groups to bypass Dual Control
- Here our admin teams have the “Access Safe without confirmation” permission and are therefore allowed to bypass dual control
- The support team still needs to get approval
blank
If we setup more than one group with approver permissions, at least one person (blank)
must approve the request before the requester can use the
password
from each group
Dual Control:
Advanced Settings
In the advanced settings for Dual Control, we can enable a multi-level approval process
- With a multi-level process, a request must first be approved by one group before it is forwarded for approval to another group
- Also in advanced settings, we can enable direct manager approval, determined by the
Manager attribute on the
requester’s AD user object
Selecting “(blank)” in number of confirmers
could lead to requests being unnecessarily
delayed if certain users are out of office or
otherwise unavailable.
all
what does the enforce check in/check out exclusive access do?
When applied, only one user will be able to
access and use an account at any given
time.
When a user checks-out an account, it is
LOCKED and cannot be retrieved by other
users until it is checked-in
REMEMBER: By default, the password can only be
released by the owner of the lock or by an administrator who has the rights to force a
password release
If another user attempts to access the password, the status will appear with a lock button, indicating that it is locked by the
first user
After accessing the account (using Show or
Connect), the user will have the “(blank)” option
to unlock the account and make it available to
other users.
check in
what happens when a user checks in the account?
the password will be scheduled for an immediate change by the cpm
Exclusive Password – Auto Release
Beginning with CyberArk PAM version 11.7, the (blank) can automatically release an account after
the user closes the session
psm
this is configured at the platform level
One-time passwords are
enabled in the (blank)
- It is possible for multiple users to access the same account
simultaneously - The password will be changed based on MinValidityPeriod,
as configured in the Platform
master policy
- A (blank) of 60 means that the password will be changed 60 minutes after it is accessed
- During that time, other users can access the password
- The (blank) should provide enough time for a user to make use of the password
MinValidityPeriod
MinValidityPeriod
If Exclusive access and One-Time Password are
enabled for the same Platform, the password will be marked for change (blank) minutes (by default) after it is
used.
This keeps the password exclusive, but enables
automatic release.
60
When using check-in/check-out exclusive access or one-time password access with Dual Control,
the password will only be changed after the time frame has expired
blank
(blank) - When a user accesses a password, the account is locked and no other user can access the password until it has been released.
- Password is changed
automatically upon manual release - In later versions, the password can be auto-released by the PSM
exclusive passwords
(blank)
After a user accesses a
password, it is changed
automatically based on the minimum validity period
* Multiple users can access the password simultaneously
* Minimum validity period is reset as each user accesses the password
one-time passwords
(blank)
Account is locked to a single user, no other user can access it
* If the user does not release the account manually, the system
will release it automatically
based on the Minimum validity period and change the password
Exclusive and One-time
Passwords Combined