SecureAnyBox5 User Guide

Back to the contents

Contents

First steps and user settings

First login

To log into SecureAnyBox5, your account must be created and a password set. If there are multiple domains, you must also enter the domain name.

Login page

Only one domain is specified. You only need to enter your username and password to sign in to SecureAnyBox5.

More than one domain is specified. You must also enter a domain name to log into SecureAnyBox5.

After entering your login details, you’ll be prompted to set an Access Code. This code is used to decrypt secure information (like passwords and certificates) and to confirm changes.
As you type, you can see how strong your Access Code is and how many required characters you have used.

Entering the Access Code

Actual/required length of the Access Code

Actual/required number of lowercase letters

Actual/required number of uppercase letters

Actual/required number of numbers

Pointer how secure the Access Code is

Button for displaying the Access Code

Time to crack the Access Code online

Actual/required entropy of the Access Code (the higher, the better)

Requirements to characters of the Access Code can be changed in the Configuration for users in all domains or in the domain details for users in that domain.

Once you set the Access Code, you will be redirected to the main Safe Boxes page.

User interface – controls

SecureAnyBox5 user interface

Full name of the logged user and a domain into which the user logged
After clicking on the menu icon (next to the name of the user), a context menu displays. In the context menu, it is possible to change user’s settings, activate the White Envelope or log out from the application.

Notification area
If any error or warning occurs or some action needs to perform, the notification displays in the area. For more information, please click the notification icon.

Main menu
The main menu of the application. Displayed menu items are dependent on the user’s role and other settings.

Information about license
Information about license displays only to users with the "Administrator" role.

Breadcrumb navigation
The breadcrumb navigation shows a path to the currently opened page. By clicking on the breadcrumb navigation element, it is possible to move to the parent level.

Page menu
The list of possible actions on the page.

Filter area
Enables filtration of items displayed on the page.

Change Access Code

If you know your Access Code and want to change it (for security or if you shared it), click the menu icon (next to your username) in the top right corner (1). In the menu, select Change Access Code (2).

Context Menu

After clicking the button, a form appears. Enter your current Access Code in the first field, and your new Access Code in the next two fields. As you type, you can see the strength and required characters of your new Access Code.

Change Access Code Form

Click the OK button to confirm. After setting the new Access Code, a success message will appear.

Success message

Forgotten Access Code

If you forget your Access Code, you can reset it. Resetting will remove your access to all Safe Boxes, and any Safe Boxes that only you could access will be deleted.

Depending on the server/domain settings, it is possible that the user’s private key is backed up in a White Envelope, and there is no need to reset the passcode. The Access Code can be recovered with the help of Security Officers from the White Envelope. There can be no data loss when recovering the Access Code (unlike a reset).

Before reset of the Access Code, please consult your administrator about losses.

To reset your Access Code, click the menu icon (next to your username) in the top right (1). In the menu, select Reset Access Code (2).

Context menu

You need to confirm the warning only if you have access to some Safe Box. Otherwise, you will be asked to enter a new Access Code immediately.

In the Reset Access Code form, confirm the warning that you will lose access to all Safe Boxes. You can also see which Safe Boxes will be deleted because no one will have access after the reset.

Reset Access Code form

After confirming the warning, a form to enter a new Access Code appears. As you type, you can check the strength and required characters. Click OK to confirm.

New Access Code

After resetting, you’ll see a success message. Use your new Access Code to confirm changes. If you had inherited permissions, another user can share them with you. Your White Envelope can be reactivated, but permissions must be reassigned manually.

Success message

Change Login Password

LDAP/Azure AD synchronized users are not allowed to changing their password in the SecureAnyBox5 because the password does not change in LDAP/Azure AD. If you are not sure whether you are syncing from LDAP/Azure AD, contact your administrator and consult the password change.

To change your login password, click the menu icon (next to your username) in the top right corner (1). In the menu, select Change Login Password (2).

Context menu

After clicking the button, a form appears. Enter your current password in the first field, and your new password in the next field. As you type, you can see the length, character types, and strength of your new password.

Change Login Password form

Click the OK button to confirm. After changing your password, a success message will appear.

Two-Factor Authentication

To improve security, you can enable Two-Factor Authentication (2FA) in SecureAnyBox5. The second factor is a 6-digit code from an Authenticator app, paired with SecureAnyBox5 using a secret key.

Enable Two-Factor Authentication

You can enable two-factor authentication for your account. If enabled, you must enter a verification code from your Authenticator app every time you log in.

To enable a Two-Factor Authentication, it is necessary to have the Authenticator app installed on a mobile phone.

To enable Two-Factor Authentication, click the menu icon (next to your username) in the top right (1). In the menu, select Two-Factor Authentication settings (2).

Two-Factor Authentication settings

After clicking the button, a setup wizard appears. Follow the steps to pair your Authenticator app with SecureAnyBox5.

first step second step third step fourth step

Once enabled, you must enter the second factor every time you log in. You can disable 2FA in the settings, or a User Manager can do it in your user details.

Pair another Authenticator

After setting up Two-Factor Authentication, you can pair another Authenticator app if needed.

To pair another Authenticator, click the menu icon (next to your username) in the top right (1). In the menu, select Two-Factor Authentication settings (2).

Two-Factor Authentication settings

In the wizard, select PAIR ANOTHER AUTHENTICATOR and follow the steps. All paired Authenticators should generate the same 6-digit code.

first step second step third step fourth step fifth step

Disable second factor

If you no longer want to use 2FA, you can disable it in the settings. If 2FA is mandatory, you will be required to set it up again. Disabling 2FA removes all your settings and paired Authenticators.

To disable 2FA, click the menu icon (next to your username) in the top right (1). In the menu, select Two-Factor Authentication settings (2).

Two-Factor Authentication settings

In the wizard, select Disable second factor and enter the 6-digit code to confirm.

first step second step third step

Reset Two-Factor Authentication settings

A User Manager can reset Two-Factor Authentication for another user by clicking Reset Two-Factor Authentication at the bottom of the user details form.

Reset button

To confirm the reset, the Access Code is required. Use this if the user lost access to their Authenticator app.

Change language

You can change the language of the web interface. Supported languages are English, Czech, German, and French. To change the language, click the menu icon (next to your username) in the top right (1). In the menu, select Change Language (2).

Context menu

After clicking the button, a form appears. Select your preferred language and click OK. The page will reload in the chosen language.

Change language form

User Preferences

You can change your personal preferences. To do this, click the menu icon (next to your username) in the top right (1). In the menu, select Change preferences (2).

Context menu

After clicking Change Preferences, the User Preferences form appears.

User Preferences form

The Remember Access Code field (1) is shown only if Access Code remembering is enabled on the server.
Fields in the Notification settings section (2) appear if email notifications are enabled.
The Notification of user initialization field (3) is visible only to users with the User Manager role.

In the User preferences form, it is possible to set remembering the last location, the default password pattern for Safe Box Groups, Safe Boxes, and Accounts that the user will create and enabling/disabling mail notifications of changes in Safe Boxes. All preferences are applied only for the currently logged-in user. Changing preferences for all users is possible in the SecureAnyBox configuration.

Remember Last Location

Remembering of the last visited location (page) is possible set for user or combination of user and station. If not turned off, after user logs in SecureAnyBox5, the last visited page automatically loaded.
Available options:

  • Off – Don’t remember the last page
  • Remember for user – Remember last visited page or Safe Box for given user
  • Remember for user and station key – Remember last visited page or Safe Box for given user and station key

If a start page set, it is not possible to set the remembering of the last visited location.

Remember Access Code

This field is displayed if remembering of Access Code is set in the server configuration.

After entering an Access Code, SecureAnyBox will temporarily store your Access Code in a cache, so you don’t have to enter the Access Code repeatedly. To disable remembering your Access Code, uncheck the field.

This is the default password pattern for Safe Boxes and Accounts when no specific pattern is set.
Each letter in the pattern represents a character in the generated password.
See password pattern examples
Allowed characters and their meanings:
v – lowercase vowel (a, e, i, o, u, y)
V – mixed case vowel (A, E, I, O, U, Y, a, e, i, o, u, y)
Z – uppercase vowel
c – lowercase consonant (b, c, d, f, g, h, j, k, l, m, n, p, q, r, s, t, v, w, ×, z)
C – mixed case consonant
z – uppercase consonant
l – any lowercase letter
A – any letter, mixed case
u – uppercase letter
d – digit (0-9)
s – special character (.,@,&,*,(,),<,>,_,],[,%,$,#,\,/,?,;,-,:)
n – digit or special character
\ – escape character (next character is used as is, e.g. pattern ‘\-’ outputs ‘-’ in the password)
* – any allowed character
Default pattern: CVCVdddCVCCVdC (e.g., wEHe063heFme4p)
Example: pattern ‘\p\a\s\sddddddd’ might generate ‘pass1762885′ or ‘pass5687412′.

Customized Column Of Records In Safe Boxes

Selection of which data displays in the middle column of the list of records in the Safe Box – after the record name. The default value in server configuration is Description.

Notification settings
Notification Of Changes

This field is displayed only if e-mail notifications are enabled in the server configuration.

Select if notification emails with a summary of changes will be sent. Whether you will be notified of changes in all in Safe Box Groups, Safe Boxes, and records, or only the watched ones.
Whether users will be notified of changes in all fields or only encrypted ones and how often notification will be sent to them depends on SecureAnyBox server configuration.

Notification Of Accesses

This field is displayed only if e-mail notifications are enabled in the server configuration.

Select if notification emails with a summary of accesses to encrypted information will be sent and whether you will be notified of accesses to encrypted information in all currently accessible Safe Box Groups, Safe Boxes, and records, or only the watched ones.
How often notifications will be sent to users depends on SecureAnyBox server configuration.

Notification Of User Initialization

This field is displayed only if e-mail notifications are enabled in the server configuration.
This field is displayed only to users with User Manager role.

Enabling email notifications of user initialization, you will allow sending emails with a summary of which user set their password and/or Access Code for the first time.

Override Default Settings

By overriding the default settings from the domain, you can set the automatic watching accordingly to your preferences. If the default setting is overridden, any changes to automatic watching settings in the domain will not apply to you.

Automatically Watch Changes

For Safe Box Groups and Safe Boxes, the user who creates or obtains access will be set to watch changes automatically. If sending notifications is enabled (in the server configuration), email notifications will be sent with a summary of changes in the watched ones.

Automatically Watch Accesses

Safe Box Groups, and Safe Boxes the user creates or obtains access to, will be automatically watching accesses to encrypted information in them. If sending notifications is enabled (in the server configuration), email notifications will be sent with a summary of accesses to the watched ones.

Start page setting

You can set a start page to be redirected to after logging in.
To set your start page, click the menu icon (next to your username) in the top right (1). In the menu, select Start page setting (2).

Start page setting menu

After clicking Start page setting, window for start page setting displays.

First setting of a start page

If this is your first time setting a start page, a window will appear for you to confirm the selection.

First setting of a start page
Start page is set to the current page

If the current page is already set as your start page, a window will appear allowing you to remove this setting.

Start page is set to the current page
Start page is set to different page

If your start page is set to a different page, you can check the setting by clicking the link. You can also override or remove your start page settings.

Start page is set to different page

Switch to Administration

Starting with version 5.0, the Administration section is in a separate interface. To switch to Administration, click the menu icon (next to your username) in the top right (1). In the menu, select Switch to Administration (2) to be redirected.

Switch to Administration

Safe Boxes

Safe Boxes and Safe Box Groups are used to store sensitive data, such as accounts used to log in, certificates, credit cards, and other files. Safe Boxes can be divided into three types:

Safe Boxes and Safe Box Groups can be shared with other users. On shared Safe Boxes and Safe Box Groups will apply dynamic inheritance of permissions. For private Safe Boxes and SafeBox Groups, all permissions to other users have to be set manually.

Each Safe Box or Safe Box Group name must be unique within its parent group or at the root. However, you can create a private Safe Box or Group with the same name as another, because the private name includes the owner’s name.
If you own a private Safe Box, you won’t see your own name in its title.

Private Safe Box's name is displayed differently to the owner of private Safe Box and to other users to whom the private Safe Box is shared.

As you can see in the image above, Private Safe Box’s name is displayed differently to the owner of private Safe Box and to other users who have permissions to this private Safe Box.

Menu

Filtering of Safe Boxes and Safe Box Groups

At the root level, you can filter Safe Boxes and Groups by name or description using the filter field (1). You can also filter by user tag or user using the special field (2).

Filtering fields

Filtering by user tag shows Safe Boxes and Groups with permission templates for that tag.
Filtering by user shows Safe Boxes and Groups where the selected user has permissions.

Pinned Safe Boxes and Safe Box Groups

You can pin Safe Boxes and Groups to the top of the list for quick access.
To pin, click the pin icon (pin icon) next to the item and confirm.

click to pin Safe Box pin Safe Box dialog

Pinned items appear at the top of the list with a pin icon.

pinned Safe Box in Grid

To manage the order of pinned items, click Edit pinned order. Drag items to rearrange.

edit pinned order

To unpin, click the pin icon again and confirm. The item will return to its normal position.

Sharing & Permissions

You can manage access rights for each Safe Box or Group. For non-private items, access rights are inherited dynamically. Private items block inheritance, but you can assign permissions manually.
You can also manage access rights at the root level.
To manage access, click Sharing & Permissions.

The Sharing & Permissions button is displayed only to users with permission Access Control

Sharing & Permissions table

The Sharing & Permissions page shows a table of users with permissions for that level (root, group, or box) and all its records.

Each user can have three types of rights:

Inherited rights – Permissions inherited from parent Safe Box Group or the root level

Effective rights – These permissions are checked when verifying permissions to some action.

Assigned rights – Permissions explicitly assigned

Effective rights

Effective permissions are determined by either directly assigned rights or inherited permissions from the parent level.

Private Safe Boxes

When a Safe Box or Safe Box Group is marked as private, its owner automatically has all access permissions (with IRCMDAT rights) and can do anything—read, add, modify, delete, manage rights, and perform other actions. Inheritance of permissions from the parent level is blocked.

Permission Management

You can find an overview of all your permissions on the Sharing and Permissions page.

Permissions overview

The table only shows permissions that can be set on the Sharing & Permissions page.

Permission Description
Inherited This permission enables dynamic inheritance of permissions. Can be set only for the root level or a Safe Box Group
Read User has permission to view Safe Box Groups, Safe Boxes and records in them (accounts, files, etc.)
Create User has permission to create new Safe Box Group, Safe Box or record (account, file, etc.)
Modify User has permission to modify Safe Box Groups, Safe Boxes and records in them (accounts, files, etc.)
Delete User has permission to delete or move Safe Box Group, Safe Box or record (account, file, etc.)
Access Control User has permission to manage rights for Safe Box Group, Safe Box or record (account, file, etc.)
Apply Templates User has permission to apply Permission templates for Safe Box Group or SafeBox.

Sharing Safe Box or Safe Box Group

You can share a Safe Box or Group by assigning access rights.
To assign permissions, click Add User. A list of users you can share with appears. You cannot share with users who have not set an Access Code.
If a user is from a different domain, their domain name appears after their username.

Add user

Select one or more users to share with, then click OK. You must confirm by entering the Access Code. Forgot your Access Code?
New users are added with READ permission. You can assign more permissions by checking the boxes.
All changes must be confirmed by entering the Access Code.

Assigned rights

You can manage assigned rights for each Safe Box or Group. If a user has inherited rights, click the blue gear icon (blue gear) to assign rights directly.
Assigned rights override inherited rights.
If a user has no inherited rights, you can assign rights by checking the boxes.
To remove assigned rights, click the cross icon (cross icon) and confirm. If the user only had assigned rights, they would be removed from the table.

Dynamic inheritance

Dynamic inheritance applies only to shared Safe Boxes or Groups. To use it, assign the Inherited permission at the root or group level.
If a user has Inherited at the root, all their other permissions at the root are inherited by all shared Safe Boxes and Groups.
Suppose Inherited is set only at a group. In that case, all other permissions in that group are inherited by all shared Safe Boxes in that group.

When you change the Inherited permission, a warning dialogue appears. To proceed, type the confirmation code (three bold letters) and confirm.

Modifying inheritance warning dialog
Permissions for the root level

Default Safe Box Permissions set root-level permissions, but can be changed directly. To manage root permissions, you need Access Control for the root and the User Manager or Administrator role. Otherwise, the Sharing & Permissions button will not appear.

Share inherited permissions

Suppose a user resets their Access Code or is assigned Inherited permission at the root. In that case, you must share inherited permissions with them.
If this happens, a warning appears when you load the root page. Click OK and enter the Access Code to share permissions.

Share inherited permissions

Permission templates

Permission templates can be managed only by users with permission Access Control

Permission templates help you assign permissions to users. Templates can be set for the root, any group, or any box, and are assigned to user tags. You can create one template per level per tag. Tags can be from your domain or other visible domains.

Permission templates for group

To create a template, select a user tag and assign permissions. The template applies to all users with that tag.

Permission template set for Affected levels
Root level all shared Safe Boxes and Safe Box Groups
Safe Box Group all Safe Boxes within the Safe Box Group
Safe Box Safe Box only

If the permission template set from the parent level, it is possible to modify it by clicking the blue gear icon (blue gear).

Permission templates for box in group

To view or manage permission template(s) for parent level, click the Up button.
After permission templates set, users with the permission Apply templates can apply them.

Apply permission templates

Only users with Apply templates permission can perform this action.

Permission templates can be applied when these conditions are met:

When all conditions met, notification icon appears (notification)

Templates can be applied to groups or boxes. Permissions are computed based on templates in the listed groups and boxes for each user tag. If computed permissions are missing some effective permissions, a red arrow (red arrow icon) appears.

Apply permission templates

Please review permissions in the table below.
Permissions were computed based on Permission Templates in listed Safe Boxes and Safe Box Groups depending on User tags assigned to listed users.
You can either Approve permissions, Skip permission assignment this time or Reject permission assignment. When you Reject permission assignment, SecureAnyBox5 will remember this choice. Next time Permission Templates are processed, permission record will show as rejected by default.
To completely remove a user from the permission assignment processing, you can change the user’s user tag assignment.

Computed permissions Permissions applied to:
Contains permission I (Inherited) all shared Safe Boxes and Safe Box Groups
Does not contain permission I all shared Safe Boxes; Safe Box Groups will have just R (read) permission applied

Watching…

You can set up watching for changes and/or access to encrypted information for Safe Box Groups, Safe Boxes, and records. Watching can be set at each level except the root.

When a user is watching changes for some level, and e-mail notifications are enabled in the server configuration, SecureAnyBox5 sends e-mails with a summary of changes at that level. Whether the changes are watched in all fields, or encrypted ones only, it depends on the server configuration of notifications.
If the user is watching accesses to encrypted information and e-mail notifications are enabled in the server configuration, SecureAnyBox5 sends e-mails with a summary of accesses at that level.
To access encrypted information is necessary to enter the Access Code in a record. If the Access Code is temporarily remembered, user accesses all records without entering the Access Code..
Watching of accesses and/or changes is inheritable – if user watches changes in Safe Box Group, all Safe Boxes, and records within the Safe Box Group will inherit watching of changes/accesses from the parent level.

From the root level, you can edit watching for all currently accessible Safe Box Groups, Safe Boxes, and records by clicking the Watching… button.

Watching of changes/accesses for Safe Box Groups, Safe Boxes, and records that you create or to which you obtain access in the future depends on the user’s settings of automatic watching.

Watching menu in root

In the Watching report, it is possible to check what the currently logged user is watching.

Start watching changes to everything

Changes in all Safe Box Groups, Safe Boxes, and records you currently have access to will be watched.

Watching of changes will be explicitly set for all currently accessible Safe Box Groups and Safe Boxes. Records inherit watching of changes from the Safe Box in which they are stored.

Note: Watching of changes for Safe Box Groups, Safe Boxes, and records that you create or to which you obtain access in the future depends on user’s settings and whether the level in which will be stored watches accesses, because watching of accesses may be inherited from the parent level.

After clicking the Start watching changes to everything button, it is necessary to confirm dialog window.

Start watching accesses to everything

Access to encrypted information in all Safe Boxes and Safe Box Groups you currently have access to will be watched.

Watching of accesses will be explicitly set for all currently accessible Safe Box Groups and Safe Boxes. Records inherit the watching of accesses from the Safe Box in which they are stored.

Note: Watching of accesses for Safe Box Groups, Safe Boxes, and records that you create or to which you obtain access in the future depends on user’s settings and whether the level in which will be stored watches accesses, because watching of accesses may be inherited from the parent level.

After clicking the Start watching accesses to everything button, it is necessary to confirm dialog window.

Stop watching changes to everything

Changes in all Safe Box Groups, Safe Boxes, and records you currently have access to will no longer be watched.

Watching of changes can reactivated at any time.

Note: Watching of changes for Safe Box Groups, Safe Boxes, and records that you create or to which you obtain access in the future depends on the user’s settings of automatic watching.

After clicking the Stop watching changes to everything button, it is necessary to confirm dialog window.

Stop watching accesses to everything

Access to encrypted information in all Safe Box Groups, Safe Boxes, and records you currently have access to will no longer be watched.

Watching of accesses can reactivated at any time.

Note: Watching of accesses for Safe Box Groups, Safe Boxes, and records that you create or to which you obtain access in the future depends on the user’s settings of automatic watching.

After clicking the Stop watching accesses to everything button, it is necessary to confirm dialog window.

Stop watching all

After clicking Stop watching all button, the watching of changes and accesses will be deactivated for all currently accessible Safe Box Groups and Safe Boxes, and records.

Watching of accesses and/or changes can reactivated at any time.

Note: Watching of accesses for Safe Box Groups, Safe Boxes, and records that you create or to which you obtain access in the future depends on the user’s settings of automatic watching.

After clicking the Stop watching all button, it is necessary to confirm dialog window.

Safe Box Group

Create Edit Watching… Delete

Safe Box Group is intended for associating Safe Boxes into larger units. For example, the Safe Box Group can associate all Safe Boxes related to some project, server and so on.

Access rights can be managed for each Safe Box Group separately. For Safe Box Groups, which are not private, is applied the dynamic inheritance of access rights. The inheritance permission can be set for root level or Safe Box Group. When a user has the inheritance permission for Safe Box Group, all new shared Safe Boxes inside this group will inherit his permissions from Safe Box Group.

If the user has set *Inherited* permission for the root level, he automatically inherits permissions for all shared Safe Box Groups and Safe Boxes within the range of the user’s domain.

When the Safe Box Group is private, the inheritance of access rights is blocked. However, the permissions to the private Safe Box Group can be assigned manually.

Create New Safe Box Group

To create a Safe Box Group, the user needs to have assigned the Create permission for the root level.

To create a Safe Box Group, click New Safe Box Group. Set a name, password pattern, and type (private or shared). You can create new Safe Boxes in the group or move existing ones into it.

New Safe Box Group

If the group is private, all Safe Boxes in it are also private.

Name

Safe Box Group name should characterize its content to work with SecureAnyBox more effectively and conveniently. Each name must be unique within the range of root level.
However, a user can create two Safe Box Groups with the same name, if one of the Safe Box Groups is private. The name of a private Safe Box Group is stored along with the username of its owner, so both names are unique.

Description

The description should clearly distinguish the Safe Box Group from others.

Password settings

Select the password settings that will be applied when generating a password for records within the scope of this Safe Box Group:

Password preset

A password preset will be used to generate a password. The preset has specified password requirements, such as the number of uppercase letters, characters to include/exclude, minimum entropy, etc. The password preset has to be specified first in the Administration interface.

Password pattern

The password pattern is automatically set for all Safe Boxes and records in the group.
Each letter in the pattern represents a character in the generated password.
See password pattern examples
Allowed characters and their meanings:
v – lowercase vowel (a, e, i, o, u, y)
V – mixed case vowel (A, E, I, O, U, Y, a, e, i, o, u, y)
Z – uppercase vowel
c – lowercase consonant (b, c, d, f, g, h, j, k, l, m, n, p, q, r, s, t, v, w, ×, z)
C – mixed case consonant
z – uppercase consonant
l – any lowercase letter
A – any letter, mixed case
u – uppercase letter
d – digit (0-9)
s – special character (.,@,&,*,(,),<,>,_,],[,%,$,#,\,/,?,;,-,:)
n – digit or special character
\ – escape character (next character is used as is, e.g. pattern ‘\-’ outputs ‘-’ in the password)
* – any allowed character
Default pattern: CVCVdddCVCCVdC (e.g., wEHe063heFme4p)
Example: pattern ‘\p\a\s\sddddddd’ might generate ‘pass1762885′ or ‘pass5687412′.

External files path

Enter an external files path that will be preset to all Safe Boxes within the Safe Box Group.
The path should be specified in MS Windows format (e.g. L:\SAB_DRIVE). If an external file path is changed, SecureAnyBox will store all new external files at the new location, but all previously stored files will remain at their original location.
Without SAB Launcher or SecureAnyBox plugin for Total Commander it is not possible to add external files to SecureAnyBox or work with them.

Safe Box Group type

Safe Box Group type is important for the dynamic inheritance of access rights.
When the Safe Box Group is private, none of the permissions will be inherited from a parent level. However, access rights to the private Safe Box Group can be assigned manually.
If the Safe Box Group is shared, the dynamic inheritance of access rights will be applied.
If the value is read only (plain text), the user does not have permission to modify a Safe Box Group type and create private Safe Box Groups.

Private – Blocks access rights inherited from parent level.
p(hide#safebox.SAFEBOX_GROUP.shared.note). Shared – Access rights are inherited from parent level.

Compliance profile

The compliance profile sets password security requirements. Use the Compliance report to check if passwords meet these requirements.

Edit Safe Box Group

To be able to edit the Safe Box Group, a user must have permission to Modify.

You can change the name, description, password pattern, external files path, and type for each Safe Box Group.
If you change the external files’ path, new files will be stored at the new location. However, existing files remain at their original location.

Watching…

For each Safe Box Group, you can enable watching for changes and/or access to encrypted information. If someone changes or accesses a watched item, an email notification is sent (if configured).

To access encrypted information is necessary to enter the Access Code in a record. If the Access Code is temporarily remembered, user accesses all records without entering the Access Code.

The user can customize the notification settings in user preferences.

Watching of changes for Safe Box Groups, Safe Boxes, and records that you create or to which you obtain access in the future depends on the user’s settings of automatic watching.

To set watching for the Safe Box Group, click the Watching… button, watching menu will display.

Watching menu Safe Box Group

In the Watching report, you can see what you are currently watching in the group.
The current status is shown next to the Watching… button.

Watch changesWatch accesses Watching of changes and accesses to encrypted data is set explicitly for the Safe Box Group.
Watch changes Watching of changes is set for the Safe Box Group. Watching of accesses to encrypted data not set.
Watch accesses Watching of changes not set. Watching of accesses to encrypted data is set explicitly for the Safe Box Group.

Safe Box Groups can have watching of accesses and/or changes set explicitly only.

By checking Watching Changes or Watching Accesses, you set explicit watching for the group. All Safe Boxes and records in the group inherit this setting.

Start watching changes within this Safe Box Group

All Safe Boxes currently in this group will have explicit watching for changes, even if moved to another group where changes are not watched.

Records stored in Safe Boxes within this Safe Box Group will inherit watching of changes from the Safe Box.

Note: If the automatic watching of changes not set, Safe Boxes (and records in them) added into this Safe Box Group in the future will inherit watching of changes from the Safe Box Group. Otherwise, all Safe Boxes and records will have set the watching of changes explicitly.

After clicking the Start watching changes within this Safe Box Group button, it is necessary to confirm dialog window.

Start watching accesses within this Safe Box Group

All Safe Boxes currently in this group will have explicit watching for accesses, even if moved to another group where accesses are not watched.

Records stored in Safe Boxes within this Safe Box Group will inherit watching of accesses from the Safe Box.

Note: If the automatic watching of accesses not set, Safe Boxes (and records in them) added into this Safe Box Group in the future will inherit watching of accesses from the Safe Box Group. Otherwise, all Safe Boxes, and records will have set the watching of accesses explicitly.

After clicking the Start watching accesses within this Safe Box Group button, it is necessary to confirm dialog window.

Stop watching changes within this Safe Box Group

The group, including all Safe Boxes and their records, will no longer be watched for changes.

Watching of changes can reactivated at any time.

Note: Watching of changes for Safe Boxes, and records within this Safe Box Group that you create or to which you obtain access in the future depends on the user’s settings of automatic watching.

After clicking the Stop watching changes within this Safe Box Group button, it is necessary to confirm dialog window.

Stop watching accesses within this Safe Box Group

The group, including all Safe Boxes and their records, will no longer be watched for access to encrypted data.

Watching of accesses can reactivated at any time.

Note: Watching of accesses for Safe Boxes, and records within this Safe Box Group that you create or to which you obtain access in the future depends on the user’s settings of automatic watching.

After clicking the Stop watching accesses within this Safe Box Group button, it is necessary to confirm dialog window.

Delete Safe Box Group

You can delete a Safe Box Group from the root level if you have Delete permission. The cross icon (cross icon) appears at the end of the row if you have permission.
Click the cross icon and confirm to delete. The group will be removed from the list.
You can immediately restore a deleted group by clicking Undo in the message.

Delete message

Safe Box

Create Edit Move Import records Watching… Connect from Safe Box Delete

Safe Boxes are used to store records of different types, such as accounts, secret accounts, files, certificates, and credit cards. For easier understanding, you can imagine the Safe Box as a folder and the records as individual files.
You can manage access rights for each Safe Box individually. For Safe Boxes that are not private, access rights are inherited dynamically. This inheritance permission can be set at the root level or for a Safe Box Group. If a user has this permission, all new shared Safe Boxes will inherit their permissions from the parent level.
When a Safe Box is private, access rights inheritance is disabled. However, you can still manually assign access rights to the private Safe Box.

Create Safe Box

To be able to create a Safe Box, a user must have permissions to Create for the root level or a Safe Box Group in which the Safe Box will be created.

You can create a new Safe Box at the root or inside a group by clicking New Safe Box. Set a name, password pattern, and type (private or shared). Private Safe Boxes can only be created at the root.
When creating a Safe Box in a group, the type is set by the group.

New Safe Box
Name

The Safe Box name should characterize its content to work with SecureAnyBox more effectively and conveniently. Each name must be unique within the range of a Safe Box Group or the root level.
However, a user can create two Safe Boxes with the same name at the root level, if one of the Safe Boxes is private. The name of a private Safe Box is stored along with the username of its owner, so both names are unique.

Description

The description should clearly distinguish the Safe Box from others.

Password settings

Choose the password settings for records in this Safe Box:

Password preset

A password preset will be used to generate passwords. The preset can specify requirements like uppercase letters, included/excluded characters, minimum entropy, etc. Presets must be defined in the Administration interface.

Password pattern

The default password pattern is automatically set for all records in the Safe Box.
Each letter in the pattern represents a character in the generated password.
See password pattern examples
Allowed characters and their meanings:
v – lowercase vowel (a, e, i, o, u, y)
V – mixed case vowel (A, E, I, O, U, Y, a, e, i, o, u, y)
Z – uppercase vowel
c – lowercase consonant (b, c, d, f, g, h, j, k, l, m, n, p, q, r, s, t, v, w, ×, z)
C – mixed case consonant
z – uppercase consonant
l – any lowercase letter
A – any letter, mixed case
u – uppercase letter
d – digit (0-9)
s – special character (.,@,&,*,(,),<,>,_,],[,%,$,#,\,/,?,;,-,:)
n – digit or special character
\ – escape character (next character is used as is, e.g. pattern ‘\-’ outputs ‘-’ in the password)
* – any allowed character
Default pattern: CVCVdddCVCCVdC (e.g., wEHe063heFme4p)
Example: pattern ‘\p\a\s\sddddddd’ might generate ‘pass1762885′ or ‘pass5687412′.

External files path

Enter an external files path that will be used as a location to store external files within the Safe Box.
The path should be specified in MS Windows format (e.g. L:\SAB_DRIVE). If an external file path is changed, SecureAnyBox will store all new external files at the new location, but all previously stored files will remain at their original location.
Without SAB Launcher or SecureAnyBox plugin for Total Commander it is not possible to add external files to SecureAnyBox or work with them.

Safe Box type

Safe Box type is important for the dynamic inheritance of access rights.
When the Safe Box is private, none of the permissions will be inherited from a parent level. However, access rights to the private Safe Box can be assigned manually.
If the Safe Box is shared, the dynamic inheritance of access rights will be applied.
If the value is read only (plain text), the user does not have permission to change a Safe Box type.
The Safe Box type cannot be set to Safe Boxes inside a Safe Box Group – for these Safe Boxes, the type is given by the parent Safe Box Group.

Private – Blocks access rights inherited from parent level.

Shared – Access rights are inherited from parent level.

Compliance profile

The compliance profile sets password security requirements. Use the Compliance report to check if passwords meet these requirements.

Edit Safe Box

To be able to edit the Safe Box, a user must have permission to Modify.

You can change the name, description, password pattern, external files path, and type for each Safe Box.
If you change the external files’ path, new files will be stored at the new location. However, existing files remain at their original location.
If the Safe Box is not in a group, you can also change its type.

Move Safe Box

To be able to move the Safe Box, a user must have permission to Delete. When moving, the Safe Box is effectively deleted from an original location and created at a target location.

To move a Safe Box, click Move Safe Box and wait for the list of possible destinations.

Move Safe Box

Click a row in the list to select the destination, then confirm by entering the Access Code. Forgot your Access Code?

By moving the Safe Box, you may change permissions of other users for the Safe Box.

Import records into Safe Box

You can import records from other applications into a Safe Box. First, create the target Safe Box. On its page, click Import… and select SecureAnyBox5 Importer from the menu.

Import to Safe Box - menu

Import utilities can be downloaded from Downloads page too.

After clicking, a dialogue with a download link appears. Download and extract the files from the zip archive, then run the provided utility.

Download link for the import utility

In SecureAnyBox5 Importer, enter the SecureAnyBox5 address in the appropriate field. You can copy the address by clicking Copy SecureAnyBox5 address in the menu that appears after clicking Import….

Copy SecureAnyBox5 address messageBox

Watching

For each Safe Box, you can enable watching for changes and/or access to encrypted information. If someone changes or accesses a watched record, an email notification is sent (if configured).
If a Safe Box is watched, all its records are also watched. You can customize notification settings in user preferences.

Watching of changes for Safe Box Groups, Safe Boxes, and records that you create or to which you obtain access in the future depends on the user’s settings of automatic watching.

Watching menu Safe Box

In the Watching report, you can see what you are currently watching in the Safe Box.
The current status is shown next to the Watching… button.

Watch changes Watching of changes is set explicitly for the Safe Box. Accesses are not watched.
Watch changes - inherited Watching of changes is inherited from the parent level. Accesses are not watched.
Watch accesses Watching of accesses to encrypted data is set explicitly for the Safe Box. Changes are not watched.
Watch changes - inherited Watching of accesses to encrypted data is inherited from the parent level. Changes are not watched.
Watch changesWatch accesses Watching of changes and accesses to encrypted data is set explicitly for the Safe Box.
Watch changesWatch accesses - inherited Watching of changes is set explicitly for the Safe Box. Watching of accesses to encrypted data is inherited from the parent level.
Watch changes - inheritedWatch accesses Watching of changes is inherited from the parent level. Watching of accesses to encrypted data is set explicitly for the Safe Box.
Watch changes - inheritedWatch accesses - inherited Watching of changes and accesses to encrypted data is inherited from the parent level.

By checking Watching Changes or Watching Accesses, you set explicit watching for the Safe Box. All records in the box inherit this setting.

Start watching changes within this Safe Box

All records currently in this Safe Box will have explicit watching for changes, even if moved to another box where changes are not watched.

Note: If the automatic watching of changes not set, records added into this Safe Box in the future will inherit watching of changes from the Safe Box. Otherwise, all records will have set the watching of changes explicitly.

After clicking the Start watching changes within this Safe Box button, it is necessary to confirm dialog window.

Start watching accesses within this Safe Box

All records currently in this Safe Box will have explicit watching for accesses, even if moved to another box where accesses are not watched.

Note: If the automatic watching of changes not set, records added into this Safe Box in the future will inherit watching of changes from the Safe Box. Otherwise, all records will have set the watching of changes explicitly.

After clicking the Start watching accesses within this Safe Box button, it is necessary to confirm dialog window.

Stop watching changes within this Safe Box

Changes in this Safe Box and all its records will no longer be watched.

Note: If the Safe Box is stored in Safe Box Group, then Safe Box (and records within it) may have inherited watching of changes from the Safe Box Group.
Watching of changes for records within this Safe Box that you create or to which you obtain access in the future depends on the user’s settings of automatic watching.

After clicking the Stop watching changes within this Safe Box button, it is necessary to confirm dialog window.

Stop watching accesses within this Safe Box

Access to encrypted information in this Safe Box and all its records will no longer be watched.

Watching of changes can be reactivated anytime.

Note: If the Safe Box is stored in Safe Box Group, then Safe Box (and records within it) may have inherited watching of accesses from the Safe Box Group.
Watching of changes for records within this Safe Box that you create or to which you obtain accesses in the future depends on the user’s settings of automatic watching.

After clicking the Stop watching accesses within this Safe Box button, it is necessary to confirm dialog window.

Connect

Suppose any account or secret account in a Safe Box has a connection type defined. In that case, you can open the connection by clicking Connect. You must have SecureAnyBox5 Launcher installed on your computer.

Connect button at the Safe Box page

If the record contains a username and password, you will be connected automatically to the target (server, station, etc.).

Delete Safe Box

To be able to delete the Safe Box, a user must have permission to Delete. If a user has this permission, a cross icon (cross icon) is displayed at the end of a row.

You can delete a Safe Box from the group page or root page. Click the cross icon at the end of the row, then confirm deletion. The Safe Box will be removed from the list.

Delete Safe Box

You can immediately restore a deleted Safe Box by clicking Undo in the message.

Records

Create Edit Change password Password History Copy as… Watching… Connect Move Move to White Envelope Delete

Records are stored in Safe Boxes and are used to keep important information. You must select a record type based on the information to store. All record types and their fields are listed in the table below.

Record type Field
Name Description Tags Note Password settings Password preset Password pattern Address Login Site Login Connection Type Connection Options Secret Note Password File Alias Certificate Certificate password Number Expiration Date CVV PIN Compliance profile Issuer Account Secret Key TOTP Authenticator
Account
Secret Account
TOTP Authenticator
File
Certificate
Credit Card
yes Information can be stored in this record type.
Access to this information is not audited.
yes, encrypted Information can be stored for this type of record. This information will be encrypted when the record is saved.
You need to enter an Access Code to access it. Access to this information is audited.
no Information cannot be stored in this record type.
Account
The account is used to store credentials - like a login info for e-shops, e-mail accounts, applications, servers and so on.
In the stored account, the password will save encrypted. To decrypt the password is necessary to enter the Access Code.
Should you need to protect the username and the server address also, use the secret account type of record instead.
Secret Account
The secret account is used to store credentials - like a login info for e-shops, e-mail accounts, applications, servers and so on.
In the secret account, more information is protected than in an account. After saving the secret account, all information stored in the *Secure* part will be encrypted. This information can be decrypted only after entering the Access Code.
TOTP Authenticator
The TOTP Authenticator record is a special entry designed to help you securely store and use the secret keys required for Time-based One-Time Password (TOTP) authentication. This enables you to generate one-time codes directly within the password manager, making it easier and safer to log in to websites and apps that use two-factor authentication (2FA).
File
The file record is intended for storing files which might contain sensitive security information (e.g., configuration files with stored passwords).
After storing the file record, all the information, stored in the Secure part, will be encrypted. A user can only decrypt encrypted values after entering the Access Code.
Certificate
Like the certificate, you can store a keystore (a certificate, a public or a private key).
All information stored in the Secure part will be encrypted. Encrypted information can only be decrypted after entering the Access Code.
Credit Card
The record intended for storing the information about a credit card. In this record, you can store a credit card number, an expiration date, CVV and PIN code. But also other information within the fields like a description, a note, and tags.
All information stored in the Secure part of a record will be encrypted. This information can only be decrypted after entering the Access Code.

Create record

Account Secret Account TOTPAuthenticator File Certificate Credit Card

To be able to create a record, the user must have permission to Create for the Safe Box, into which the record will create.

To create a record, go to the Safe Box page and click Add…. In the menu, select the record type. A form will appear for creating the record.
Set a name for the record. Other fields are optional and can be changed later.

Account form
Identification
Name

The account name should characterize the purpose of stored data to work more effectively and conveniently.
Each name must be unique inside a single Safe Box.
The account name can be modified later.

Maximum length: 255 characters

Address

Address, link or description where the information is stored in the account used.
When the address is stored in a correct format (e.g., "https://192.168.1.231"), it will appear as a link. For a location in a local network, you can use an IP address (e.g. "http://172.22.60.30"); for other websites, e-shops, etc., you can use a URL address (e.g., "http://www.ebay.com").
Addresses can also be stored in other formats like an SSH (e.g., "ssh://[email protected]"), FTP (e.g., "ftp://myserver.com") and so on.
In the address field, it is possible to store a hostname, an IP address, and it is even possible to store a port. The port has to be separated from the host by a colon. (e.g. "172.22.88.75:8876" or "test.tdp.cz:887").
The address is an optional value.

Maximum length: 1000 characters

e.g., URL, hostname or IP address of the server where you use the stored password.

Login Site

The login site is used for better specification, where the stored account can be used. The value of this field is used especially in the browser extension to edit the visibility of an account.
For example, the stored account will be used to log in to Gmail. If the Address field is set to URL "https://accounts.google.com", and the Login Site field is set to "google.com", then the account will be visible in the browser extension for all Google login forms, even if the actual URL will differ from "https://accounts.google.com."

Maximum length: 1000 characters

Login

The username that you use to log in.

Maximum length: 255 characters

Description

The description should more specifically characterize an account.
In the description, only one line of text can be stored. A longer description can be stored as a note.

Maximum length: 2000 characters

Tags

Tags are keywords that help describe and categorize stored data. Each record should have specified tags for more efficient searching.
\r\nTags must first be entered into SecureAnyBox before they can be assigned to individual records. Users with the Security Policy Administrator role manage tags on the Record Tags management page in the administration interface.
\r\nYou can then select and assign multiple tags to each record.

Password Settings

Select the password settings that will be applied when generating a password:

  • Inherited – settings will be inherited from a domain, parent level (Safe Box Group or Safe Box) or assigned record tag

  • Password preset – the selected password preset will apply when generating a password. The password preset has to be specified first in the Administration interface.

  • Password pattern – when generating a password, the entered password pattern will apply

Password preset

A password preset will be used to generate a password. The preset specifies requirements like uppercase letters, included/excluded characters, minimum entropy, etc. Presets must be defined in the Administration interface.

Password Pattern

This is the default password pattern for Accounts when no specific pattern is set.
Each letter in the pattern represents a character in the generated password.
See password pattern examples
Allowed characters and their meanings:
v – lowercase vowel (a, e, i, o, u, y)
V – mixed case vowel (A, E, I, O, U, Y, a, e, i, o, u, y)
Z – uppercase vowel
c – lowercase consonant (b, c, d, f, g, h, j, k, l, m, n, p, q, r, s, t, v, w, ×, z)
C – mixed case consonant
z – uppercase consonant
l – any lowercase letter
A – any letter, mixed case
u – uppercase letter
d – digit (0-9)
s – special character (.,@,&,*,(,),<,>,_,],[,%,$,#,\,/,?,;,-,:)
n – digit or special character
\ – escape character (next character is used as is, e.g. pattern ‘\-’ outputs ‘-’ in the password)
* – any allowed character
Default pattern: CVCVdddCVCCVdC (e.g., wEHe063heFme4p)
Example: pattern ‘\p\a\s\sddddddd’ might generate ‘pass1762885′ or ‘pass5687412′.

Maximum length: 255 characters

Note

The note field is intended for multiline information about the account. For example, the note can include a description of the account, a list of steps on how to successfully log in, a description of the configuration and so on.

Maximum length: 4000 characters

Connection Type

Please select connection type. If the SecureAnyBox Launcher is installed, you can open a connection directly from the account page. To create a connection, SecureAnyBox Launcher needs to download from a secret account the values of Address and Login fields and the stored password.
In the address field, it is possible to store a hostname, an IP address, and it is even possible to store a port. The port has to be separated from the host by a colon. (e.g. "172.22.88.75:8876" or "test.tdp.cz:887").

Compliance Profile

A compliance profile specifies password security requirements that passwords should meet. Checking whether passwords meet security requirements can be done in the Compliance report.

Secure
Connection Options
You can enter additional connection parameters in the Connection options field. These will be transmitted to the running application via the SecureAnyBox5 Launcher along with the address, username, and password. Some parameters can also be set globally directly in the SecureAnyBox5 Launcher configuration. Parameters set for a record are always used in preference to the values from the global setting.
Remote Desktop connections support the following parameters:
/admin – If your RDS servers are grouped into a collection (farm) and you need to log in directly to one specific server you must use the /admin parameter. The parameter can also be written in the format /admin:true, or /admin:false (e.g. to disable global settings at the SecureAnyBox5 Launcher level)
/gateway: – remote desktop gateway address
/gatewayusername: – username for connecting to the remote desktop gateway
/gatewaypassword: – password to connect to the remote desktop gateway.
For example: /gateway:rdg.tdp.cz /gatewayusername:gatekeeper /gatewaypassword:somestrongpassword
/gatewaybypassforlocal: – disables the use of the remote desktop gateway when connecting from the local network. The parameter can also be written in the format /gatewaybypassforlocal:true, or /gatewaybypassforlocal:false (e.g. to disable global settings at the SecureAnyBox5 Launcher level)
For other connection types SCP, SSH, Telnet, and so on, you can specify any parameters that the application supports when started from the command line. For a detailed description, see the application’s help.

Maximum length: 2000 characters

New password

The password you use to log in.
Into this field can be stored a password which you already have, or you might generate a new one. The password can be generated by clicking on the Generate password button. Generated passwords are safer and don’t have any link to a person who made them (like a pet’s name, favourite actor or nickname).
Generated passwords are formatted by the current password pattern. Generated passwords can be edited.
While editing the password, you can see how long your password is, how many lowercase letters, uppercase letters, numbers or other symbols your password contains and how secure your password is.
After saving an account record, the password will be encrypted. The password can be decrypted after entering the access code only.

Maximum length: 255 characters

Password field

number of characters

number of lowercase letters

number of uppercase letters

number of digits

number of special characters

pointer how secure the password is

button for displaying the password

time to crack password offline

password entropy (the higher the better)

Secret account form
Identification
Name

Secret account name should characterize the purpose of stored data to work more effectively and conveniently.
Each name must be unique inside a single Safe Box.
The secret account name can be modified later.

Maximum length: 255 characters

Login Site

The login site is used for better specification, where the stored account can be used. The value of this field is used especially in the browser extension to edit the visibility of an account.
For example, the stored account will be used to log in to Gmail. If the Address field is set to URL "https://accounts.google.com", and the Login Site field is set to "google.com", then the account will be visible in the browser extension for all Google login forms, even if the actual URL will differ from "https://accounts.google.com."

Maximum length: 1000 characters

Description

The description should more specifically characterize a secret account.
In the description, only one line of text can be stored. A longer description can be stored as a note.

Maximum length: 2000 characters

Tags

Tags are keywords that help describe and categorize stored data. Each record should have specified tags for more efficient searching.
\r\nTags must first be entered into SecureAnyBox before they can be assigned to individual records. Users with the Security Policy Administrator role manage tags on the Record Tags management page in the administration interface.
\r\nYou can then select and assign multiple tags to each record.

Maximum length of one tag: 32 characters

Password Settings

Select the password settings that will be applied when generating a password:

  • Inherited – settings will be inherited from a domain, parent level (Safe Box Group or Safe Box) or assigned record tag

  • Password preset – the selected password preset will apply when generating a password. The password preset has to be specified first in the Administration interface.

  • Password pattern – when generating a password, the entered password pattern will apply

Password preset

A password preset will be used to generate a password. The preset specifies requirements like uppercase letters, included/excluded characters, minimum entropy, etc. Presets must be defined in the Administration interface.

Password Pattern

This pattern is used when generating a password for a secret account.
Each letter in the pattern represents a character in the generated password.
See password pattern examples
Allowed characters and their meanings:
v – lowercase vowel (a, e, i, o, u, y)
V – mixed case vowel (A, E, I, O, U, Y, a, e, i, o, u, y)
Z – uppercase vowel
c – lowercase consonant (b, c, d, f, g, h, j, k, l, m, n, p, q, r, s, t, v, w, ×, z)
C – mixed case consonant
z – uppercase consonant
l – any lowercase letter
A – any letter, mixed case
u – uppercase letter
d – digit (0-9)
s – special character (.,@,&,*,(,),<,>,_,],[,%,$,#,\,/,?,;,-,:)
n – digit or special character
\ – escape character (next character is used as is, e.g. pattern ‘\-’ outputs ‘-’ in the password)
* – any allowed character
Default pattern: CVCVdddCVCCVdC (e.g., wEHe063heFme4p)
Example: pattern ‘\p\a\s\sddddddd’ might generate ‘pass1762885′ or ‘pass5687412′.

Maximum length: 255 characters

Note

This field is intended for multiline information about the secret account. For example, the note can include a description of the secret account, a list of steps on how to successfully log in, a description of the configuration and so on.

Maximum length: 4000 characters

Connection Type

Please select connection type. If the SecureAnyBox Launcher is installed, you can open a connection directly from the account page.
To create a connection, SecureAnyBox Launcher needs to download from a secret account the values of the Address and Login fields and the stored password.
In the address field, it is possible to store a hostname or an IP address. It is even possible to store a port. The port has to be separated from the host by a colon. (e.g. 172.22.88.75:8876 or test.tdp.cz:887).

Compliance Profile

A compliance profile specifies password security requirements that passwords should meet. Checking whether passwords meet security requirements can be done in the Compliance report.

Secure
Address

Address, link or description where the account is used.
When the address is stored in a correct format (e.g. "https://192.168.1.231"), it will appear as a link. For a location in a local network, you can use an IP address (e.g. "http://172.22.60.30"), for other webs, e-shops, etc. you can use a URL address (e.g. "http://www.ebay.com").
Addresses can be also stored in other formats like an SSH (e.g. "ssh://[email protected]"), FTP (e.g. "ftp://myserver.com") and so on.
The address is an optional value.
In the address field is possible to store a hostname, an IP address and is even possible to store a port. The port has to be separated from the host by a colon. (e.g. 172.22.88.75:8876 or test.tdp.cz:887).
Unlike in an account, the address in a secret account will be encrypted. The address can be decrypted after entering the access code only.

Maximum length: 1000 characters

Login

The username that you use to log in.
Unlike in an account, the login in a secret account will be encrypted. The login can be decrypted after entering the access code only.

Maximum length: 255 characters

Secret Note

The secret note field is intended for multiline information about the file. Unlike a note, the secret note will be encrypted. The secret note can be decrypted after entering the access code only.

Maximum length: 4000 characters

Connection Options
You can enter additional connection parameters in the Connection options field. These will be transmitted to the running application via the SecureAnyBox5 Launcher along with the address, username, and password. Some parameters can also be set globally directly in the SecureAnyBox5 Launcher configuration. Parameters set for a record are always used in preference to the values from the global setting.
Remote Desktop connections support the following parameters:
/admin – If your RDS servers are grouped into a collection (farm) and you need to log in directly to one specific server you must use the /admin parameter. The parameter can also be written in the format /admin:true, or /admin:false (e.g. to disable global settings at the SecureAnyBox5 Launcher level)
/gateway: – remote desktop gateway address
/gatewayusername: – username for connecting to the remote desktop gateway
/gatewaypassword: – password to connect to the remote desktop gateway.
For example: /gateway:rdg.tdp.cz /gatewayusername:gatekeeper /gatewaypassword:somestrongpassword
/gatewaybypassforlocal: – disables the use of the remote desktop gateway when connecting from the local network. The parameter can also be written in the format /gatewaybypassforlocal:true, or /gatewaybypassforlocal:false (e.g. to disable global settings at the SecureAnyBox5 Launcher level)
For other connection types SCP, SSH, Telnet, and so on, you can specify any parameters that the application supports when started from the command line. For a detailed description, see the application’s help.

Maximum length: 2000 characters

Password

The password you use to log in.
This field could contain a password which you already have, or you might generate a new one. The password can be generated by clicking on the Generate password button. Generated passwords are safer and don’t have any link to a person who made them (like a pet’s name, favourite actor or nickname).
Generated passwords are formatted by the current password settings. Generated passwords can be edited.
While editing the password, you can see how long your password is, how many lowercase letters, uppercase letters, numbers or other symbols your password contains and how secure your password is.

Maximum length: 255 characters

Password field

number of characters

number of lowercase letters

number of uppercase letters

number of digits

number of special characters

pointer how secure the password is

button for displaying the password

time to crack password offline

password entropy (the higher the better)

TOTP Authenticator form
Identification
Name

TOTP record name should characterize the purpose of stored data to work more effectively and conveniently.
Each name must be unique inside a single Safe Box.
The TOTP record name can be modified later.

Maximum length: 255 characters

Login Site

The login site field is used to specify where the stored TOTP code can be used. The value of this field is significant for the browser extension to determine when to display this TOTP record for autofill or copy actions.
For example, if the TOTP code is intended for logging in to Gmail, you can set the Address field to "https://accounts.google.com" and the Login Site field to "google.com". That ensures that the TOTP code will be available in the browser extension for any Google login forms, regardless of the exact URL, providing you with convenient access to your authentication codes wherever they are needed across Google services.

Description

The description should more specifically characterize a TOTP record.
In the description, only one line of text can be stored. A longer description can be stored as a note.

Maximum length: 2000 characters

Tags

Tags are keywords that help describe and categorize stored data. Each record should have specified tags for more efficient searching.
\r\nTags must first be entered into SecureAnyBox before they can be assigned to individual records. Users with the Security Policy Administrator role manage tags on the Record Tags management page in the administration interface.
\r\nYou can then select and assign multiple tags to each record.

Maximum tag length: 32 characters

Note

This field is intended for multiline information about the TOTP record. For example, the note can include a description of the TOTP record, a list of steps to successfully log in, a description of the configuration, and so on.

Maximum length: 4000 characters

Secure
Issuer

A label indicating the provider or service this TOTP record’s account is associated with.

Account

User account name associated with this TOTP authenticator record.

Secret Key

Secret key used to generate time based authentication codes.

Secret Note

The secret note field is intended for multiline information about the record. Unlike a note, the secret note will be encrypted. The secret note can be decrypted after entering the access code only.

Maximum length: 4000 characters

File form
Identification
Name

The file name should characterize the purpose of stored data to work more effectively and conveniently.
Each name must be unique inside a single Safe Box.
The file name can be modified later.

Maximum length: 255 characters

Description

The description should more specifically characterize a file.
In the description, only one line of text can be stored. A longer description should be stored as a note.

Maximum length: 2000 characters

Tags

Tags are keywords that help describe and categorize stored data. Each record should have specified tags for more efficient searching.
\r\nTags must first be entered into SecureAnyBox before they can be assigned to individual records. Users with the Security Policy Administrator role manage tags on the Record Tags management page in the administration interface.
\r\nYou can then select and assign multiple tags to each record.

Maximum length of one tag: 32 characters

Note

This field is intended for multiline information about the file. For example, the note can include a description of the file, a list of steps on how to use it, and so on.

Maximum length: 4000 characters

Secure
File

In this field, a file can be selected, which will be stored in this file record. Select the file from your computer or server by clicking on the Select… button.
After saving the record, the stored file will be encrypted. The file can be decrypted after entering the access code only. After the file is decrypted, it will be possible to download or change the file.

Secret Note

The secret note field is intended for multiline information about the file. Unlike a note, the secret note will be encrypted. The secret note can be decrypted after entering the access code only.

Maximum length: 4000 characters

Certificate form
Identification
Name

Certificate name should characterize the purpose of stored data to work more effectively and conveniently.
Each name must be unique inside a single Safe Box.
The certificate name can be modified later.

Maximum length: 255 characters

Description

The description should more specifically characterize a certificate.
In the description, only one line of text can be stored. A longer description should be stored as a note.

Maximum length: 2000 characters

Tags

Tags are keywords that help describe and categorize stored data. Each record should have specified tags for more efficient searching.
\r\nTags must first be entered into SecureAnyBox before they can be assigned to individual records. Users with the Security Policy Administrator role manage tags on the Record Tags management page in the administration interface.
\r\nYou can then select and assign multiple tags to each record.

Maximum length of one tag: 32 characters

Note

The note field is intended for multiline information about the certificate. For example, like the note, it is possible to store a description of the certificate, a list of steps on how to use the certificate and so on.

Maximum length: 4000 characters

Secure
Alias

The alias is used as the name under which the certificate file is stored in the repository. After saving a certificate, the alias will be encrypted. The alias will be decrypted after entering the access code only.

Maximum length: 255 characters

Certificate

Into this field can be selected a keystore file (a certificate, a public or a private key), which will be stored in this record. Select the file from your computer or server by clicking on the "Select…" button.
After saving the record, the stored file will encrypt. The file can only be decrypted after entering the access code. After decrypting the file, it will be possible to download or change the file..

Certificate Password

The password that is used with the certificate. The password can be generated by clicking on the Generate password button. Generated passwords are safer and don’t have any link to a person who made them (like a pet’s name, favourite actor or nickname).
Generated passwords are formatted by the current password pattern. Generated passwords can also be edited.
After saving a certificate record, the password will be encrypted. The password can be decrypted after entering the access code only.

Maximum length: 255 characters

Secret Note

The secret note field is intended for multiline information about the certificate. Unlike a note, the secret note will be encrypted. The secret note can be decrypted after entering the access code only.

Maximum length: 4000 characters

Credit card form
Identification
Name

The name should characterize the credit card to work more effectively and conveniently. For example, as the name of the card can be used a name of the bank, the name of a person or company which is the owner of a card, etc.
Each name must be unique inside a single Safe Box.
The credit card name can be modified later.

Maximum length: 255 characters

Description

The description should more specifically characterize a credit card.
In the description, only one line of text can be stored. A longer description should be stored in the note field.

Maximum length: 2000 characters

Tags

Tags are keywords that help describe and categorize stored data. Each record should have specified tags for more efficient searching.
\r\nTags must first be entered into SecureAnyBox before they can be assigned to individual records. Users with the Security Policy Administrator role manage tags on the Record Tags management page in the administration interface.
\r\nYou can then select and assign multiple tags to each record.

Maximum length of one tag: 32 characters

Note

The note field is intended for multiline information about the credit card. For example, the note can store a description of the credit card, the currency of the card, for which payments the card should be used, and so on.

Maximum length: 4000 characters

Secure
Number

Credit card number. After saving a record, the number will be encrypted. The number can be decrypted after entering the access code only.

Maximum length: 64 characters

Expiration Date

Credit card expiration date in MM/YYYY format. After saving the record, the expiration date will be encrypted. The expiration date can only be decrypted after entering the access code.

CVV

CVV code is usually listed on the back of your card.
The code used when paying online with a credit card.
After saving a record, the CVV code will be encrypted. The CVV code can only be decrypted after entering the access code.
Storing the CVV code is optional.

Maximum length: 64 characters

PIN

PIN code of the credit card.
After saving a record, the PIN code will encrypt. The PIN code can only be decrypted after entering the access code.
Storing the PIN code is optional.

Maximum length: 64 characters

Secret Note

The secret note field is intended for multiline information about the file. Unlike a note, the secret note will be encrypted. The secret note can be decrypted after entering the access code only.

Maximum length: 4000 characters

Edit record

Account Secret Account TOTPAuthenticator File Certificate Credit Card

To be able to edit the record, a user must have a Modify permission for a Safe Box in which the record is stored.

To edit a record, click Edit on the record’s page. A form appears where you can change any value. To edit values in the Secured section, you must enter the Access Code. Passwords in the account and secret account records are edited differently.

To edit account’s and secret account’s password, click the Change password button on a record’s page.

Change password

Account Secret Account

To be able to change the record’s password, a user must have a Modify permission for a Safe Box, in which the record is stored.

To change a record’s password, click Change password on the record’s page. A form appears for entering a new password.
You can enter a new password or generate one. Generated passwords follow the current pattern and can be edited.
You must confirm the password change by entering the Access Code (unless it is cached). Forgot your Access Code?

By clicking the Change password button, you can change passwords in an account and secret account type of record only. Certificate password can be changed in the edit form of certificate.

Password history

Account Secret Account

Each account and secret account keeps a password history. Click Password History on the record’s page to view all password changes in a table.

Password history

Click a row in the table and enter the Access Code to view the password, which was valid after that change. Forgot your Access Code?

Copy as…

Account Secret Account TOTPAuthenticator File Certificate Credit Card

You can copy a record as the same or a different type. Click Copy as … and select the record type.

Copy record menu

When copying, field values are copied to the new record if allowed. The copy is created in the same Safe Box, so you may need to edit its name.

Copy record message

After saving the copy, the original record is displayed. You can access the new record by clicking its name in the message.

Watching…

Account Secret Account TOTPAuthenticator File Certificate Credit Card

For each record, you can enable watching for changes and/or access to encrypted information. If someone changes or accesses a watched record, an email notification is sent (if configured).
You can customize notification settings in user preferences.

Watching of record

Watching settings are inheritable. If you watch changes in a group, you also watch changes in all Safe Boxes and records in that group.
Whether watching is explicit or inherited is shown by the icon color next to Watching….

Watch changes Watching of changes is set explicitly for the record. Accesses are not watched.
Watch changes - inherited Watching of changes is inherited from the parent level. Accesses are not watched.
Watch accesses Watching of accesses to encrypted data is set explicitly for the record. Changes are not watched.
Watch changes - inherited Watching of accesses to encrypted data is inherited from the parent level. Changes are not watched.
Watch changesWatch accesses Watching of changes and accesses to encrypted data is set explicitly for the record.
Watch changesWatch accesses - inherited Watching of changes is set explicitly for the record. Watching of accesses to encrypted data is inherited from the parent level.
Watch changes - inheritedWatch accesses Watching of changes is inherited from the parent level. Watching of accesses to encrypted data is set explicitly for the record.
Watch changes - inheritedWatch accesses - inherited Watching of changes and accesses to encrypted data is inherited from the parent level.

By checking Watching Changes or Watching Accesses, you set explicit watching for the record.

Connect

Account Secret Account

If an account or secret account record has a connection type, you can open the connection by clicking Connect. You must have SecureAnyBox5 Launcher installed on your computer.

Connect button at the record page

If the record contains a username and password, you will be connected automatically to the target (server, station, etc.).

Move record

Account Secret Account File Certificate Credit Card

To be able to move the record, a user must have a Delete permission for the Safe Box in which the record stored and Create permission for the Safe Box into which the record will move. When moving, the record will be effectively deleted from the original Safe Box and created in the target Safe Box.

To move a record, click Move record. A list of possible destinations will appear.

Move record

In the list, Safe Box Group names are blue. Click a group to see its Safe Boxes. To move from a group to the root, click the first line with two dots.
Safe Box names are black. Click a Safe Box to select it as the destination. Confirm the move by entering the Access Code. Forgot your Access Code?

All record permissions are determined by the Safe Box permissions in which the record stored. By moving the record, you may change even yours permissions, and you will not be able to return the record to the original Safe Box.

All record tags are specified for a domain in which the parent Safe Box is stored. By moving the record into Safe Box stored in another domain, all record tags will be deleted..

Move to White Envelope

Account Secret Account File Certificate Credit Card

This option is available only if currently logged user has activated White Envelope. More about White Envelopes…

To be able to move the record into a White Envelope, a user must have a Delete permissions for Safe Box in which the record stored. When moving, the record will be effectively deleted from the original Safe Box and created in the White Envelope.

To move a record into a White Envelope, click the appropriate button.
Before moving, you must confirm by entering the Access Code. Forgot your Access Code?

Moving the record into a White Envelope cannot be taken back.

Delete record

Account Secret Account TOTPAuthenticator File Certificate Credit Card

To be able to delete the record, a user must have a Delete permissions for Safe Box in which the record stored. If the user has this permission, a cross icon (cross icon) is displayed at the specific record (at the end of the row).

You can delete a record from the Safe Box page. Click the cross icon at the end of the row, then confirm deletion. The record will be removed from the list.

Delete record

You can immediately restore a deleted record by clicking Undo in the message.

Message with Undo button

Pinned records

You can pin records to the top of the list for quick access.
To pin, click the pin icon (pin icon) next to the record and confirm.

click to pin record pin record dialog

Pinned records appear at the top of the list with a pin icon.

pinned record in Grid

To manage the order of pinned records, click Edit pinned order and drag records to rearrange.

edit pinned order

To unpin a record, click the pin icon again and confirm. The record will return to its normal position.

Search page

On the Search page, you can search for records (Safe Boxes, Groups, Accounts, etc.) by name or by a specified tag or field value. You cannot search by encrypted field values.
To search, start typing in the search field.
You can use regular expressions for searching.

Search page

White Envelopes

Activate White Envelope Security Officers page Open White Envelope Close White Envelope Editing Mode of White Envelopes Recover White Envelope Reactivate White Envelope Initialize Security Officers Possible situations

White Envelope is a specialized type of Safe Box designed to store vital information for which access should never be lost. If the user who stored the data in the White Envelope forgets their access code or is unavailable, a designated quorum of Security Officers can convene and enter their respective access codes to retrieve this information.

To utilize the White Envelopes, a minimum number of Security Officers must be designated.

The Security Officer is a special user role. To assign Security Officers, please go to the User Management page in the Administration interface and add the role in the user details form.

Minimum count of Security Officers depends on settings in the SecureAnyBox5 configuration and settings in a domain. Please check how many Security Officers are needed.

After Security Officers are set, you can activate the White Envelope.

Activate White Envelope

Only if a minimum count of Security Officers is set, it is possible to activate the White Envelope. To activate the White Envelope, please open a context menu by clicking on the arrow next to the user’s name in the top right corner of the page and click on the Activate White Envelope button.

Activate White envelope White Envelope Page

Security Officers page

For each White Envelope, you can see which Security Officers have access. Click the Security Officers button on the White Envelope page.

Security Officers button

On the Security Officers page, you can see which officers have access and their email addresses. The number of officers needed to work with White Envelopes is shown above the table.
You can filter officers by entering part of their name in the filter field.

Security Officers page

Open White Envelope

Only users with a role Security Officer can open White Envelopes of other users.

To view encrypted values in another user’s White Envelope, open the envelope. At least two Security Officers (by default) must enter their Access Code.

Minimum count of Security Officers depends on settings in the SecureAnyBox5 configuration and settings in a domain. Please check how many Security Officers are needed.

Open White envelope

In an open White Envelope, Security Officers can view encrypted values such as passwords, files, and secret notes.

Close White Envelope

When Security Officers finish working with records in an open White Envelope, they should close it. White Envelopes can be opened and closed repeatedly.

Close White envelope

Editing mode of White Envelopes

Security Officers can enable editing mode to delete White Envelopes or records. To enable editing mode, two officers must enter their Access Code.

Minimum count of Security Officers depends on settings in the SecureAnyBox5 configuration and settings in a domain. Please check how many Security Officers are needed.

Enable editing mode

In editing mode, tables of White Envelopes or records have a first column with checkboxes. Officers select which items to delete, then click Delete selected.

Active editing mode

Deleted White Envelopes and records from them cannot be restored.

When finished editing, disable editing mode by clicking the appropriate button.

Disable editing mode

Recover White Envelope

If a user with an active White Envelope resets their Access Code, the envelope must be recovered. Until then, the user cannot view or change stored records or move records into the envelope.
The required number of Security Officers can restore a White Envelope.

Recover White nevelope

Reactivate White Envelope

Suppose the number of Security Officers falls below the minimum, and new officers are added. In that case, owners must reactivate their White Envelopes.
To reactivate, go to the White Envelope page, confirm the warning, and enter the Access Code. After entering the code, the envelope is reactivated.

Reactivate White Envelope

Recover Access Code

If a user’s private key is backed up in a White Envelope, their Access Code can be restored. First, open the White Envelope. Once open and the backup is stored, the Recover Access Code button appears in the menu.

Recover Access Code button

After clicking the button, the Security Officer must confirm they want to recover the owner’s Access Code.

Confirmation of Access Code recovery

After confirming, the logged-in user is prompted to enter their Access Code. Then a new Access Code can be set for the envelope owner.

Recovery of the Access Code

Initialize Security Officers

There are two reasons to initialise Security Officers: a user becomes a new officer, or a current officer resets their Access Code.
Only two other officers can initialise a Security Officer. Click Initialize Security Officers, then two officers must enter their Access Code.

Add/Init Security Officers

After successful initialisation, the officer has access to other users’ White Envelopes and can perform all operations (open, close, recover, and initialise).

Possible situations

Count of Security Officers is not sufficient

If a Security Officer is deleted and the count falls below the threshold, new officers must be added. After adding, current officers must initialise the new ones to share the White Envelope key parts.

message
Count of Security Officers is below the minimum

If the count of Security Officers is below the minimum, new officers must be set.
All White Envelopes are reset. Reactivation is required.

message
Deleted Security Officer has been re-added

If a Security Officer is deleted and then re-added, they must be set as a Security Officer again. After the role is set, they can be initialised.

Downloads

On the Downloads page, you can download SecureAnyBox5 Importer, SecureAnyBox5 Launcher, browser extensions, SecureAnyBox5 Manager plugins for FAR and Total Commander, and a trial version of the CBT client.

Downloads page - Safe Boxes Tools

SecureAnyBox5 Importer

SecureAnyBox5 Importer is a tool for importing records from CSV files and KeePass. You can import from KeePass kdb, kdbx, and xml files.

SecureAnyBox5Importer window

When importing from CSV, you must map account fields to CSV columns. After selecting the file, the field map appears. Once mapping is complete, you can save the map for future use.

Field Map - SecureAnyBox5 Importer

When importing from KeePass, you can choose the record type and view record values by double-clicking a row in the import preview.

Record  detail - SecureAnyBox5 Importer

After clicking Import, log in to SecureAnyBox5 (and enter 2FA if required), enter the Access Code, and select the Safe Box for import. After import, a report is displayed.

Import - SecureAnyBox5Importer

SecureAnyBox5 Launcher

SecureAnyBox5 Launcher is a Windows application. In Safe Boxes, it is used to connect from (secret) accounts and for communication between browser extensions and the SecureAnyBox5 server.

SecureAnyBox5 Launcher is a Windows application (.NET Framework 4.5.2 or higher required) delivered as an msi package. After installation, it runs in the system tray and registers the sab:// URI scheme for SecureAnyBox5 web links.
In an account or secret account, you can set the connection type (RDP/SSH/SCP/SFTP/TELNET/WINBOX/RASDIAL). After clicking Connect on the account page, the browser passes the sab:// URI to the launcher.
The launcher selects the appropriate plugin (PuTTY for SSH, WinSCP for SCP/SFTP, MikroTik Winbox for WINBOX, Remote Desktop for RDP), downloads account data using a one-time token, and starts the plugin.
To connect, the launcher downloads the Address, Login, and password fields from the account.
The address can be a hostname, IP, or include a port (e.g., "172.22.88.75:8876" or "test.tdp.cz:887").
The location of WinSCP, MikroTik Winbox, and PuTTY is detected automatically, but can be set manually in the launcher settings. To open settings, left-click the launcher icon in the system tray and select Settings.

SecureAnyBox5 Launcher context menu

In the launcher settings, you can edit web extension settings, change the location of WinSCP, MikroTik WinBox, and PuTTY, set the Remote Desktop window size, and adjust clipboard or printer settings.

SecureAnyBox5 Launcher Settings
Approval of exceptions for SSL Certificates

Suppose the SecureAnyBox5 server uses an SSL certificate not trusted by Windows. In that case, the launcher will display a warning when connecting, which may be due to a non-trusted authority or a self-signed certificate.

Certificate exception

Check with your administrator to verify the certificate. If valid, accept it by clicking I have verified that this is a valid certificate and then Accept. To avoid future warnings, select Accept this certificate permanently.

If this warning suddenly appears, and you have used Launcher before, it is very likely a security incident. In this case, do not approve the exception and contact your administrator!

Previously accepted exceptions can be reset in the Launcher settings in the Web Extension section, by clicking the Reset certificate exceptions button. It will remove only exceptions accepted in SecureAnyBox5 Launcher. Other exceptions for certificates that you may have approved on your system or browsers will remain.

Launcher configuration enforced by Windows registry

Some launcher settings can be enforced via the Windows registry (HKLM).
When starting, settings are loaded from the launcher and then from the registry; the last loaded value is used.
You can store all web extension settings and the RDP gateway in the registry.
Launcher settings are in HKEY_LOCAL_MACHINE\SOFTWARE\TDP\SecureAnyBox Launcher. For a list of keys and recommended values, download the README file.
 Download Launcher registry README
You can also download and edit a registry example file, then run it.
 Download registry example file

SecureAnyBox5 browser extensions for Mozilla Firefox and Google Chrome

SecureAnyBox5 browser extensions make it easy to log in to websites using stored accounts.
If the extension recognises login fields, it offers to fill in credentials from SecureAnyBox5. You can also create accounts directly from the website.
The extension communicates with the launcher, which talks to the SecureAnyBox5 server. You must have SecureAnyBox5 Launcher (v2.0.0.x or higher) installed.

Installation of browser extension
Mozilla Firefox

Download Firefox extension to your computer and drag and drop it to Firefox window.

Add FF extension

Confirm installation of the extension by clicking the Add button.

Extension added

SecureAnyBox5 extension for Firefox is sucessfully installed.

Google Chrome

On the Downloads page, click Chrome Extension for SecureAnyBox5 and install it from the Chrome Web Store.

Work with SecureAnyBox5 browser extensions

When you visit a login page, the SecureAnyBox5 vault icon (vault icon) appears in the password field (e.g., at paypal.com).

vault icon at the Paypal page

Click the vault icon to open a login window and log in to SecureAnyBox5. The launcher remembers your login until you restart, log out, or the session times out.

Login window

Note: When you use the extension for the first time, you may first see the SecureAnyBox5Server Address window. Use the same address you use to access the SecureAnyBox5 web interface.

Enter SecureAnyBox5 Address

If KeyShield SSO is configured and you are logged in, authentication is automatic.

If you have two-factor authentication, you will be prompted for the second factor after login.

2FA in extension

After logging in, a window appears with a menu of records that you can use to log in to the website. All relevant accounts from all accessible Safe Boxes are shown.

Select record to use for login

Accounts are ranked by relevance based on SecureAnyBox5 data. The default search uses URLs in the Address and Login Site fields. If an account lacks a URL, you can search manually by entering a term (e.g., name, description) in the Find field.
After selecting an account (double-click, press Enter, or select and click OK), you are prompted for the Access Code.
The launcher can temporarily cache the Access Code, so you may not need to enter it repeatedly.

Enter the Access Code

After entering a valid Access Code, the launcher fills in the selected credentials in the login fields.

Context menu

If login is multi-step (e.g., Google) or the password field is non-standard, use the context menu instead of the icon. To show the context menu, right-click in the username or password field to open the menu.

Under the SecureAnyBox5 section, the Fill username, Fill password options are available (in both cases, the record selection dialog will be displayed). If an entry has already been used on this page, additional options are available: “Enter username for…” and “Enter password for…”

Extension context menu
Add account

You can create a new account from the website using the context menu, without using the SecureAnyBox5 web interface.
Click Add account in the menu to open a form with pre-filled Name, Address, and Login Site.

Add account form

In Create in Safe Box, select the Safe Box for the new account by clicking the button with three dots.
Enter the username in Username.
Enter the password in Password and Repeat password. You can generate a password.
Choose from two preset modes: Very strong (all characters) or Strong (no special/easily interchangeable characters).
To meet specific requirements (length, numbers, special characters), create a custom rule by clicking the gear button (gear icon) next to Generate.

Custom password requirement settings

When all values are set, save the account by clicking OK. Depending on Access Code settings, you may need to enter it again.

SecureAnyBox5 Manager plugin for Total Commander

The SecureAnyBox5 Manager plugin lets you work with Safe Box data in Total Commander.

Installation

Open the zip file in Total Commander (64-bit). Total Commander detects the plugin and guides you through installation. Confirm all dialogues (Yes/OK).

SecureAnyBox5 Manager plugin for Total Commander installation SecureAnyBox5 Manager plugin for Total Commander installation SecureAnyBox5 Manager plugin for Total Commander installation SecureAnyBox5 Manager plugin for Total Commander installation
Configuration

After installing the plugin, SecureAnyBox5 appears as a Network Neighbourhood place. To open it for the first time, enter the SecureAnyBox5 server address and login info. Next time, you only need the password.

Select "Network Neighborhood" as a disk drive

SecureAnyBox5 Manager plugin for Total Commander configuration

The SecureAnyBox5 directory is now available as Network Neighborhood place.

SecureAnyBox5 Manager plugin for Total Commander configuration

Each time you access the plugin directory, is created new directory named SecureAnyBox5-hh.mm.ss (where hh.mm.ss is the current time).

SecureAnyBox5 Manager plugin for Total Commander configuration

In this directory, you have to create a connection to the SecureAnyBox5 server using the F7 key.
As a first step enter a connection name.

SecureAnyBox5 Manager plugin for Total Commander configuration

In the next step, enter the SecureAnybox URL address. (Address can be obtained from any Safe Box detail from the menu Import… > Copy SecureAnyBox5 address).

SecureAnyBox5 Manager plugin for Total Commander configuration

Next, enter the user name of the user who will connect to the SecureAnyBox5

SecureAnyBox5 Manager plugin for Total Commander configuration

and domain name. If you are using only one domain (the default System domain), you do not have to enter its name.

SecureAnyBox5 Manager plugin for Total Commander configuration

The newly created connection is displayed as a folder.

SecureAnyBox5 Manager plugin for Total Commander configuration

You can view the saved connection details by pressing Alt + Enter.

SecureAnyBox5 Manager plugin for Total Commander configuration

The connection to the server is made by entering the connection folder (a password will be requested). After entering the password, a list of safeboxes is displayed.

SecureAnyBox5 Manager plugin for Total Commander configuration
Shortcut Keys

Enter – Copies a password to the clipboard from your account, secret account, and credit card.

The plugin allows you to edit file or certificate in the appropriate program associated with the specific file type. After saving the modified file, it creates a new version of the file.

Alt+Enter – Displays properties of account, secret account etc.

Account detail

F3 View – Displays the file if the record is File or Certificate.

F4 Edit – Edits a file if the record is File or Certificate.

F5 Copy – Copies the file (s) or certificate (s) from / to SecureAnyBox5. Only file and certificate records can be copied.

F6 Move – Move is not supported.

F7 New Folder – Only in connection overview. Creates a new connection and writes data (connection name, URL, domain and username) to the registry.
The plugin does not create new records.

F8 Delete – Deleting records is not supported.

Deleted records

On the Deleted Records page, you can manage deleted records (Safe Boxes, Groups, Accounts, etc.).
You can permanently remove or restore deleted records.

Deleted records

To permanently remove multiple records, select them and click Remove selected. The button appears only if records are selected. Confirm removal.
To restore, select records and click Restore selected. The button appears only if records are selected.
You can also restore a record to its original location by clicking the restore icon (restore icon) at the end of the row. Confirm restoration.

Audit log

The Audit Log page shows a log of user actions in Safe Boxes, Groups, White Envelopes, and all records. Depending on your role, you may see only your actions or all users’ actions.

Audit log

User can filter displayed actions in the log by entering a text into the search field. Searching is possible above values of the columns IP, User, and Action.
Results of filtering the audit log can export by clicking on the Download button.
The audit log can be refreshed manually by clicking on the Refresh button or automatically by clicking on the Enable autorefresh button. Automatic refresh of the audit log is possible to turn off by clicking on the Disable autorefresh button.

Click Select Safe Box to filter audit log results for a specific Safe Box. After selecting a Safe Box, only its data is shown. To see data for a specific record, click Select record.

All audit log events are specified in an Overview of Audited Events

Reports

Access to Records

The Access to Records report lists all records where the selected user has entered the Access Code to view encrypted values. To run the report, select a user.

In report results, records into which currently logged user don’t have access, won’t be displayed even though the selected user accessed them. To view all records which selected user accessed, use the report with the same name in Audit part.

Report access to Records

In the results, click a record name to open its page in a new tab, where you can view or change encrypted values. If the password has changed, the record is no longer shown for the selected user. Click Refresh to update results.

Access to Safe Box

The Access to Safe Box report lists all records in a selected Safe Box where users have entered the Access Code to view encrypted values.

In this report, Safe Boxes into which currently logged user does not have access, cannot be selected. To see results for any Safe Box (even the private one) within a currently logged user’s domain, use the report with the same name in Audit part.

Report access to Safe Box

In the results, click a record name to open its page in a new tab, where you can view or change encrypted values. If the password has changed, users who accessed the record are no longer shown. Click Refresh to update results.

Watching report

The Watching report shows Safe Box Groups, Safe Boxes, and records you are watching at the selected level.

Watching report

Icons indicate whether watching is set explicitly or inherited from a parent level.

Watch changes Watching of changes is set explicitly for that level. Accesses are not watched.
Watch changes - inherited Watching of changes is inherited from the parent level. Accesses are not watched.
Watch accesses Watching of accesses to encrypted data is set explicitly for that level. Changes are not watched.
Watch changes - inherited Watching of accesses to encrypted data is inherited from the parent level. Changes are not watched.
Watch changesWatch accesses Watching of changes and accesses to encrypted data is set explicitly for that level.
Watch changesWatch accesses - inherited Watching of changes is set explicitly for that level. Watching of accesses to encrypted data is inherited from the parent level.
Watch changes - inheritedWatch accesses Watching of changes is inherited from the parent level. Watching of accesses to encrypted data is set explicitly for that level.
Watch changes - inheritedWatch accesses - inherited Watching of changes and accesses to encrypted data is inherited from the parent level.

If a Safe Box inherits watching from a group, the group will also appear in the report results for that box.

Safe Box inherits watching from Safe Box Group

Permissions

The Permissions report shows the selected user’s permissions for all Safe Boxes, Groups, and the domain root. Results are filtered by your permissions, so you only see items you have access to.
To display results, click Select user and choose a user from the list.

Permissions report results

Icons indicate the level for which permissions are set.

domains icon – Root level of domain
safe group icon – Shared (non-private) Safe Box Group
private safe box group – Private Safe Box Group
safe box – Shared (non-private) Safe Box
private safe box – Private Safe Box

To manage permissions for a level, click its name in the results. The Sharing & Permissions page for that level opens in a new tab, where you can manage permissions.

Permission Templates Assignment

The Permission Templates Assignment report shows all permission templates set for the selected user tag. Results are filtered by your permissions, so you only see templates for items you have access to.
To display results, click Select user tag and choose a tag from the list.

Permission Templates Assignment report results

Icons indicate the level for which permission templates are set.

domains icon – Root level of domain
safe group icon – Shared (non-private) Safe Box Group
private safe box group – Private Safe Box Group
safe box – Shared (non-private) Safe Box
private safe box – Private Safe Box

Passwords Audit

The Passwords Audit report lists all records you can access, calculates password entropy, time to crack, and alerts for duplicate passwords.
To run the report, select a level:

To calculate passwords entropy and other values, SecureAnyBox5 uses password strength estimator nbvcxz. The password strength estimator inspires by password crackers.
Strength estimation accomplishes by running a password through different algorithms and looking for matches in any part of the password on word lists (with fuzzy matching), common dates, common years, spatial patterns, repeating characters, repeating sets of characters, and alphabetic sequences.
Each of these represents a way, how an attacker may try to crack a password.

More information
Dictionaries used to calculate entropy

The calculation of the password entropy will be more accurate if custom password dictionaries added.

We strongly recommend adding a dictionary of the commonly used passwords in your language, a dictionary with names of towns, streets in your area etc. You should also add the default passwords used by your company to the dictionaries.

A password dictionary is usually .txt file with one word per line. Should not find a suitable password dictionary, you can create a dictionary by yourself.
There are two types of password dictionaries:

  • ranked – which are sorted by the frequency of password usage
  • unranked – which can be alphabetically sorted or even unsorted

Password dictionaries need to be added to "/files/dictionaries/" folder

Examples:
You want to add a dictionary with names of cities and streets near you. All names are text file, each one on a single line.
In that case, the dictionary is unranked (does not matter if names are alphabetically ordered or not). Please add the dictionary to unranked folder in the dictionaries folder (e.g., "C:\\SecureAnyBox\files\dictionaries\unranked\").
You want to add a dictionary with the most common passwords, ordered by the frequency of password usage.
In that case, the dictionary is ranked. Please add the dictionary to ranked folder in the dictionaries folder (e.g., "C:\\SecureAnyBox\files\dictionaries\ranked\").

When dictionaries added, it is necessary to restart the SecureAnyBox5. After restart, the dictionaries are applied to the calculation of the password entropy.

Report Used Passwords

Results show Safe Box Groups and Boxes at the root. Click the plus icon (expand icon) to see more details for each group or box.
Results for a group or box show the lowest password entropy and the number of duplicate passwords.
You can collapse details for better organization.
Click a record name to open its page and change the password if needed.
Click Run Report to refresh results.

Password entropy

Password entropy measures how unpredictable a password is. Higher values are better. SecureAnyBox5 recognizes four security levels based on entropy.

Password security min. max. Description
really bad error 0 20 password should be changed immediately
unsatisfactory warning 20 35 password does not meet security standards, should be changed
satisfactory 35 50 password meets security standards, but it can be better
really good success 50 password is really secure
Time to crack online/offline

SecureAnyBox5 estimates how long it would take to crack your password online and offline. Longer, more unpredictable passwords are better.

Duplicity

SecureAnyBox5 checks for duplicate passwords. If duplicates exist, the number is shown. For security, change duplicate passwords to unique ones.
If there are five or fewer duplicates, a warning icon (warning icon) appears. If more than 6, an error icon (error icon) appears.
Click the button (button to show records) to see records with the same password.

Last password change

Shows the date and time when the password was last changed.

Time since change

Shows how long it has been since the last password change. If it has been two years or more, a warning icon (warning icon) appears.

Search for password

The Search for password report lets you find records with a specific password. Enter the password in the search field, then click the search button (search button) or press Enter. Click the eye button (eye button) to view the entered password.

After entering the Access Code, SecureAnyBox5 decrypts all accessible passwords, compares them to the search term, and displays matching records. Password entropy is shown next to the search field. More about entropy…

report Search for Password

Compliance

The Compliance report checks if stored passwords meet security requirements.
To run the report, create or open a scope. After opening, enter the Access Code. SecureAnyBox5 runs the report. You can filter results in the table header.

You can save the scope for later. From the report, you can generate PDF protocols or get raw data in xlsx format.

Audit

The audit is part of SecureAnyBox5, available only to users with the Auditor role. Auditors have access to three reports and the audit log. Each auditor can audit within their domain, except System domain auditors, who can audit all domains.

Access to Records

The Access to Records report lists all records where the selected user has entered the Access Code to view encrypted values. To run the report, select a user.

Report Access to Records

In the results, the records you can access are blue. Click to open the record page in a new tab. If the name is black, you don’t have access. If crossed out, the record is deleted but can be restored.
If the password has changed, the record is no longer shown for the selected user. Click Refresh to update results.

Access to Safe Box

The Access to Safe Box report lists all records in a selected Safe Box where users have entered the Access Code to view encrypted values.

Report Access to Safe Box

In the results, the records you can access are blue. Click to open the record page in a new tab. If the name is black, you don’t have access. If crossed out, the record is deleted but can be restored.
If the password has changed, the record is no longer shown for the selected user. Click Refresh to update results.

Permissions

The Permissions report shows the selected user’s permissions for all Safe Boxes, Groups, and the domain root. Unlike the regular report, results are not filtered by your permissions. You see all permissions, even for items you can’t access.
To display results, click Select user and choose a user from the list.

Permissions report' results

The following icons are used to distinguish the level for which permissions set:

domains icon – Root level of domain
safe group icon – Shared (non-private) Safe Box Group
private safe box group – Private Safe Box Group
safe box – Shared (non-private) Safe Box
private safe box – Private Safe Box

To manage permissions for a level, click its name in the search results. The Sharing & Permissions page for that level opens in a new tab, where you can manage permissions for other users.

Permission Templates Assignment

The Permission Templates Assignment report shows all permission templates set for the selected user tag. Unlike the regular report, results are not filtered by your permissions. You see all templates, even for items you can’t access.
To display results, click Select user tag and choose a tag from the list.

Permission Templates Assignment audit report results

Icons indicate the level for which permissions are set.

domains icon – Root level of domain
safe group icon – Shared (non-private) Safe Box Group
private safe box group – Private Safe Box Group
safe box – Shared (non-private) Safe Box
private safe box – Private Safe Box

Audit Log

The Audit Log page shows a log of user actions in Safe Boxes and the SecureAnyBox application. Results are filtered by your domain, except for System domain auditors, who see all domains.

Audit log

You can filter actions in the Audit Log by clicking SecureAnyBox logs, Authentication logs, User Management logs, or Safe Boxes logs. Click All logs to remove the filter.

AuditlogParagraph2

If enabled, auditors can archive the audit log by clicking Archive log records and confirming.

All audit log events are specified in an Overview of Audited Events

confirm archiving of audit records

SecureAnyBox

Stations

The Stations page lets you manage registered stations. After loading, you see a table of stations for the selected Agent Configuration.

Stations page

To change the Agent Configuration, click Select Config and choose a configuration. The list updates to show stations for the selected configuration.
You can sort stations by any column. Click a column header to sort. You can also add more columns (IP address, Timezone, Default User, Station Registration) via the Agent Configuration page.

Registered stations can be filtered by the date of registration and last access. User with role SecureAnyBox Administrator from System domain can also see (and delete) inaccessible stations. Stations are inaccessible if the Agent Configuration with which the stations are registered is deleted.

As the IP address of the station displayed the address which station had during the last registration. IP addresses are not unique.

Register station

Stations have to be registered to get passwords for them. Once the station is registered, it is possible to get the password by clicking on a row in a table of stations. After clicking on a row with the registered station, the Get Password page will load with prefilled values according to the values specified in the registered station.

Stations can be registered by the SecureAnyBox5 Agent or manually. After installing and configuring the Agent, it checks if the configuration matches the server. If so, the station registers automatically (may take 10 minutes). If the station can’t access the server, register it manually.
To register manually, click Register station and wait for the form.
If the station name changes, reconfigure the Agent. The new name will be registered, and the old registration can be deleted manually.

Stations form
Agent Configuration

In this field, select the agent configuration, which is the same as the configuration of a SecureAnyBox Agent installed on a registered computer.
Selection of incorrect configuration leads to generated passwords that do not work.
Selected agent configuration is prefilled into this field. It can be changed by clicking on the folder icon () and selecting another one from a list of agent configurations.

Platform

Select the platform (operating system) of a registered station.
The platform is important for identifying the username of an administrator, for whom a password will be generated. Settings of the agent configuration limit the selection of platforms.

Station Name

Station name has to be in a format selected in the agent configuration.
NETBIOS = use NETBIOS station name.
Fully Qualified DN = use full Active Directory station name with the domain (e.g., STATION1.domain.local).
SID = use station unique SID (e.g., S-1-5-21-3623811015-3361044348-30300820-1013).

Entered IP Address

IP address of the station entered by the user

Time Zone

Select a time zone which is set on the registered station. The timezone is used to define the station’s actual time compared to the server’s actual time and timezone.
For example, if the server has set timezone as "(GMT) Dublin, Edinburgh, Lisbon, London", and the station has set timezone as "(GMT -08:00) Pacific Time (US & Canada)". The password for this station will be generated for a date and time which is about 8 hours lower than the actual time of the server.

Edit station

Only users with the role SecureAnyBox Admin can edit stations.

To edit a station, click the edit icon (edit icon) at the end of the row. Edit the timezone and IP address as needed.

Edit Station form

Delete station

Only users with the role SecureAnyBox Admin can delete stations.

To delete a station, click the cross icon (cross icon) at the end of the row. Confirm deletion.

It is also possible to delete multiple stations at the same time. To select a station to delete, check the checkbox in the first column. After the selection is complete, click the Delete selected button.

Delete station

Get Password

On the Get Password page, you can obtain a password for a registered station. SecureAnyBox5 Agent must be installed on the station. More about SecureAnyBox5 Agents…

Get password

To obtain the station’s password, please follow these steps:

If you click on a registered station for which you want to get a password on the Stations page, all values will be automatically prefilled.

Select the Agent Configuration which is the same as the configuration of SecureAnyBox5 Agent installed on the station.

Select an operating system of the station. Settings of the Agent Configuration limit selection of operating systems.

Please check and eventually correct the local date. The time automatically sets according to server time.

Enter the station’s name. The name has to be in a format specified in the Agent Configuration.
NETBIOS = use NETBIOS station name.
Fully Qualified DN = use full Active Directory station name with the domain (e.g.,STATION1.domain.local).
SID = use station unique SID (e.g.,S-1-5-21-3623811015-3361044348-30300820-1013).

To obtain a password, the station has to be registered. If a station with entered name is not registered, the user will be prompted to register the station before obtaining a password.

Check the User for whom the password will work. The user is pre-filled according to settings in the Agent Configuration.

Check and eventually correct a timezone set on the station. Depending on the previously set Local Date and Time and selected timezone, the Station Date and Time set.

Click on the Show password button.

After clicking on the Show password button, the Station password page loaded.

Station password

After 60 seconds you will be redirected back to the Get Password page.

Downloads

On the Downloads page, you can download SecureAnyBox5 Agent, its configuration, and SecureAnyBox5 Launcher.

Downloads page
SecureAnyBox5 Launcher

SecureAnyBox5 Launcher is a Windows application (.NET Framework 4.5.2 or higher required) delivered as an msi package. After installation, it runs in the system tray and registers the sab:// URI scheme for SecureAnyBox5 web links.
After the Agent registers the station, its IP address is also registered. Click the station IP on the Stations page to launch Remote Desktop and connect.
The launcher is also used in Safe Boxes. More information…

SecureAnyBox5 Agent

SecureAnyBox5 Agent is a system service/daemon that enables login to the station using a password from SecureAnyBox5. The password can be obtained from the Get Password page or a Ticket. The Agent works autonomously, even without a server connection. If connected, it registers the station automatically.

If the SecureAnyBox5 Agent sets a password for the default user of the station and has an online configuration, the SecureAnyBox5 Agent must first register the station on the server and only then set the password of the default user in the registry.

SABAgentDownloadInfo

SecureAnyBox5 Agent installation steps:

SABAgentInstallationInfo

Tickets

Tickets are intended for sharing access to retrieve passwords for stations. Once a ticket is created, it can be shared with anyone (even people without access to SecureAnyBox). Tickets can obtain passwords only for registered stations in SecureAnyBox.
Sharing a ticket is a convenient way to grant access to registered station passwords for a limited time. For example, tickets can be shared with external technicians. Shared access to passwords can be limited according to the ticket’s settings.
If only the Agent Configuration is selected, the ticket can be used to get passwords for all registered stations with the same Agent Configuration. If the Agent OS is also selected, the ticket can be used to get passwords for all registered stations that match both the selected Agent Configuration and operating system. If a station name is specified as well, the ticket grants access to that single station only.
The ticket’s validity is time-bound: the recipient can retrieve passwords only between the dates and times specified in fields Valid from and Valid until.
You can further restrict access with Valid Time Intervals, which define specific daily windows when the ticket is usable. These intervals apply within the overall Valid from/Valid until range.
It is possible to restrict the usage of tickets by setting subnets. When a ticket has one or more subnets set, a password can be obtained from the ticket only if the device’s subnet matches one of those set in the ticket.

Create ticket

To create a ticket, click New Ticket. Fill in the form and click OK to confirm.

Ticket form

When saving, a unique ticket identifier is generated and displayed.

Ticket message
Agent Configuration

Select the Agent Configuration. Agent configuration must be the same as the configuration of the SecureAnyBox Agent installed on the station for which the ticket will be created.
In case a ticket is saved with the selected Agent Configuration only, it will be possible to get the password for all the stations where the SecureAnyBox Agent with the same configuration is installed.

Description

The description should characterise the purpose of the ticket.
For example, if the ticket will be used by external workers, in the description, it can be specified, for who and why, the ticket was created.
In the case that the ticket will save without any description, and the description will be generated. The result of generating the description will be "Ticket {number of the ticket}" (e.g. Ticket 1, Ticket 2 and so on).

Agent OS

Select the operating system. Settings of the Agent Configuration limit the selection of the operating systems.
Selecting the operating system is optional.
When the operating system is selected, through the ticket is possible to get passwords only for stations with the same OS.
If the operating system is not selected, then the last selected platform will be used while generating a password for the station.

Station Name

Name of the registered station, for which the ticket will be created. Station name must be in the same format as is specified in the Agent Configuration.
NETBIOS = use NETBIOS station name.
Fully Qualified DN = use full Active Directory station name with the domain (e.g., STATION1.domain.local).
SID = use station unique SID (e.g., S-1-5-21-3623811015-3361044348-30300820-1013).
If the station name not specified in a saved ticket, it will be possible to specify the name while getting a password for the stations. Through such a ticket, it will be possible to get the password for each registered station with the same Agent Configuration and operating system as are selected in the ticket.

User

The user for whom the password will be generated. The user field has a prefilled value based on values specified for the selected operating system in the Agent Configuration.

Valid From

Date and time from which the ticket is valid, and based on the ticket, it is possible to get a password.

Valid Until

Date and time until which the ticket is valid, and based on the ticket, it is possible to get a password.

Enable Time Constraints

Enable setting specific time windows for ticket validity (e.g., during business hours).

Valid Time Intervals

Define one or more time intervals when the ticket is valid. Click the + button to add an interval. Each interval has a description, from/to times, and a specified time zone. Interval can be edited by clicking the pencil button and deleted with the bin button.

Valid Subnets

Ticket is only valid when accessed from specified subnets or addresses. If no subnet or address is listed, ticket access not restricted by client address.
Subnets can be entered in three formats – standalone IP address, IP address/subnet mask where subnet mask can be specified in IPv4 format or in CIDR notation formate.g.: 172.22.38.19 or 172.22.38.1/255.255.255.0 or 172.22.38.1/24
The IP address must be in IPv4 format. IPv6 not supported.

Tickets are valid only from specified subnets or addresses. If none are listed, access is unrestricted.
Subnets can be entered as a single IP, IP/subnet mask (IPv4 or CIDR), e.g., 172.22.38.19, 172.22.38.1/255.255.255.0, or 172.22.38.1/24.
Only IPv4 is supported.

Enabled

If the ticket is not enabled, it can not be used.

Create/edit valid time interval
valid time interval form
Description

Enter description of time interval. The default value is "all day".

From

Enter the time from which the ticket will be valid. Time has to be in 24-hour format and entered as h:mm.
If the start time (From) is later than the end time (To), the interval spans midnight: it runs from the start time on the first day to the end time on the following day.

To

Enter the time to which the ticket will be valid. Time has to be in 24-hour format and entered as h:mm.
If the start time (From) is later than the end time (To), the interval spans midnight: it runs from the start time on the first day to the end time on the following day.

Time Zone

Select the timezone for the specified time interval. You can choose the SecureAnyBox server’s timezone, the timezone of the SecureAnyBox Agent (time zone is saved when the SecureAnyBox Agent registers) or pick a specific one.

Edit ticket

To edit a ticket, click its row in the table. An edit form appears.

Edit ticket

All values except Agent Configuration can be changed. After editing, click OK to confirm.

Share ticket

To share a ticket, click the blue arrow icon (blue arrow) at the end of the row. A share form appears.

Share ticket

Tickets can be shared by URL or QR code. The special ticket page is accessible without authentication, so you can share it with people who don’t have SecureAnyBox5 accounts.

Show password

To get a password from a ticket, fill in all required fields. If all is set, the password is displayed automatically.

Ticket password

Audit log

The Audit Log page displays an audit protocol for obtaining passwords for stations and using tickets. Depending on your role, you may see only your actions or all users’ actions.

Audit log
AuditlogParagraph2

Agent Configuration

On the Agent Configuration page, you can set general settings for SecureAnyBox5, such as columns on the Stations page or Registration interface, Agent Configuration, and LDAP Agent. You can also change the configuration password and download the configuration file.

Only users with a role SecureAnyBox Manager or Administrator have access on this page.

Agent Configuration page

General

You can configure which columns display at the Stations page and an alternative interface, which is only intended for registration of stations. If the alternative interface is enabled and set, the registration interface hostname and HTTPS port are exported into the SecureAnyBox Agent configuration.

We recommend to enable and set registration interface because the registration of SecureAnyBox5 Agents will not be affected by any changes (e.g., of hostname, address, port) in the configuration of SecureAnyBox5 server.

General config form
Stations table

Optional registered stations table columns definition

IP Address

Show IP Address column

Time Zone

Show Time Zone column

Default User

Show Default User column

Station Registration

Show Station Registration date column

Registration/Web interface

SecureAnyBox5 server station registration web interface/API configuration.

Enable Registration Interface

Enable standalone HTTPS interface used only for station registration

IP Address

SecureAnyBox station registration (HTTPS) interface IP address.

HTTPS Port

SecureAnyBox station registration (HTTPS) interface port.

HTTPS Keystore

PKCS #12 file with a private key and corresponding certificates used for HTTPS web interface. You can create a self-signed certificate file by clicking the Create self-signed SSL certificate button in the bottom left corner of this form.

HTTPS Keystore Password

HTTPS key store password. It is used to read HTTPS keys and certificates. If you create the HTTPS keystore file by clicking the Create self-signed SSL certificate button, the keystore password is entered automatically.

Hostnames

List of hostnames for SecureAnyBox station registration interface (HTTP).

Validate if HTPPS certificate is successfully imported on the station

Suppose the HTTPS keystore certificate is trusted on your Linux station. In that case, you can verify it in the terminal using this command:

python -c ‘import urllib2; import sys; resp = urllib2.urlopen("https://your.secureanyboxserveraddress.com"); rcode = resp.getcode(); body = resp.read(); print rcode; print "; print body;’

If validation is successful, the first row of the response is code 200.

If validation fails, an error is displayed.

urllib2.URLError:

If urllib2 not found

python ––version

Urllib2 is a built-in package of Python 2.×.×. To be able to run urllib2, it is necessary to have Python 2.×.x (recommended 2.7.18) installed properly. Some distributions of Linux may not have full version of Python 2.7.x installed. Try re-installing it.

wget https://www.python.org/ftp/python/2.7.18/Python-2.7.18.tgz

sudo tar xzf Python-2.7.18.tgz

cd Python-2.7.18/

sudo ./configure

sudo make altinstall

Agent Configuration

To generate passwords for stations, each station must have SecureAnyBox Agent installed with a proper configuration. In the Agent configuration, you can configure for which platforms can be used, a password pattern, a password seed base, for which user or user group the password will be generated.
After each modification of Agent Configuration, the SecureAnyBox Agent (respectively Agent Configuration) installed on stations must be updated or generated passwords might not work.

Agent Configuration

Managing and Using Agent Configurations

For each Agent Configuration, you can set which users can manage or use it in SecureAnyBox5.

Agent Configuration Management

Users who can manage an Agent Configuration can view, edit, or delete it on the Agent Configuration page.
In the form, you can check Manageable by all SecureAnyBox Admins. If unchecked, only SecureAnyBox Admins from the assigned domain can manage it.
When created, an Agent Configuration is assigned to the current user’s domain. You can change the assignment in the domain form in the admin interface.

Using Agent Configurations

Users who can use an Agent Configuration can get passwords and use tickets for stations with that configuration. SecureAnyBox Admins can also create tickets for it.
By default, all users in the assigned domain can use the configuration.
You can expand or limit usage by setting permitted users. If any are set, only they can use the configuration.

Add Agent Configuration

To add a new configuration, click add Configuration and wait for the form. After setting values, click OK. To use the new configuration, SecureAnyBox5 must be restarted.

Agent Configuration form
Name

Please enter SecureAnyBox Agent Configuration Name. Configuration name must start with a letter and contain only letters, numbers and underscores.

Password pattern

Password pattern which will be used to generate passwords for stations.
Each letter in the pattern corresponds to a letter in the generated password.
See examples of the password pattern
Characters allowed in the password pattern and their meaning:
v – lowercase vowel a,e,i,o,u,y
V – mixed case vowel (A,E,I,O,U,Y,a,e,i,o,u,y)
Z – upper case vowel
c – lowercase consonant (b,c,d,f,g,h,j,k,l,m,n,p,q,r,s,t,v,w,×,z)
C – mixed case consonant
z – upper case consonant
l – any alphabet character (vowel or consonant) – lowercase
A – any alphabet character – mixed case
u – upper case alphabet
d – digit (0-9)
s – special character (.,@,&,,(,),<,>,_,],[,%,$,#,\,/,?,;,,:)
n – digit or special character
\ – escape character – next character is used as is (e.g., pattern ‘\
‘ outputs ‘-’ in the resulting password)
– any allowed character
1 – character according to Pattern Characters 1 setting
2 – character according to Pattern Characters 2 setting
3 – character according to Pattern Characters 3 setting
Default pattern is CVCVdddCVCCVdC (this might generate passwords such as: wEHe063heFme4p).
For example, you can set a password pattern as ‘\p\a\s\sddddddd’ and this might generate passwords such as ‘pass1762885′ or ‘pass5687412′.

Pattern Characters 1

By setting the Pattern Characters, you can specify a set of characters that will be used or omitted while generating a password.
To specify a set of characters that will be used while generating a password, please enter them into the field without any separator. (e.g., ‘abc ‘). In that case, the generated password will use only the specified characters.
The set of characters that will be omitted while generating a password must begin with ^ character (e.g.,’^0123′). In that case, the generated password will use allowed characters except for specified ones.
For each character which should be generated according to the setting of this set of characters, enter ‘1 ‘into the Password Pattern.

View examples of use of Pattern Characters
Pattern Characters 2

By setting the Pattern Characters, you can specify a set of characters that will be used or omitted while generating a password.
To specify a set of characters that will be used while generating a password, please enter them into the field without any separator. (e.g., ‘abc ‘). In that case, the generated password will use only the specified characters.
The set of characters that will be omitted while generating a password must begin with ^ character (e.g., ‘^0123′). In that case, the generated password will use allowed characters except for specified ones.
For each character which should be generated according to the setting of this set of characters, enter ‘2 ‘into the Password Pattern.

View examples of use of Pattern Characters
Pattern Characters 3

By setting the Pattern Characters, you can specify a set of characters that will be used or omitted while generating a password.
To specify a set of characters that will be used while generating a password, please enter them into the field without any separator. (e.g., ‘abc‘). In that case, the generated password will use only specified characters.
The set of characters that will be omitted while generating a password must begin with ^ character (e.g., ‘^0123‘). In that case, the generated password will use allowed characters except for specified ones.
For each character which should generate according to the setting of this set of characters, enter ‘2‘ into the Password Pattern.

View examples of use of Pattern Characters
Password Seed Base

This is a secret string used as a base to generate a station password. Seed Base should be unique for your configuration and is shared between the server and SecureAnyBox Agent instances. You have to distribute the Seed Base together with the password pattern to all SecureAnyBox Agent-managed stations.

MS Windows

Enable MS Windows platform

Linux

Enable Linux platform

macOS

Enable macOS platform

LDAP

Enable LDAP platform

Configuration Password

Configuration encryption password. If SecureAnyBox configuration is encrypted, you must enter the configuration password to create or edit Agent Configuration successfully.

MS Windows

SecureAnyBox Agent Configuration for Windows Platform

Change password of
Select whether to use the SecureAnyBox5 Agent to set the password for a user, or group of users.
User account
Please enter a username of the station user account, which will be able to login with an obtained password.
User group
Please enter the name of the Windows local group. Unique password will generate for each member of this group.
Station name method
Select a method used to get the station name which is used to compute the password.
NETBIOS = use NETBIOS station name (e.g.,STATION1).
Fully Qualified DN = use full Active Directory station name with domain (e.g.,STATION1.domain.local).
SID = use station unique SID (e.g.,S-1-5-21-3623811015-3361044348-30300820-1013).
Update Default Password
Enable / Disable synchronization with a default user.
When a synchronization is enabled, it is possible to use the Agent Configuration even for users who are automatically logging in to Windows. During the synchronization, the set password will be saved into the station registry.
If the synchronization is disabled, then the automatic login into Windows will fail. How to set default user at your station
Enable / Disable synchronization with a default user.
When synchronization is enabled, it is possible to use the Agent Configuration even for users who are automatically logging in to Windows. During the synchronization, the set password will save into the station registry.
If the synchronization is disabled, then the automatic login into Windows will fail. How to set default user at your station
Online Config
Enable / Disable online configuration of the SecureAnyBox5 Agent.
The online configuration is more secure than offline one, but has some limitations:

Enable / Disable online configuration of the SecureAnyBox5 Agent.
Online configuration is more secure than offline one, but has some limitations:
  • SecureAnyBox5 Agent must be connected to SecureAnyBox5 server
  • SecureAnyBox5 Registration interface must be configured

Linux

SecureAnyBox Agent Configuration for Linux Platform

Change password of
Select whether to use the SecureAnyBox5 Agent to set the password for a user, or group of users.
User account
Please enter a username of the station user account, which will be able to login with an obtained password.
User group
Please enter the name of the local group of users. Unique password will generate for each member of this group.
macOS

SecureAnyBox Agent Configuration for macOS Platform

Change password of
Select whether to use the SecureAnyBox5 Agent to set the password for a user, or group of users.
User account
Please enter a username of the station user account, which will be able to login with an obtained password.
User group
Please enter the name of the local group of users. Unique password will generate for each member of this group.
LDAP

SecureAnyBox Agent Configuration for LDAP Platform

Change password of
Select whether to use the SecureAnyBox5 Agent to set the password for a user, group of users, or default user of the domain.
User Account FDN
Please enter an FDN of the user account, which will be able to login with the obtained password. e.g.,cn=admin,o=org
User group
Please enter the name of LDAP group of users. Unique password will generate for each member of this group. e.g.,cn=Admins,o=org
Permitted Users

You can limit visibility of Agent Configuration by permitting users to whom the Agent Configuration is visible. To set permitted users, please add a domain or a user. If a domain is added, the Agent Configuration is visible for all users from that domain. If a domain or a user is not set, the Agent Configuration is visible to all users.

Domains

If you add a domain, the Agent Configuration will be visible for users from that domain.

Users

If you add a user, the Agent Configuration will be visible for that user.

User Tags

If you add a User tag, the Agent Configuration will be visible for users with this User tag assigned.

Edit configuration

To edit an Agent Configuration, click its name in the list. The details will display.

With any change, it is advisable to note that changes in agent configuration can have severe consequences on the functionality of SecureAnyBox5 agents on registered stations.

Agent Configuration details

To open the edit form, click Edit. You can change all values except the name.
After editing, click OK to confirm. To apply changes, you must update the SecureAnyBox5 configuration.

Copy configuration

To create a similar Agent Configuration, click its name in the list. When details display, click Copy.
Enter a new name, change values as needed, and click OK to confirm.

Due to security reasons, we strongly recommend changing the Password Seed Base.

To use the new configuration, you must apply changes to the Configuration.

Remove configuration

To remove an Agent Configuration, click its name in the list. When details display, click Remove.
You must confirm removal by applying changes to the SecureAnyBox5 configuration.

LDAP Agent

LDAP Agent holds LDAP server connection settings used for user password changes. Without the LDAP Agent, it is not possible to get passwords for LDAP users.

Agent Configuration page

Add LDAP Agent

To add a new LDAP Agent configuration, click add LDAP Agent and wait for the form. After setting values, click OK. To use the new LDAP Agent, restart SecureAnyBox5.

LDAP Agent form
Agent ID

Unique agent identifier. Agent ID is used when generating a password for the user from LDAP.

Enabled

Enable/disable this LDAP Agent

Directory service

LDAP server type.

LDAP servers

LDAP server address or addresses for failover (multiple servers with the same replica/mirror).

SecureAnyBox5 mgr account

LDAP User DN used by SecureAnyBox5 to access LDAP, lookup users, change passwords, etc.
Minimum access rights:
entry/object rights – browse
cn – read, compare
objectClass – read, compare
Use ‘Create SecureAnyBox objects’ for NetIQ eDirectory. For other vendors, create the manager user in your directory service console. Some LDAPs (e.g., Active Directory) don’t allow access rights/permissions modification.
e.g., cn=secureanyboxmgr,o=org or cn=secureanyboxmgr,cn=Users,dc=DOMAIN,dc=local

SecureAnyBox Mgr Password

Please enter SecureAnyBox mgr user password.

LDAP search base

The LDAP container is used as the search base for synchronisation. If not set, the search starts at the root.
e.g., o=org or leave empty to search from the root

Search subtree

Uncheck to search only immediate subordinates of the search base.

Dereference aliases

An alias is an entry which points to another object in the namespace – by containing its dn. Searching the entry that an alias entry points to is known as dereferencing an alias.
There are four modes of dereferencing aliases:

LDAP Search Filter
LDAP search filter used during a password change
Default filters:
  • AD – (&(objectCategory=person)(objectClass=user)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))
  • eDirectory – (&(objectClass=person)(!(loginDisabled=true)))
  • generic LDAP – (objectClass=person)
Group membership filter examples:
  • AD: (memberof:1.2.840.113556.1.4.1941:=cn=Group1, OU=groups,DC=domainname)
  • eDirectory: (groupMembership=cn=group1,o=org)

e.g.,(objectClass=person)

Search Page Size

When set to greater than zero, SecureAnyBox5 will use Simple Paged Result extended control to retrieve LDAP search results in pages of a given number of entries. Some LDAP servers have a default server-side limit for the number of entries returned in the single response. For example, Active Directory servers have a default limit of 1000 objects for a single search request. Setting Search Page Size to 1000 or lower will allow SecureAnyBox5 to retrieve more results (than the server limit) using multiple requests. When set to 0 no paging is used and an only single request is used to retrieve all results.
When using embedded LDAP from KeyShield SSO, this value must be set to 0.

Agent Configuration

Please select the Agent Configuration for this LDAP Agent. Selected Agent Configuration must contain settings for the LDAP platform.

Default User Domain

The domain of the default user is necessary for identifying the default user while generating a password. The default user domain must be the same as set in the workstation registry; otherwise, logging in as the default user via SecureAnyBox Agent will not be possible.
e.g., Default user on a station is set to "COMPANY/user1" – the default user domain is "COMPANY".
This field is available only if Active Directory is set as the LDAP directory service.

User id attribute

LDAP attribute used for user lookup during authentication. Available only if Active Directory is set as the LDAP service.

Edit LDAP Agent

To edit an LDAP Agent, click its name in the list. The details will display.

LDAP Agent details

To open the edit form, click Edit. You can change all values except the name.
After editing, click OK to confirm. To apply changes, update the SecureAnyBox5 configuration.

Copy LDAP Agent

To create a similar LDAP Agent, click its name in the list. When details display, click Copy.
Enter a new Agent ID, change values as needed, and click OK to confirm.
To use the new LDAP Agent, apply changes in the Configuration.

Remove LDAP Agent

To remove an LDAP Agent, click its name in the list. When details display, click Remove.
You must confirm removal by applying changes in the SecureAnyBox5 configuration.

Execute LDAP Agent

Executing an LDAP Agent changes passwords. Which passwords are changed depends on the Agent Configuration.

The Agent Configuration can be set to change a password of:

If any of users to whom should be changed password is set as SecureAnyBox5 mgr for any LDAP connector or LDAP Agent, then the password of that user will not be changed.

To execute the LDAP Agent, click its name in the Agent Configurations list. When details display, click Execute.

Administration interface

Configuration

The SecureAnyBox5 configuration is divided into sections. Each can be edited independently. To change a section, click edit at the top.

Edit config section

After clicking edit, the section’s form displays. At the bottom are three buttons: Test, OK, and Cancel.

Config buttons

After making changes, you can test values by clicking Test. If the test is successful, click OK to confirm.
Changed sections are marked with a blue checkmark.

Blue check mark

To apply configuration changes, restart the application by clicking Apply. To discard changes, click Revert.

Apply config changes

Summary

Click the Configuration button in the menu to open the Summary page. Here, you see configured LDAP connectors and server messages.
Each LDAP connector shows its status (whether communication is working). Click a connector’s name to view its settings.

Config summary

On the Summary page, you can also download the configuration.

General/Web interface

General SecureAnyBox server configuration and Web interface/API configuration.

General/Web interface
Web Address

SecureAnyBox web (HTTP) interface address. At this address is the SecureAnyBox web interface accessible from the local network.

Web Port

SecureAnyBox web interface HTTP port.

HTTP Mode

Web interface HTTP (plaintext) mode. Possible values: enabled (default), disabled, API (only JSON/XML API is accessible). When HTTP mode is disabled, it is possible to redirect to HTTPS mode.

HTTPS Port

SecureAnyBox web interface HTTPS port.

HTTPS Keystore

PKCS #12 file with the private key and corresponding certificates used for HTTPS web interface. You can create a self-signed certificate file by clicking on the Create self-signed SSL certificate button in the bottom left corner of this form.

SSL certificate form
Alias

The certificate alias is used as an alias inside a keystore and as a filename for a stored encrypted PKCS12 file.

Common Name

The common name of the certificate represents the hostname protected by the SSL certificate. The certificate is valid only if the hostname is the same as the common certificate name.
Use the domain name of your server as the common name of the certificate. If the server is available on the Internet using the "https://secureanybox.domain.com:8996" URL, use "secureanybox.domain.com" as a common name.

Validity

Enter the certificate validity in years (1-10).

RSA Key Size

The RSA key size indicates the length of the encryption key of the corresponding encryption algorithm. The RSA key size is given in bits. The minimum recommended RSA key size is 2048 bits.

Organizational Unit

Organization unit name used in certificate subject – leave empty if not needed.

Organization

Organization name used in certificate subject – leave empty if not needed.

Country Code

Country code used in certificate subject – leave empty if not needed.

Alternative Subject

Alternative Subject Names – additional domain names or IP addresses used to access SecureAnyBox SSL interface

HTTPS Keystore Password

HTTPS keystore password. It is used to read HTTPS keys and certificates.

Hostnames

SecureAnyBox web (HTTP) interface hostnames. Setting multiple hostnames is possible. All hostnames specified in the hosts files on stations must be specified here. Otherwise, the user with an unknown hostname cannot access SecureAnyBox.

App Path

Base application URL. For example, if you set the app path to ‘/sab’, SecureAnyBox will be accessible at http://server:port/sab/. The new app path will apply after restarting the SecureAnyBox.

App URL

App URL. At this address is the SecureAnyBox web interface accessible for users. The application URL must be set for proper functionality of SecureAnyBox Launcher and SecureAnyBox Agent.

Remember Last Location

Remembering of the last visited location (page) can be set for user or combination of user and station. If not turned off, after user logs in SecureAnyBox5, the last visited page automatically loaded.
Available options:

  • Off – Don’t remember the last page
  • Remember for user – Remember last visited page or Safe Box for given user
  • Remember for user and station key – Remember last visited page or Safe Box for given user and station key
Trusted Proxy Servers

When SecureAnyBox is behind a reverse proxy server, it is necessary to enter the trusted proxy IP address (or multiple addresses) to enable KeyShield SSO integration.

Disable CSP For Login.Page

The server will not send the Content-Security-Policy header for the login page. This feature can be used, for example, to allow third-party SSO solutions (like NetIQ NAS) to use a custom login page or insert inline scripts.

HTTPS Public Key API Mode
The HTTPS public key API mode settings. This API is used in the Firefox extension to check that the web browser’s connection to the SecureAnyBox5 server is not eavesdropped on by an intermediate proxy server (Man In The Middle attack). * Disabled – API does not return the public HTTPS key, can not use Firefox extension for checking Man In The Middle attacks. * SecureAnyBox5 server key – Users access the SecureAnyBox5 server’s HTTPS interface directly, and the API will return the SecureAnyBoxServer public HTTPS key. * Reverse Proxy Key – Users access the SecureAnyBox5 server through the HTTPS interface of the reverse proxy server. The API will return the public HTTPS key of the reverse proxy server. In this case, you still need to upload the Reverse Proxy HTTPS keystore and enter the password for that file.
Reverse Proxy HTTPS Keystore

PKCS # 12 file that contains the private key and corresponding certificate for the HTTPS reverse proxy server interface. This file must be uploaded if users access the SecureAnyBox server through the HTTPS interface of a reverse proxy server and want to use the public HTTPS key API.

Proxy Server’S HTTPS Keystore Password

Reverse proxy server HTTPS key store password. Used to read the public key of the reverse proxy server. The public key is available through the HTTPS public key API.

User interface
Language

Please select the default language of the SecureAnyBox web interface. This language will be automatically preset for all users. Each user can change the language in the User Preferences.

User Help Mode

This setting allows limiting visibility of documentation link and help tours. These settings apply to all users (Administrator and User Manager excluded).
Options:

  • Visible – help tours and link to the documentation are visible to all users
  • Disable help tours autorun – disable autorun of help tours for users (Administrator and User Manager excluded)
  • Hide help tours – hide button for starting the help tour
  • Hidden – help tours and link to the documentation are hidden to all users

Logging

Diagnostic log configuration. You can set the log level for specific parts of SecureAnyBox or a count of lines loaded into the browser into the current log view.
It is also possible to configure audit log archiving. Archived audit log records will be stored in separate files on the server. Once records are archived, they cannot be viewed in SecureAnyBox.

Logging form
Default Log Level

Default log level. If the log level for a specific part is not set, the default log level is used.

Core Log Level

Core engine log level

Services Log Level

Internal SecureAnyBox services and database log level

API Log Level

API calls log level

Authentication Log Level

Authentication and authorization log level

KeyShield SSO Log Level

KeyShield SSO authentication and WebSockets log level

Log Browser Line Limit

Limits the number of lines loaded into the browser in the current log view.

SIEM Syslog

Configure settings of the connection between SecureAnyBox and Syslog server. You can also set syslog facility, event source and log level of records sent to the syslog server. You can establish multiple syslog connections — for each syslog server, one for audit log and a second for diagnostic log and so on.

If you send audit messages to the SIEM syslog server, you can choose from two formats in which to send the messages:

AuditFormatExamples
Syslog form
ID

Please enter the unique ID of the connection with a Syslog server

Enabled

Enable/disable this connection.

Server Address

Syslog server address. The server address can be entered as an IP address (e.g., "172.22.13.1") or as a domain name (e.g., "syslog.tdp.cz")

Port

Syslog server port.

Syslog Facility

Desired facility value for log messages sent to syslog. A facility code is used to specify the type of program that is logging the message. Messages with different facilities may be handled differently.

Event Source

Select which records sent to the syslog target.
Options:

  • Audit log
  • Diagnostic log
Audit Record Format

Please, select an audit record format (CSV or CEF) sent to the syslog target.
Records in CSV (Comma-separated values) contains the same information as records in the Audit log of application.
Records in CEF (Common Event Format) contains the most relevant event information, making it easy for event consumers to parse and use them. CEF format of records can be more detailed.
Examples of audit log in both formats are in the documentation.

Please, select an audit record format (CSV or CEF) sent to the syslog target.
Records in CSV (Comma-separated values) contains the same information as records in the Audit log of application.
Records in CEF (Common Event Format) contains the most relevant event information, making it easy for event consumers to parse and use them. CEF format of records can be more detailed.

Examples:

  • CSV format

Aug 7 10:27:43 172.22.78.100 [SecureAnyBox-audit] "SWB","172.22.100.105","System\\admin","GET PASSWORD",TDPPRG,kiosek,DomAgent
Aug 7 10:27:58 172.22.78.100 [SecureAnyBox-audit] "SAFE","172.22.100.105","System\\admin","GET PASSWORD",Firm,"Cisco ASR 1006 Router"
Aug 7 10:28:12 172.22.78.100 [SecureAnyBox-audit] "SAFE","172.22.100.105","System\\admin","VIEW ACCOUNT",Firm,"Bank Certificate"

  • CEF format

Aug 7 10:29:34 172.22.78.100 [SecureAnyBox-audit] CEF:0|TDP|SecureAnyBox|4.3.0|SWB.GET_PASSWORD|get password|3|src=172.22.100.105 suser=System\\admin act=GET_PASSWORD station=TDPPRG user=kiosek config=DomAgent
Aug 7 10:29:47 172.22.78.100 [SecureAnyBox-audit] CEF:0|TDP|SecureAnyBox|4.3.0|SAFE.GET_PASSWORD|get password|3|src=172.22.100.105 suser=System\\admin act=GET_PASSWORD safe=Firm rec=Cisco ASR 1006 Router
Aug 7 10:29:58 172.22.78.100 [SecureAnyBox-audit] CEF:0|TDP|SecureAnyBox|4.3.0|SAFE.VIEW_ACCOUNT|view account|3|src=172.22.100.105 suser=System\\admin act=VIEW_ACCOUNT safe=Firm rec=Bank Certificate

Level

This field is visible if the Diagnostic log is selected as the Event source.

Send messages with this or higher log level to syslog. It is possible to set different log levels for messages sent to the syslog and for messages sent to the application log. For records sent to the syslog server, it is not possible to set multiple logging levels for each part of the application, as in the SecureAnyBox diagnostic log. The selected logging level applies to all parts of the application.
To configure the log level of messages sent to the application log, please go to the Logging part of the SecureAnyBox configuration.

Log level Value Log level of sent messages
TRACE 0 TRACE,DEBUG,INFO,WARN,ERROR
DEBUG 1 DEBUG,INFO,WARN,ERROR
INFO 2 INFO,WARN,ERROR
WARN 3 WARN,ERROR
ERROR 4 ERROR
Log All Audit Log Sources

This field is visible if the Audit log is selected as the Event source.

When enabled, all audit log events will be recorded. When disabled, you can specify particular sources for logging.

Audit log sources

This fieldset is visible if the Audit log is selected as the Event source and Log all audit log sources is disabled.

SecureAnybox

Audit log events with the event source (category) SWB will be logged to SIEM

Tickets

Audit-Log-Ereignisse mit der Ereignisquelle (Kategorie) TICKET werden im SIEM protokolliert

Safe Boxes

Audit log events with the event source (category) SAFE will be logged to SIEM

Authentication

Audit log events with the event source (category) AUTH will be logged to SIEM.

User Management

Audit log events with the event source (category) USER_MANAGEMENT will be logged to SIEM

Audit log archiving

Settings of audit log archiving

Audit log archiving form
Enable Archiving

If enabled, an auditor can run the archiving from the audit log page (in the Audit part). During the archiving, older records (than a number of months set below) will be saved in separate files and removed from the database. You will no longer be able to view them from SecureAnyBox5.

Archive Records Older Than X Months

Records older than the specified number of months will be archived (within the range of 1 to 240)

Automatically Archive

Enable automatic archiving of audit log records. The auditor can still start archiving audit log records on the audit log page.

Frequency Of Archiving

Frequency of automatic archiving (daily, weekly, monthly, quarterly, semiannually, yearly)

Archiving Start Day

The day of the week when archiving will start. At a weekly frequency, it will be every week. At a shorter frequency, it will be the selected day in the first week of the period.

Archiving Start Time

Server time in whole hours (within the range of 0 and 23), when archiving of audit records will run.

Users & Security

In the Users and Security tab of Configuration, you can set user and security parameters, such as max login attempts, login ban duration, and password policy.

Users and Security form
User Security

User Authentication and Security configuration

Login Disclaimer

Disclaimer message shown on login page.

Max Login Attempts

User is banned (cannot log into application) after this number of unsuccessful attempts. Set to 0 to turn this feature off.

User Ban Minutes

User is banned (cannot log into application) for this number of minutes.

Session Timeout

Inactivity timeout for user session. After this timeout expires with no user activity, the user will be logged-out.

2FA (Two-Factor Authentication)

Use of second factor (authenticator application) is either optional – enabled by user in the top right menu, or mandatory.

LDAP Login Password Synchronization

SecureAnyBox offers several ways to manage user passwords with LDAP (a directory service for authentication):
1. Synchronize from LDAP to SecureAnyBox:
  - SecureAnyBox uses a locally saved copy of your password (cached password).
  - Your password will not update until you enter a new one that matches your LDAP password.
2. LDAP authentication only:
  - Each time you log in, your password is verified directly with the LDAP server (if accessible).
  - This keeps your password synchronized with LDAP.
3. SecureAnyBox authentication only:
  - Only the password stored in SecureAnyBox is used.
  - Your password is not synchronized with LDAP.
Choose the option that best fits your organization’s security and synchronization needs.

Enable Login Password Policy

Enabling the login password policy allows you to set minimum password requirements – minimum length, minimum entropy, minimum number of uppercase or lowercase letters, and so on.

Login Password Policy

Login password policy determines minimum requirements for the login password.

This fields are displayed only if the Enable Login Password Policy field is checked.

Minimum Length

Minimum length of the login password.

Uppercase Letters

Minimum number of uppercase letters in login password.

Lowercase Letters

Minimum number of lowercase letters in login password.

Digits

Minimum number of digits in login password.

Special Characters

Minimum number of special characters in the login Password.

Minimum Entropy

Value of the minimum allowed entropy of login password. The value of password entropy shows how unpredictable and strong the password is (the higher value the better.)

  • 0 – 20 – password is very weak
  • 20 – 35 – password is weak
  • 35 – 40 – password is good
  • 40 – 50 – password is strong
  • 50 – 256 – password is very strong
Management of users and domains

Permissions to manage users and domains

Allow Management Of Visible Domains

If not allowed, user manager from other than the System domain can only manage its domain. If allowed, it can manage all visible domains.

Send Invitation Email To New Users

After manually creating a user who does not have a password, send this user an invitation email with a link to set the password.

Displaying full names of users

Displaying full names of users form
Preference for selecting a full name

Settings of preferences for selecting the full name of users. The full name displays in the top right corner of the web interface and is also used in email invitations, email notifications and messages.
If the full name could not be selected according to settings in the first preference, the second preference settings would be tried. In some cases, selecting the full name according to both preferences is unsuccessful. The username will be displayed as the full name.

First Preference

Most preferred settings for how the full name of users will be selected.

If The First Preference Result Is Empty

Settings to apply if the first preference result is empty.

If Both Settings Have Empty Results

The username will be displayed as the user’s full name.

Preferences for selecting a short full name

Settings of preferences for selecting the short full name of users. The short full name displays in lists with users – e.g. in the users management, when adding permissions for Safe Boxes to other users, in the names of private Safe Boxes shared from another user, in reports, etc.
If the short name could not be selected according to settings in the first preference, the second preference settings would be tried. If selecting the short name according to both preferences is unsuccessful, the username will be displayed as the short name.

First preference

Most preferred settings for how the short name of users will be selected.

if the first preference result is empty

Settings to apply if the first preference result is empty.

if both settings have empty results

The username will be displayed as the user’s short name.

Backup

Backup of SecureAnyBox server is done at midnight (if the server runs) or at the earliest possible opportunity. It is possible to set a configuration for backup and verify that the backup has run.

View how to restore SecureAnyBox5 data from a backup

To edit the Backup configuration, click edit and wait for the form to appear.

Backup tab
File Path

The path to the location where the backup files are created. The default path is the backup directory in the SecureAnyBox installation directory. By default: /opt/tdp/secureanybox/backup or C:\SecureAnyBox\backup

Filename Prefix

A time stamp in the rrrr-mm-dd format is automatically added after the prefix (e.g., secureanybox-backup-2018-05-17.zip). The default prefix is secureanybox-backup.

Number Of The Last Backups To Keep

The number of maintained backups. Backup is done every day at midnight. When a count of backups exceeds the number set here, the oldest backups are automatically deleted. The default number of backups is 7.

Customized File Permissions

Allows you to edit the default user rights of the backup file.

File Owner

User account which will be set as the owner when creating the backup file (e.g., root, Administrators).

This field displayed if SecureAnyBox5 server runs on Windows platform

File Group

Group of users with permissions to backup files.

This field displayed if SecureAnyBox5 server runs on Linux platform

File Permissions

Permissions that are set to backup files. The Unix symbolic notation in the rw-rw--— format is used for the setting (see https://en.wikipedia.org/wiki/File_system_permissions). By default, only the owner has permission to read and write (rw-------).

This field displayed if SecureAnyBox5 server runs on Linux platform

Table with information about backups displays below the backup configuration details.

The LDAP connector holds LDAP server connection settings used for communication with the LDAP server to synchronize users from LDAP to the SecureAnyBox, and vice versa. Three types of Directory services are supported – eDirectory, Active Directory, and generic LDAP.
For each connector, it is possible to set more than one LDAP server for backup or load balancing purposes. All servers set to one connector need to be the same type (eDirectory, Active Directory, or generic LDAP).

LDAP tab

Click sync to start manual synchronization with the connector server. You are redirected to the Connector synchronization log page to see results.
Click view to go to the Connector Viewer page, where you can see which users can be synchronized from LDAP/Azure AD after filtering.

LDAP Connector

For each connector, you can set multiple LDAP servers for backup or load balancing. All servers for a connector must be the same type (eDirectory, Active Directory, or generic LDAP).

To create a new LDAP connector, click add LDAP Connector and wait for the form.

LDAP form
Connector ID

Unique connector identifier. Connector ID must start with a letter and contain only letters, numbers and underscores.

Enabled

Uncheck (false) to disable this connector.

LDAP settings
Directory Service

LDAP server type.

LDAP Server(s)

LDAP server address or addresses of multiple LDAP servers with the same directory replica/mirror (for failover).

To add an LDAP server, click the plus button and wait for the form to appear.

New LDAP

In the form, enter the Server address and Port. The address can be an IP (e.g., "172.22.13.1") or a domain (e.g., "ldapsrv.tdp.cz"). Port defaults to 636 with SSL.
We recommend using SSL for communication between SecureAnyBox5 and LDAP
To add the server, click OK.

Server address

Please enter LDAP server address. Server address can be entered as an IP address (e.g. "172.22.13.1") or as a domain name (e.g. "ldapsrv.tdp.cz")

Port

Port on which SecureAnyBox5 communicates with LDAP server. For connection with SSL protocol is used port 636 and for connection without SSL protocol is used port 389.

SSL

Enable/disable SSL protocol during communication between SecureAnyBox5 and LDAP server. We strongly recommend using SSL protocol.

Load Balancing

When enabled, LDAP requests will be distributed among available LDAP servers (for load balancing). When not enabled, SecureAnyBox will connect to the first server available. Servers are tried in the order in which they are defined.

SecureAnyBox Mgr Account

LDAP User DN used by SecureAnyBox to access LDAP directory, lookup users, change passwords, etc.
Minimum access rights:
entry/object rights – browse
cn – read, compare
objectClass – read, compare
UseCreate SecureAnyBox objectsbutton to create manager user automatically when using NetIQ (Novell) eDirectory. If you are connecting to a directory service from another vendor, please create a manager user using your directory service management console. LDAP interface on some directory services (e.g., Active Directory) doesn’t provide access rights/permissions modification…

e.g.,cn=secureanyboxmgr,o=org or cn=secureanyboxmgr,cn=Users,dc=DOMAIN,dc=local

LDAP Search Base

LDAP container used as a search base for the LDAP synchronization search query. When the search base is not set, the search starts at the root of the LDAP tree.

e.g.,o=org or leave empty to search from the root of the tree

Search Subtree

Uncheck to search only the immediate subordinates of the specified search base.

Dereference Aliases

An alias is an entry which points to another object in the namespace – by containing its dn. Searching the entry that an alias entry points to is known as dereferencing an alias.
There are four modes of dereferencing aliases:
Never
Dereference while finding the object
– aliases are dereferenced when searching subordinates of the base object but not when locating the base object.
Dereference while retrieving objects according to search scope – aliases are dereferenced when locating the base object but not when searching for the subordinates of the base object
Always
More…

An alias is an entry which points to another object in the namespace – by containing its dn. Searching the entry that an alias entry points to is known as dereferencing an alias.
There are four modes of dereferencing aliases:

  • Never
  • Dereference while finding the base object – aliases are dereferenced when searching subordinates of the base object but not when locating the base object.
  • Dereference while retrieving objects according to search scope – aliases are dereferenced when locating the base object but not when searching for the subordinates of the base object
  • Always
    More…
Search Page Size

When set to greater than zero, SecureAnyBox5 will use Simple Paged Result extended control to retrieve LDAP search results in pages of a given number of entries. Some LDAP servers have a default server-side limit for a number of entries returned in the single response. For example, Active Directory servers have a default limit of 1000 objects for a single search request. Setting Search Page Size to 1000 or lower will allow SecureAnyBox5 to retrieve more results (than the server limit) using multiple requests. When set to 0 no paging is used, and an only single request is used to retrieve all results. This setting is used when importing users and in Connector Viewer.
When using embedded LDAP from KeyShield SSO, this value must be set to 0.

Include

List of FDNs included in user synchronization.

Exclude

List of FDNs excluded from user synchronization.

LDAP Search Filter
LDAP search filter used during user synchronization
Default filters:
  • AD – (&(objectCategory=person)(objectClass=user)(!(userAccountControl:1.2.840.113556.1.4.803:=2)))
  • eDirectory – (&(objectClass=person)(!(loginDisabled=true)))
  • generic LDAP – (objectClass=person)
Group membership filter examples:
  • AD: (memberof:1.2.840.113556.1.4.1941:=cn=Group1, OU=groups,DC=domainname)
  • eDirectory: (groupMembership=cn=group1,o=org)

e.g.,(objectClass=person)

LDAP Pool Size

A number of LDAP connections SecureAnyBox will keep alive to improve the performance of LDAP requests.

Attribute mapping
UUID Attribute

An attribute used as UUID (Universally unique identifier) attribute. This attribute value is used to uniquely identify the user object in connector and must be unique across domains and LDAP connector. Usually, GUID (eDirectory) or objectGUID (Active Directory) attributes are used and recommended, because they are generated to be unique globally.

First Name Attribute

Attribute used as a first name.

Middle Name Attribute

Attribute used as a middle name.

Last Name Attribute

Attribute used as a surname.

Display Name Mapping

Enable mapping to Display name

Display Name Attribute

Field is displayed only if the Display Name Mapping field is checked.

Attribute used as a display name.

Short Display Name Mapping

Enable mapping to Short display name

Short Display Name Attribute

Field is displayed only if the Short Display Name Mapping field is checked.

Attribute used as a short display name.

Custom Mail Attribute

You can set the source attribute for reading the user’s email address and an optional regex to pick the correct email address if the source attribute is multi-valued.

Fields below are displayed only if the Custom Mail Attribute field is checked.

Mail Attribute

Source attribute used to read the user’s email address.

Mapping Method

Mapping method used to read email value, for example, when the source attribute is multivalue. The default mapping method (First value) reads the first value of the attribute as returned by the server.

Match Regex

This field is displayed only if the Mapping method field is set as First match or First match or first value.

Regular expression used to find the value of the user’s email address. For example, use regex .*@yourdomain.com to match email addresses from yourdomain.com.

Synchronization
Target Domain

Synchronized user objects are created in this domain.

User tags

List of user tags which will be assigned to all users synchronized from this connector.

Group to User tag

Mapping of group FDN to user tags – all users with the specified group FDN will have the user tag assigned.
FDN of the group must be in the search scope.

Synchonize User ‘Enabled’ Status
Sets whether to synchronize the "enabled" status of a previously saved user.
  • Only Enabled to Disabled – synchronize status from enabled to disabled, when disabled in LDAP
  • Always – always synchronize the user’s status from LDAP
  • Do not synchronize – do not synchronize user’s status from LDAP
Enable Synchronization

Enable periodic synchronization of users from the connector.

User Synchronization Interval

The delay between the synchronization of users from this connector.

To finish configuring the LDAP connector, click OK. The application must be restarted for the connector to work.

eDirectory installation

When configuring a new eDirectory LDAP connector, click Create SecureAnyBox objects to install directly from the web interface. After clicking, wait for the installation form to appear.

eDir Installation
LDAP Server

LDAP server address. The address can be specified in various formats (e.g. 172.22.40.68, localhost, mail.tdp.cz), but cannot be specified along with the type of connection (e.g. smtp://127.0.0.1).

LDAP Port

The port on which SecureAnyBox communicates with the LDAP server. For SSL connections, use port 636 and for SSL-free connections, use port 389.

SSL

Enable/disable the use of SSL for communication between SecureAnyBox and LDAP. We strongly recommend using SSL.

LDAP search base

The LDAP container is used as the search base for synchronization. If not set, the search starts at the root.

e.g.,o=org or leave empty to search from the root of the tree

SecureAnyBox Container

LDAP container where SecureAnyBox objects (like a SecureAnyBox manager) should be created.

Admin FDN

Enter FDN of LDAP admin (e.g.,cn=admin,o=org). LDAP admin credentials are necessary to create SecureAnyBox objects in LDAP.

Password

Enter admin password

Password Override

When enabled, you can override the User DN and password for the secureanyboxmgr user. Otherwise, the default values will be used.

SecureAnyBox5 mgr account

LDAP User DN used by SecureAnyBox5 to access LDAP.

Password Pattern

Password pattern for generating a SecureAnyBox manager password. Each letter in the pattern corresponds to a letter in the generated password.
Characters allowed in the password pattern and their meaning:
v – lowercase vowel a,e,i,o,u,y
V – mixed case vowel (A,E,I,O,U,Y,a,e,i,o,u,y)
Z – upper case vowel
c – lowercase consonant (b,c,d,f,g,h,j,k,l,m,n,p,q,r,s,t,v,w,×,z)
C – mixed case consonant
z – upper case consonant
l – any alphabet character (vowel or consonant) – lowercase
A – any alphabet character – mixed case
u – upper case alphabet
d – digit (0-9)
s – special character (.,@,&,,(,),<,>,_,],[,%,$,#,\,/,?,;,,:)
n – digit or special character
\ – escape character – next character is used as is (e.g pattern ‘\
‘outputs ‘-‘in the resulting password)
– any allowed character
Default pattern is CVCVdddCVCCVdC (this might generate passwords such as "wEHe063heFme4p").
For example, you can set a password pattern as "\p\a\s\sddddddd" and this might generate password such as "pass1762885" or "pass5687412".

SecureAnyBox Mgr Password

Please set SecureAnyBox manager password. The password can be generated by clicking on the Generate button. Generated passwords are safer and don’t have any link to a person who made them (like a pet’s name, favourite actor or nickname). Generated passwords are formatted by the current password pattern. Generated passwords can also be edited.

After setting all required values, click OK and wait for installation to finish. If successful, the form closes and a Success message appears in the connector form.

Success

Azure AD Connector

To create a new Azure AD connector, click add Azure AD Connector and wait for the form.

Azure AD Connector form
Enabled

Uncheck (false) to disable this connector.

Authentication Settings
Domain

Domain of your Entra ID (Azure AD) – it is used to form a userPrincipalName (@) used to log in to Entra ID.

Tenant ID

Tenant ID of your Entra ID (Azure AD)

Client ID

ID of application registered in Entra ID (Azure AD) used for SecureAnyBox synchronization and authentication.

Client Secret

Secret code (id) of application client

Attribute mapping
connectorAttributeMapping
Synchronization
connectorSync

KeyShield SSO Integration

In this part of the SecureAnyBox configuration, you can set integration with the KeyShield SSO. SecureAnyBox supports two types of Keyshield authentication – by IP address and by certificate using the Client API.

KeyShield SSO Integration form
IP address authentication

KeyShield SSO integration for clients with a unique IP address using KeyShield SSO web REST API.

IP Address Authentication

KeyShield SSO IP address authentication is disabled by default. You can enable it for all users or non-admin users only.

KeyShield SSO Server URL

KeyShield SSO server URL (syntax: http://address:port).
If you are connecting to Keyshield SSO server using SSL (via HTTPS instead of HTTP), you need to import a certificate from KeyShield SSO server to your Java Keystore. More…

KeyShield SSO server URL (format: http://address:port).
If using SSL (https), import the KeyShield SSO certificate to your Java Keystore. More…

http://127.0.0.1:8485

API Key

Key used to authenticate against KeyShield SSO API. To obtain the API key, please go to the KeyShield SSO Administration.

Trusted proxy servers

If SecureAnyBox5 is behind a reverse proxy, enter the trusted proxy IP to enable KeyShield SSO integration.

Connection Timeout

Determines the timeout in seconds until a connection to the KeyShield SSO server is established.

Enabled Authentication Types For Synchronized Users

Select the authentication type. This value determines, whether the authentication through login form enabled, or whether the two-factor authentication used.

Notification URL

Copy this URL and use it in notification configuration within KeyShield SSO Server.

Certificate authentication using client API

Integration with Keyshield SSO for clients with non-unique IP addresses. This authentication uses KeyShield SSO client API and requires a browser extension to work. Using KeyShield SSO (Windows) client in TLS mode is also required.

Enable Certificate Authentication

Enables SSO through KeyShield SSO Client API

KeyShield SSO API Certificate

Upload KeyShield SSO API certificate, which can be downloaded from KeyShield SSO configuration in the API section.

Password Login Enforcement
Password Enforcement Mode
By default, users who log in with KeyShield SSO do not have to set or enter a SecureAnybox password. However, you can choose to require these users to create and use a password for added security.
When this option is enabled:
  • Users logging in with KeyShield SSO will also need to set and use a SecureAnybox password.
  • You can set the password to be required only once, or you can have users enter it again after a certain number of days.
Benefits:
  • Gives SSO users an extra layer of security.
  • Allows you to choose how often passwords are needed.
This setting is not enabled by default and must be turned on by an administrator.

Safe Boxes

Configuration of the Default password pattern, which is used in Safe Boxes and Records, offering of previously entered labels, maximum file size, policy of the Access Code and applying of permission templates.

Password safe
Safe Boxes Management
Customized Column

Selection of which data displays in the middle column of the list of records in the Safe Box – after the record name. The default value is Description.
This value is set for the server and can be overridden in the domain and the user preferences.

Enable Creating Tags From The Record

When using the API (/safe/boxes/{boxId}/records), it is possible to create new record tags directly when creating a record using the ‘forceCreateTags’ parameter. This setting determines who can use this parameter.
Note: Global setting can be overridden by domain setting

Do Not Offer Previously Entered Tags

When entering a tag in the record’s form, previously typed tags will not be offered.

Maximum File Size

This value determines the maximum size of the internal file which is possible to store in a record (file or certificate type of record).

Safe Box delete mode

Sets whether the user who has delete permission for Safe Box can delete the Safe Box or only content inside.

White Envelope Mode

Select White Envelope mode. If the White Envelope is mandatory, a sufficient number of Security Officers must be set up.
If the private key is backed up in the White Envelope, a forgotten Access Code can be recovered with the help of Security Officers and does not need to be reset. When recovering the access code, unlike a reset, the user does not lose the keys to the Safe Boxes, and it cannot happen that the Safe Boxes to which no other user has keys are permanently deleted.
Note: The domain settings can override this setting.

Access Code Reset Enabled

Enable resetting the Access Code even though the Access Code can be recovered with the help of Security Officers. When recovering the Access Code, unlike when resetting, the user does not lose the keys to the Safe Boxes. So, it cannot happen that the Safe Boxes to which no other user has keys are permanently deleted.
Note: The domain settings can override this setting.

Password policy

Settings of the default password generation method

Generate Passwords Using

Select the setting that will be the default for all users. The selected setting will be used when generating a password:

Default Password Preset

A password preset will be used to generate a password. The preset has specified password requirements, such as the number of uppercase letters, characters to include/exclude, minimum entropy, etc. The password preset has to be specified first in the Administration interface.

Default Password Pattern

Default password pattern for Safe Boxes and Records where no password pattern is set.
Each letter in the pattern corresponds to a letter in the generated password.
See examples of the password pattern
Characters allowed in the password pattern and their meaning:
v – lowercase vowel a,e,i,o,u,y
V – mixed case vowel (A,E,I,O,U,Y,a,e,i,o,u,y)
Z – upper case vowel
c – lowercase consonant (b,c,d,f,g,h,j,k,l,m,n,p,q,r,s,t,v,w,×,z)
C – mixed case consonant
z – upper case consonant
l – any alphabet character (vowel or consonant) – lowercase
A – any alphabet character – mixed case
u – upper case alphabet
d – digit (0-9)
s – special character (.,@,&,,(,),<,>,_,],[,%,$,#,\,/,?,;,,:)
n – digit or special character
\ – escape character – next character is used as is (e.g. pattern ‘
‘outputs ‘-‘in the resulting password)
– any allowed character
Default pattern is CVCVdddCVCCVdC (this might generate passwords such as: wEHe063heFme4p).
For example,you can set password pattern as ‘passddddddd ‘and this might generate password such as ‘pass1762885 ‘or ‘pass5687412 ‘.

User tags
Permission Templates Will Be Offered For User Tags From

Select which permission templates will be offered to apply permission templates:

  • All domains – Permission Templates will be offered for user tags from all visible domains
  • Only current domain – Permission Templates will be offered only for user tags from the domain of the currently logged user

Enhanced Client Encryption

Enhanced Client Encryption

Configuration of enhanced client-side encryption of access code and record data. Enhanced encryption is additional encryption on top of the already encrypted and secure SSL/TLS connection.

Access Code Policy

Access Code Policy
Minimum Length

Minimum length of the access code.

Uppercase Letters

Minimum number of uppercase letters in Access Code.

Lowercase Letters

Minimum number of lowercase letters in Access Code.

Digits

Minimum number of digits in Access Code.

Special Characters

Minimum number of special characters in Access Code.

Minimum Entropy

Value of the minimum allowed entropy of the Access Code. The value of entropy shows how unpredictable and strong the Access Code is.

  • 0 – 20 – Access Code is very weak
  • 20 – 35 – Access Code is weak
  • 35 – 40 – Access Code is good
  • 40 – 50 – Access Code is strong
  • 50 – 256 – Access Code is very strong
Access Code Timeout

By setting the Access Code Timeout, you will enable temporary remembering of the Access Code. The last entered Access Code will be temporarily stored in a cache for the specified amount of time, and the users will not have to enter the Access Code repeatedly.
To turn this feature off, set the Access Code Timeout to 0.

Max Access Code Attempts

User Access Code is temporarily disabled after this number of unsuccessful attempts. Set to 0 to turn this feature off.

Access Code Ban Minutes

User cannot use his/her access code for this number of minutes

Settings of the required characters in the Access Code
Default value Minimum value
Minimum length 8 5
Uppercase letters 1 0
Lowercase letters 1 0
Digits 3 0
Special characters 0 0
Minimum Entropy 20 0

Mail and Notification

Configuration of e-mail notifications. Notifications will be sent when some user makes changes in the records (Safe Boxes, Accounts and so on).

Mail notification
SMTP Server

Please enter the SMTP server address from which notification emails will be sent. The host address can be specified in various formats (e.g. 172.22.40.68, localhost, mail.tdp.cz), but cannot be specified along with the type of connection (e.g. smtp://127.0.0.1).

SMTP Port

Please enter the port of the SMTP server. Usual SMTP ports are 25, 465 (for SSL), and 587 or 2525 (for TLS). If the connection to the SMTP server fails while using port 25 with SSL/TLS, use the respective ports instead.

Username

Please enter a username of an SMTP account that the SecureAnyBox will be using to connect to the SMTP server.

Password

Please enter a password for the SMTP account SecureAnyBox will use to connect to the SMTP server.

From Address

Enter an email address from which the notification emails will be sent.

Notifications Of Watched Safe Boxes

By enabling the email notification, you will allow sending notification emails with a summary of changes in the records.
When the notifications are enabled, it is possible to set options for when and to whom the emails will be sent.

Only Encrypted Fields

If this field is checked or the value is "yes", notification emails will be sent only if some encrypted fields (in records) change.

Notify Only Watchers

If this field is checked or the value is "yes", notification emails will be sent only to watchers of the Safe Box in which the changed record is stored.

Notify Self

If this field is checked or the value is "yes", a notification email will be sent even to the user who made the changes.

Changes Aggregation [Minutes]

Set the time (in minutes), during which the SecureAnyBox will aggregate changes. After the set time, SecureAnyBox will send an email with the summary of all changes in the record.

External files

Configuration of external files. External files are encrypted by SecureAnyBox5 and stored on another server. In this part of the Configuration, it is possible to set default external files path.

External files

User management

Domains

Create domain Edit domain Disable domain Delete domain Show Domain Users

The page intended to manage domains. Only users with a role User Manager or Administrator have access on this page.

Domains can be used to divide a SecureAnyBox into several parts. Each domain has its user management, and it is possible to create a hierarchical structure of domains.
The structure of domains can copy the structure of your company, and it is possible to create a hierarchy by setting the visibility of one domain for other domains, which are on a higher spot in a company structure.
For example, two domains can be created, named "Management" and "Technical support". Because users of the domain "Management" have a higher position in the structure of the company, the domain "Technical Support" will be set as a visible for users of the domain "Management".
This setting allows the domain users "Management" to grant access to Safe Boxes to users of both domains, but users of the domain "Technical support" can grant access to Safe Boxes only to users of their domain.
Domains can also copy the structure of containers in LDAP. When setting up an LDAP container, it is required to select the domain from which users will be imported from that connector. Each LDAP connector must have a unique domain.

Create domain

Only users with a role Administrator from System domain can create a domain. Users with a role User Manager can only edit their domain.

To create a domain, click New Domain on the Domain page. The domain form will appear.

Domain form

All fields are going to display after entering a domain name.

Enabled

When enabled, users from this domain can log in.

Name

The name should characterize the domain. Each domain name must be unique.
If more than one domain is specified, it will be required to fill in the domain name at the login page.
By clicking on the Login page link button, it is possible to get a link to the login page, where the domain name will be prefilled.

Description

The description should more specifically characterize the domain.

Attributes
Maximum Number Of Initialized Users

If this limit is reached, non-initialized users will not be able to set the access code.

Default Language

Select a language which users of this domain will have set by default. The language can be changed anytime.

Agent Configurations

Agent Configurations assigned to this domain.
When an Agent Configuration is assigned, by default, users with a role SecureAnyBox Admin can modify or remove the Agent Configuration. Management of the Agent Configuration can be enabled for SecureAnyBox Admins from all domains in the Agent Configuration settings.
SecureAnyBox Admins from other domains (if the Agent Configuration is visible for them) can copy the Agent Configuration only.
Assigned Agent Configuration can be used by users from this domain by default. The ability to use the Agent Configuration can be expanded/limited by setting permitted users in the Agent Configuration settings.
Agent Configuration can be assigned to one domain only.

Send invitation e-mail to new users

After manually creating a user without a password, send them an invitation e-mail with a link to set their password.

2FA (Two-Factor Authentication)

Use of a second factor (authenticator app) is either optional (enabled by the user) or mandatory.

Override Global Configuration Settings Whether The 2FA Will Be Required For Certificate Authentication

When enabled, it is possible to set whether the 2FA will be required for Certificate Authentication

Require 2FA For Certificate Authentication

Require 2FA if the user is authenticated with a KeyShield SSO certificate.

Allowed User Roles

List of roles that are enabled for users in this domain.

Visible Domains

List of domains visible for users of this domain.
Users of this domain can share their Safe Boxes and Safe Box Groups also with users of visible domains.

Domain form
Safe Boxes settings
Domain form
Customized Column Of Records In Safe Boxes

Selection of which data displays in the middle column of the list of records in the Safe Box – after the record name. The default value in server configuration is Description.
This value is set for the domain and can be overridden in the user preferences.

Default Safe Box Type

Choose a default Safe Box type for all new Safe Boxes and Safe Box Groups which will be created in this domain.

Shared – Access rights are inherited from parent level.

Private – Blocks access rights inheritance from parent level.

Enable Creating Tags From The Record

When using the API (/safe/boxes/{boxId}/records), it is possible to create new record tags directly when creating a record using the ‘forceCreateTags’ parameter. This setting determines who can use this parameter.
Note: This setting overrides global setting

Override Max. File Size

Check this box to override the maximum file size. The default value is 15 MB.

Maximum File Size

This value determines the maximum size of the internal file which is possible to store in a record (file or certificate type of record).

External Files Path

Enter an external files path that will be used as the default location to store external files within the Safe Boxes in this domain.
The path should be specified in MS Windows format (e.g. L:\SAB_DRIVE). If an external files path is changed, SecureAnyBox will store all new external files at the new location, but all previously stored files will remain at their original location.
Without SAB Launcher or SecureAnyBox plugin for Total Commander, it is not possible to add external files to SecureAnyBox or work with them.

Override Safe Box Delete Mode

When enabled, it is possible to set Safe Box Delete Mode for this domain.

Safe Box Delete Mode

Sets whether a user with delete permission for a Safe Box can delete the box or only its content.

Enable Sharing

Enables/ Disables sharing of permissions for Safe Boxes to other users

Forbid Remembering Access Code

Checking this box will override ‘Access Code Timeout’ settings, and for users of this domain, the access code will not be remembered.

Default settings for automatic watching
Automatically Watch Changes

For Safe Box Groups, Safe Boxes, and records users from this domain, who create or obtain access, will have the watching of changes automatically set by default.

Each user can change whether changes will be watched automatically in the user preferences form.
If sending notifications is enabled (in the server configuration), email notifications will be sent with a summary of changes to the watched ones.

Automatically Watch Accesses

For Safe Box Groups, Safe Boxes, and records users from this domain create or obtain access, the watching of accesses to encrypted information will be set to automatic by default.

Each user can change whether access to encrypted information will be watched automatically in the user preferences form.
If sending notifications is enabled (in the server configuration), email notifications will be sent with a summary of accesses to encrypted information to the watched ones.

User tags and Permission Templates
Domain form
Permission templates will be offered for user tags from

Select which permission templates will be offered to apply permission templates:

  • All domains – Permission Templates will be offered for user tags from all visible domains
  • Only current domain – Permission Templates will be offered only for user tags from the domain of the currently logged user
User Tags Assigned To All Domain Users

List of user tags assigned to all users from this domain.

Security policy
Domain form
Password Settings

Select the password setting that will be the default for users from this domain. Password settings are used when generating a password:

  • Inherited – settings will be inherited from server configuration

  • Password preset – the selected password preset will apply when generating a password. The password preset has to be specified first in the Administration interface.

  • Password pattern – when generating a password, the entered password pattern will apply

Default Password Preset

Select a password preset that will be set as default for users from this domain when generating a password. Password requirements, such as a number of uppercase letters, characters to include/exclude, minimum entropy, etc., can be specified in the preset. The password preset has to be specified first in the Administration interface.

Default password pattern

The default password pattern for Safe Boxes and Records created in the domain, if no pattern is set.
Each letter in the pattern represents a character in the generated password.

See password pattern examples
Allowed characters and their meanings:
v – lowercase vowel (a, e, i, o, u, y)
V – mixed case vowel (A, E, I, O, U, Y, a, e, i, o, u, y)
Z – uppercase vowel
c – lowercase consonant (b, c, d, f, g, h, j, k, l, m, n, p, q, r, s, t, v, w, ×, z)
C – mixed case consonant
z – uppercase consonant
l – any lowercase letter
A – any letter, mixed case
u – uppercase letter
d – digit (0-9)
s – special character (.,@,&,*,(,),<,>,_,],[,%,$,#,\,/,?,;,-,:)
n – digit or special character
\ – escape character (next character is used as is, e.g., pattern ‘\-’ outputs ‘-’ in the password)
* – any allowed character
Default pattern: CVCVdddCVCCVdC (e.g., wEHe063heFme4p)
Example: pattern ‘\p\a\s\sddddddd’ might generate ‘pass1762885′ or ‘pass5687412′.

Compliance Profile

A compliance profile specifies password security requirements that passwords should meet. Checking whether passwords meet security requirements can be done in the Compliance report.
Selected compliance profile would be the default for all users within this domain.

Login Password Policy
Domain form
Override Password Policy

By overriding the Login password policy, you can set the policy only for this domain. If not overridden, the login password policy from the Configuration (if specified) will apply.

Fields below are displayed only if the Override Password Policy field is checked.

Minimum length

Minimum length of the login password.

Uppercase letters

Minimum number of uppercase letters in the login password.

Lowercase letters

Minimum number of lowercase letters in the login password.

Digits

Minimum number of digits in the login password.

Special characters

Minimum number of special characters in the login password.

Minimum Entropy

Value of the minimum allowed entropy of login password. The value of password entropy shows how unpredictable and strong the password is (the higher value the better.)

  • 0 – 20 – password is very weak
  • 20 – 35 – password is weak
  • 35 – 40 – password is good
  • 40 – 50 – password is strong
  • 50 – 256 – password is very strong
Synchronized Users and KeyShield SSO login settings
Domain form
LDAP Login Password Synchronization

SecureAnyBox offers several ways to manage user passwords with LDAP (a directory service for authentication):
1. Synchronize from LDAP to SecureAnyBox:
  - SecureAnyBox uses a locally saved copy of your password (cached password).
  - Your password will not update until you enter a new one that matches your LDAP password.
2. LDAP authentication only:
  - Each time you log in, your password is verified directly with the LDAP server (if accessible).
  - This keeps your password synchronized with LDAP.
3. SecureAnyBox authentication only:
  - Only the password stored in SecureAnyBox is used.
  - Your password is not synchronized with LDAP.
Choose the option that best fits your organization’s security and synchronization needs.

Password Enforcement Mode
By default, users who log in with KeyShield SSO do not have to set or enter a SecureAnybox password. However, you can choose to require these users to create and use a password for added security.
When this option is enabled:
  • Users logging in with KeyShield SSO will also need to set and use a SecureAnybox password.
  • You can set the password to be required only once, or you can have users enter it again after a certain number of days.
Benefits:
  • Gives SSO users an extra layer of security.
  • Allows you to choose how often passwords are needed.
This setting is not enabled by default and must be turned on by an administrator.
Number Of Days

This field is visible only if Password Enforce Mode is to Enforce password login after number of days.

The number of days after which a password login is required again.

Access Code Policy
Domain form
Override Access Code Policy

By overriding the Access Code Policy, you can set the policy only for this domain. If not overridden, the Access Code Policy from the Configuration will apply.

Fields below are displayed only if the Override Access Code Policy field is checked.

Minimum length

Minimum length of the Access Code.

Uppercase letters

Minimum number of uppercase letters in the Access Code.

Lowercase letters

Minimum number of lowercase letters in the Access Code.

Digits

Minimum number of digits in the Access Code.

Special characters

Minimum number of special characters in the Access Code.

Minimum Entropy
Value of the minimum allowed entropy of the Access Code. The value of entropy shows how unpredictable and strong the Access Code is.
  • 0 – 20 – Access Code is very weak
  • 20 – 35 – Access Code is weak
  • 35 – 40 – Access Code is good
  • 40 – 50 – Access Code is strong
  • 50 – 256 – Access Code is very strong
White Envelopes
Domain form
White Envelope Mode

Select White Envelope mode. If the White Envelope is mandatory, a sufficient number of Security Officers must be set up.
If the private key is backed up in the White Envelope, a forgotten Access Code can be recovered with the help of Security Officers and does not need to be reset. When recovering the access code, unlike a reset, the user does not lose the keys to the Safe Boxes, and it cannot happen that the Safe Boxes to which no other user has keys are permanently deleted.

Access Code Reset Enabled

Enable resetting the Access Code even though the Access Code can be recovered with the help of Security Officers. When recovering the Access Code, unlike when resetting, the user does not lose the keys to the Safe Boxes. So, it cannot happen that the Safe Boxes to which no other user has keys are permanently deleted.

Security Officers Threshold

The number of Security Officers required to open White Envelope. The count of configured Security Officers has to be greater than this.

Minimum Security Officers Count

Minimum Security Officers count required to correct the function of White Envelope Sharing.

Desired Count Of Security Officers

Number of Security Officers appointed in your organization. SecureAnyBox will warn you if the Security Officer Count falls below this value.

Default Safe Box Permissions

These Default Safe Box permissions are used as the default when creating a new user in the domain.

Domain form
Read
User has permission to view shared Safe Boxes, shared Safe Box Groups and records in them. User has permission to view shared Safe Boxes, shared Safe Box Groups and records
Create
User has permission to create new shared Safe Box, shared Safe Box Group or record in them. User has permission to create new shared Safe Box, Safe Box Group or record
Modify
User has permission to modify shared Safe Boxes, shared Safe Box Groups and records in them. User has permission to modify shared Safe Boxes, shared Safe Box Groups and records in them
Delete
User has permission to delete or move shared Safe Box, shared Safe Box Group or record in them. User has permission to delete or move shared Safe Box, shared Safe Box Group or record
Access Control
User has permission to manage permissions for shared Safe Box or shared Safe Box Group. User has permission to manage permissions for shared Safe Box or shared Safe Box Group.
Private Boxes
User has permission to create new Private Safe Box or Safe Box Group. User has permission to create new Private Safe Box or Safe Box Group.
Default Licensed Features for new users

By checking the fields below, new users created (not updated during LDAP synchronization) in this domain will be granted access to licensed features – CBT client (Custom Branded Trusted client), File manager plugin or Grit. The number of users with access to Licensed features cannot exceed the number of licenses.

Domain form
Edit domain

To edit a domain, click its row in the list. The domain form will appear. You can change any value.
To apply changes, click OK.
To cancel, click Cancel.

Disable domain

Disabling a domain blocks login for all users in that domain. To disable, open the domain form by clicking its row in the list and uncheck Enabled. After saving, the domain is disabled.
A disabled domain can be enabled at any time.

Delete domain

You can delete a domain only if it has no users. To delete, click the cross icon (cross icon) at the end of the domain’s row. Confirm the deletion.

Delete domain
Show domain users

To view users from a specific domain, click the people icon (people icon) in the domain table. A list of users for that domain will open in a new tab.

Show Users

Users

Create user Edit user Disable user Enable user Unban user Export a list of users Delete user Invite user Send message Move user

The Users page is intended for the users management. Only users with a role User Manager have access to this page.

By default, users are filtered by domain. To change the filter, click Select domain and choose a domain. To show all users, select All Domains.

Select domain

Users can be created manually or imported from LDAP.

Create User

Before creating a new user is important to select the domain into which a user will create.

To create a new user, click New User. The user form will appear.

User form

The Security Officer (1) and Inherited (2) fields can be edited after the user sets an Access Code.

Atrributes
Domain

A domain in which the user belongs.
To change the domain into which a new user was created, you must select a different domain on the Users page.
Once the user is created, it is possible to move the user to a different domain.

Username

Username which the user will use to log in.
By clicking on the Login page link button, it is possible to get a link to the login page, where the domain name and the username will pre-fill.
Once the user is created, this value cannot be changed.

User Tags

User tags assigned to this user. Tags are used when applying permission templates set in Safe Boxes.

Domain User Tags

User tags assigned by domain membership. Tags are used when applying permission templates set in Safe Boxes.

Synchronize

When the field is checked (or a value of this field is "yes"), the user will be synchronized with LDAP.
Once the user is created, this value cannot be changed.

Set Password

Set a password. When the password is not set, the user cannot log in.

Password

User password.
While entering the password, it shows how long the password is, how many lowercase and uppercase letters, numbers, and other symbols it contains and how secure the password is.
The password will be displayed after clicking on the eye icon behind this field.

Repeat Password

Repeat the password

Settings
Enabled

Enables/disables user account login. If a user has already set their access code, it will still be included in the number of used user licences.

Language

Select a language that the user will use in the application. The language can be changed anytime.

Licensed Features

By checking the fields below, the user will be granted access to licensed features – CBT client (Custom Branded Trusted client), File manager plugin or Grit.

CBT client

CBT (Custom Branded Trusted) client is a Windows application for working with SecureAnyBox5 file records. For more information, contact your distributor.

File manager plugin

The File Manager plugin for Total Commander or FAR lets you work with Safe Boxes and records from those applications.

LDAP Synchronization

This part of the form is displayed if the user is synchronized with LDAP

GUID

User GUID (entryUUID or objectGUID) used to match user with LDAP object during LDAP synchronization (hexadecimal format in lowercase, e.g.,950aea900084d311aef800e029255247). Use Connector Viewer to get the user GUID in the correct format if you need to link an existing user record with LDAP.

LDAP Connector

Name of the LDAP connector with which the user is synchronized.

LDAP DN

LDAP user DN (distinguished name).

Synchronized User Tags

User tags assigned by LDAP synchronization. Tags are used when applying permission templates set in Safe Boxes.

Roles
Administrator
User administers SecureAnyBox5 server configuration – domains, URLs, LDAP, SSO, email, SIEM, diagnostic logs, etc.User administers SecureAnyBox5 server configuration – domains, URLs, LDAP, SSO, email, SIEM, diagnostic logs, etc.
Auditor
User is approved to access the complete audit log through a set of reporting tools. This doesn’t include any access to the encrypted data.User is approved to access the complete audit log through a set of reporting tools. This doesn’t include any access to the encrypted data.
SecureAnyBox User
User is generally allowed to get passwords managed by agents, can be limited by access rights. User is generally allowed to get passwords managed by agents, can be limited by access rights.
SecureAnyBox Admin
User is approved to administer configuration of agents. User is approved to administer configuration of agents.
User Manager
User is approved to manage domains, user accounts, assign roles and default rights.User is approved to manage domains, user accounts, assign roles and default rights.
Security Officer
User, only together with other Security Officers, can open White Envelopes within his/her domain.User, only together with other security officers, can open White Envelopes within his/her domain.
Safe Boxes User
User is allowed to use SafeBoxes (must have valid Access Code) User is allowed to use SafeBoxes (must have valid Access Code)
Safe Boxes Manager
The user has extended permissions to manage Safe Boxes within their domain.The user has extended permissions to manage Safe Boxes within their domain.
Security Policy Admin
The user can manage security policies (record tags, password presets and compliance profiles).The user can manage security policies (record tags, password presets and compliance profiles).
Default Safe Box Permissions
Inherited
Default or Safe Box Group permissions are added automatically to every created shared Safe Box or shared Safe Box Group created by another user in the user domain. Default or Safe Box Group permissions are added automatically to every created shared Safe Box or shared Safe Box Group created by another user in the user domain.

Assigning this permission is recommended only for users who manage/are responsible for all Safe Boxes/Safe Box Groups within a domain. Assigning other permissions for Safe Boxes/Safe Box Groups within a domain can be fully automated using Permission Templates.

Read
User has permission to view shared Safe Boxes, shared Safe Box Groups and records in these. User has permission to view shared Safe Boxes, shared Safe Box Groups and records
Create
User has permission to create new shared Safe Box, shared Safe Box Group or records in. User has permission to create new shared Safe Box, shared Safe Box Group or records
Modify
User has permission to modify shared Safe Boxes, shared Safe Box Groups and records. User has permission to modify shared Safe Boxes, shared Safe Box Groups and records
Delete
User has permission to delete or move shared Safe Box, shared Safe Box Group or records. User has permission to delete or move shared Safe Box, shared Safe Box Group or records
Access Control
User has permission to manage permissions for shared Safe Box or shared Safe Box Group. User has permission to manage permissions for shared Safe Box or shared Safe Box Group.
Private Boxes
User has permission to create new private Safe Box or private Safe Box Group. User has permission to create new private Safe Box or private Safe Box Group
User roles
User role Description
Administrator User administers SecureAnyBox5 server configuration – domains, URLs, LDAP, SSO, email, SIEM, diagnostic logs, etc.
Auditor User is approved to access the complete audit log through a set of reporting tools. This doesn’t include any access to the encrypted data.
SecureAnyBox User User is generally allowed to get passwords managed by agents, can be limited by access rights.
SecureAnyBox Admin User is approved to administer configuration of agents.
User Manager User is approved to manage domains, user accounts, assign roles and default rights.
Security Officer User, only together with other Security Officers, can open White Envelopes within his/her domain
Safe Boxes User User is allowed to use Safe Boxes (must have valid Access Code)
Safe Boxes Manager The user has extended permissions to manage Safe Boxes within their domain
Security Policy Admin The user can manage security policies (record tags, password presets and compliance profiles)

The user role determines which parts of SecureAnyBox5 the user can access and what actions they can perform. The table below shows what each role can do.

User role SecureAnyBox Safe Boxes Reports Audit Administration
Administrator Access yes yes yes no yes
Extra access Access to Agent Configuration, Configuration. Only Administrator has access to them
Auditor Access no no no yes no
Note The auditor who belongs to System domain can do an audit over all domains
SecureAnyBox User Access yes no no no no
Actions View registered stations, obtain passwords for stations
SecureAnyBox Admin Access yes no no no no
Actions All actions with stations, tickets, passwords
User manager Access no no no no yes
Actions View and edit domains and all actions with users
Security Officer Access no yes yes no no
Actions Can open White Envelopes of other users (in co-op with other Security Officers)
Safe Box User Access no yes yes no no
Actions Can use Safe Boxes
Safe Box Manager Access no yes yes no yes
Actions Can force the creation of record tags when creating a record through API
Security Policy Admin Access no yes yes no yes
Actions Can access and set Security policies
Grouping of user roles

When you set a user role, other roles may be set automatically if included. For example, Administrator includes all features of SecureAnyBox User, SecureAnyBox Admin, and User Manager, plus extra features (like Configuration access and domain creation). So an Administrator also has SecureAnyBox User, SecureAnyBox Admin, Safe Box Manager, and User Manager roles.

Edit user

To edit a user, click their name in the list. The user details will appear.
If the user is imported from LDAP, different fields may be shown.

User form - LDAP synchronization

You can also edit a user from the action menu. Click the three dots (three dots) in the Actions column, then click Edit.

Edit user from Action menu

After making changes, click OK in the user details form. You may be asked to enter the Access Code. Forgot your Access Code?

Disable user

To prevent a user from logging in, disable their account. Disabled users cannot access SecureAnyBox5, but their records remain. Disabling a user can be undone at any time.
To disable, uncheck Enable in the user details form.

Enable field

You can also enable a user from the action menu. Click the three dots (three dots) in the Actions column, then click Disable.

Disable user from the Actions menu

You can disable multiple users at once. Check the users to disable, then click Disable. All selected users will be disabled.

Disable users
Enable user

To allow a user to log in, check Enabled in the user details form.

Enable field

You can also enable a user from the action menu. Click the three dots (three dots) in the Actions column, then click Enable.

Enable user from Action menu

To enable multiple users at once, select them and click Enable. All selected users will be enabled.

Enable users
Unban user

If a user enters the Access Code or password incorrectly too many times, they are temporarily banned. Banned users have a red lock icon in the list.

banned admin – Built-in administrator account, login is banned.
banned user – Manually created user, login is banned.
banned disabled – User is disabled, login is banned.
banned LDAP user – Synchronized from LDAP connector, login is banned.
banned Access Code – Access code entry is temporarily banned because it was entered incorrectly several times.

The number of unsuccessful attempts of entering the Access Code or the login password, and how long the user is banned, is set in the Configuration.

To unban users, select them and click Unban.

Unban button
Export a list of users

On the Users page, you can filter users by checking/unchecking filter fields (1). To export the filtered list to CSV, click Export to CSV.

Filter fields

The exported file includes the displayed values (name, username, email, domain, LDAP connector, and roles).

Delete user

To delete a user, use the action menu. Click the three dots (three dots) in the Actions column, then click Delete.

Delete user from the Actions menu

If a user is the only one with permissions for a Safe Box, deleting the user will also delete the Safe Box. To avoid this, assign permissions for those Safe Boxes to another user.

Delete user
Invite users

After creating users, you can send them an email invitation to SecureAnyBox5. The invitation contains a link to set their password. Once set, the user can log in and set their Access Code.

To send invitations, select the users (by checking them) and click Invite users.

To send the invitations, you have to configure mail server in the Configuration first.

Invite Users

You can also invite a user from the action menu. Click the three dots (three dots) in the Actions column, then click Invitation.

Invite user from the action menu

After clicking Invitation in the action menu, the Invitation dialog appears. If the user has an email address, you can create and send the invitation by email, or create it without sending.

Invitation dialog

If the invitation is created but not sent, the dialog shows a link you can copy to the clipboard.

Invitation link
Reset password

After creating users, you can send them an email invitation to SecureAnyBox5. The invitation contains a link to set their password. Once set, the user can log in and set their Access Code.

To send invitations, select the users (by checking them) and click Invite users.

To send the invitations, you have to configure mail server in the Configuration first.

Invite Users

You can also invite a user from the action menu. Click the three dots (three dots) in the Actions column, then click Invitation.

Invite user from the action menu

After clicking Invitation in the action menu, the Invitation dialog appears. If the user has an email address, you can create and send the invitation by email, or create it without sending.

Invitation dialog

If the invitation is created but not sent, the dialog shows a link you can copy to the clipboard.

Invitation link
Send message

If users have an email address, you can send them a message from SecureAnyBox5.
To send a message, select the users (by checking them) and click Send message.

Poslat uživatelům zprávu

To send the messages, you have to configure mail server in the Configuration first.

After clicking Send message, a window appears to enter your message. Click Ok to send.

Poslat uživatelům zprávu2
Move user

Users can be moved between domains. To move users, select them and click Move.

Moved user lose all inherited permissions to Safe Boxes. All assigned permissions stay valid.

Move users

After clicking, a list of domains appears. Click a domain to move the users there.
You must confirm the move.

Confirm move of a user

Client logins

Only users with a role User Manager have access to this page.

The Client Logins page shows which clients users log in from and whether they use up-to-date versions.
You can filter logins by domain (click Select domain (1)), by client application (2)), or by username (type in the filter field (3)).
If a user logs in from an outdated client, a clock icon (4) appears next to the version.

Client logins page

Security Officer’s Status

Only users with a role User Manager have access to this page.

The Security Officer’s Status page indicates whether the officer has keys to White Envelopes in their domain (is initialised).

Security Officer's Status page

User tags

Only users with a role User Manager have access to this page.

User tags help manage users and their permissions. You can assign unlimited tags to each domain. Tags can only be added to users in the same domain.
A user tag can be assigned to:

User tag is used to create a Permission template for users who have the user tag assigned.

User tags page

Connector Viewer

Only users with a role Administrator have access to this page.

Connector Viewer allows you to browse the LDAP tree / Entra ID (Azure AD) structure of any of the configured connectors.
When viewing the LDAP tree, Connector Viewer uses the "SecureAnyBox manager" account defined within the selected LDAP connector configuration. That means that LDAP objects and their attributes you see with the Connector Viewer correspond to what the selected authentication connector ‘sees’. If you don’t see what you expect (a specific user object or its attributes), then the access rights of the "SecureAnyBox manager" account for the particular LDAP tree are not sufficient. Please check the access rights assigned to the search base or root of the LDAP tree, as well as possible inheritance filters.

To use Connector Viewer, you must configure at least one LDAP/Azure AD connector. After opening the page, a list of connectors appears. Click a connector name to view objects in its search base.

Select LDAP connector

Displayed objects are folders (containers) and users. Click a folder to view its contents. Click a username to view user details.

User details in Connector Viewer

You can filter objects by entering a name in the search field above the table. To filter by LDAP search expression, click Lookup object(s) and use the filter field.

Connector Viewer Look Up Objects

Audit log

The Audit Log page shows a log of user management actions.

Audit log
AuditlogParagraph2

Security policy

Record Tags management

Only users with a role Security policy admin have access to this page.

Record tags help manage records in Safe Boxes. You can assign unlimited tags to each domain. Tags can only be added to records in the same domain.
Users with the Security policy admin role can manage tags for all visible domains. To switch domains, click Select domain and choose a domain.
The selected domain determines where new tags are created. If "All domains" is selected, new tags are created in your domain.
You can convert existing tags to others to reduce similar tags and simplify searches. To convert, open the action menu (three dots at the end of the row) and select Delete and convert to another tag in the records.
To remove a tag, click the three dots at the end of the row and select Delete tag.

To record tag can be assigned a Password preset and/or a Compliance profile, which will be default for all records where the record tag is used.

Records tags page

Compliance profiles

Only users with a role Security policy admin have access to this page.

The compliance profile sets password security requirements. The Compliance report checks if passwords meet these requirements.

To create a new compliance profile, click New compliance profile and set the requirements in the form.

Compliance profiles form
Name

Name of the compliance profile

Description

Description of the compliance profile

Compliance requirements
Length

Minimum length of a password.

Entropy

Minimum entropy

Age (Days)

Maximum Age (days)

Enforce Password History

The number of password changes after which it is permissible to reuse a previously used password.

Complexity Rules

Select complexity rules which will be applied:

  • Basic complexity rules – specified number of characters (uppercase, lowercase, digits and special)

  • Microsoft complexity rules
    1. Passwords may not contain the user’s samAccountName (Account Name) value or entire displayName (Full Name value). Neither of these checks is case-sensitive

    2. The password must contain characters from three of the following categories:
      • Uppercase letters of European languages (A through Z, with diacritic marks, Greek and Cyrillic characters).

      • Lowercase letters of European languages (a through z, sharp-s, with diacritic marks, Greek and Cyrillic characters).

      • Base 10 digits (0 through 9)

      • Non-alphanumeric characters, e.g. ‘-!"#$%&()*,./:;?@[]^_`{|}~+<=>

        Currency symbols such as the Euro or British Pound aren’t counted as special characters for this policy setting.

      • Any Unicode character that’s categorized as an alphabetic character but isn’t uppercase or lowercase. This group includes Unicode characters from Asian languages.

Character type requirements

This fieldset is displayed only if Basic complexity rules are selected

Uppercase

Minimum number of uppercase letters a password must contain.

Lowercase

Minimum number of lowercase letters a password must contain.

Digits

Minimum number of decimal digits (0-9) a password must contain.

Special

Minimum number of special characters a password must contain.

Password presets

Only users with a role Security policy admin have access to this page.

Password presets can be used when generating passwords for records. You can use a pattern or specify detailed requirements (character sets, included/excluded characters, minimum length, minimum entropy).

You can set a password preset’s priority (its position in the list). To change the priority, click Reorder password presets and drag the preset to the desired position.

Password preset form
Name

Name of the password preset

Description

Description of the password preset

Generate Password Using

Select whether the new password will be generated using a password pattern or the password requirements you set.

Password Pattern

This field is displayed if the Password pattern is selected in the Generate password using field.

Password pattern for Safe Boxes and Records where this preset is set (or inherited).
Each letter in the pattern represents a character in the generated password.

See password pattern examples
Allowed characters and their meanings:
v – lowercase vowel (a, e, i, o, u, y)
V – mixed case vowel (A, E, I, O, U, Y, a, e, i, o, u, y)
Z – uppercase vowel
c – lowercase consonant (b, c, d, f, g, h, j, k, l, m, n, p, q, r, s, t, v, w, ×, z)
C – mixed case consonant
z – uppercase consonant
l – any lowercase letter
A – any letter, mixed case
u – uppercase letter
d – digit (0-9)
s – special character (.,@,&,*,(,),<,>,_,],[,%,$,#,\,/,?,;,-,:)
n – digit or special character
\ – escape character (next character is used as is, e.g., pattern ‘\-’ outputs ‘-’ in the password)
* – any allowed character
Default pattern: CVCVdddCVCCVdC (e.g., wEHe063heFme4p)
Example: pattern ‘\p\a\s\sddddddd’ might generate ‘pass1762885′ or ‘pass5687412′.

Use character sets

This fieldset is displayed if the Password requirements are selected in the Generate password using field.

Lowercase (A-Z)

Minimum number of lowercase letters (a-z)

Uppercase (A-Z)

Minimum number of uppercase letters (A-Z)

Digits (0-9)

Minimum number of digits

Special (<>_-.(,)[]/:;@#$%&*)

Minimum number of special characters (<>_-.(,)[]/:;@#$%&*)

Must Also Include The Following Characters

Characters that must be omitted in the generated password.

Exclude Characters

Characters that must be omitted in the generated password.

Requirements

This fieldset is displayed if the Password requirements are selected in the Generate password using field.

Minimum Password Length

Minimum length of the generated password.

Minimum Entropy

Minimum entropy of the generated password

Dictionary configurations

SecureAnyBox5, uses a list of dictionaries for the estimation of password entropy. This list includes both default (built-in) dictionaries and custom dictionaries added by the administrator. These dictionaries contribute significantly to the process of calculating Password Entropy during a new password entry or for the Password Audit report and the Compliance Report generation.
The custom dictionaries are stored in two locations on the SecureAnyBox5 server – in ‘files/dictionaries/ranked’ and ‘files/dictionaries/unranked’ folders.

More information…

PasswordsAuditParagraph2

Dictionaries should contain commonly used words, names, and expressions, especially those specific to a country or company (e.g., football teams, company names). These help lower the score when evaluating password entropy, even if they appear as part of a longer password. Do not upload leaked password lists as custom dictionaries.

Every dictionary adds complexity to estimating entropy, and calculating entropy will take longer with each additional dictionary. We recommend considering that when configuring which dictionaries will be used.

Dictionary Configurations

Database diagnostic

When you start database diagnostics, all ‘file’ and ‘certificate’ records are checked for missing or extra uploaded files.
The full path (with domain) to the record and another user with permission is shown for each inconsistent record.
Diagnostics can be started at any time and should finish in a few minutes.

Database diagnostic

Logs

Only users with a role Administrator have access to this pages.

In the Logs section, you can view the diagnostic log or the Connector synchronization log. Different log levels are visually distinguished.

Log levels: info INFO warning WARNING debug DEBUG error ERROR

Diagnostic log

The Diagnostic Log page automatically displays the current log.

Logs page

Refresh the current log manually by clicking Refresh or automatically by clicking Enable autorefresh. To stop auto-refresh, click Disable autorefresh.
To change log level or line limit, click Configure logging. After confirming changes, restart SecureAnyBox5 to apply them.
To download the current log, click Download and confirm.
To view older logs, click Logs to see a list of available logs.

Logs

The first table shows application logs for each day. Click a log file name to download it and confirm.

Connector sync log

On the Connector sync log page, is displayed a table with names of specified Connectors. Click on the connector name to view details of the last synchronization with connector.

Connector synchronization log page

The synchronization log can be refreshed manually (Refresh) or automatically (Enable autorefresh). To stop auto-refresh, click Disable autorefresh.
You can start user synchronization manually by clicking Synchronize.
You can change synchronization settings anytime by clicking Configure .
To download the last synchronization log, click Download and confirm.
To filter skipped users during LDAP sync, click Show only skipped users.

LDAP synchronization log

Server status

The Server Status page shows problems with SecureAnyBox5. If errors or warnings occur, users are notified by the number in the top right corner.

errors and warnings On the SecureAnyBox5 server occurred 1 error, and 2 warnings
warnings On the SecureAnyBox5 server occurred 1 warning
errors On the SecureAnyBox5 server occurred 1 error

Click the number of errors/warnings to open the Server Status page. It shows three sections: Server Messages, Station registrations, and White Envelopes. The sections shown depend on your role.

Section User role
Administrator User manager SecureAnyBox Admin Security Officer other roles
Server Messages yes no no no no
Station Registrations yes no yes no no
White Envelopes yes no no yes yes
Server Messages

Server messages section displays only to the user with role Administrator. To handle messages from this section, go to the Configuration page.

Server messages
Station Registrations

Station registration section displays only to the user with role SecureAnyBox Admin. To handle messages from this section, go to the SecureAnyBox5 part of the application.

Station registrations
White Envelopes

White Envelopes section displays only to the user with role User manager, and Security Officers

White Envelopes

License

On the License page, you can see information about current licenses. You can check the number of remaining licenses for various resources, including Safe Boxes, Groups, records, users, domains, and applications.

License page

Guidelines

Synchronize users with LDAP

Manually created users can be synced with the LDAP server additionally, without losing saved data. It is possible to associate a user with an existing LDAP account or create a new LDAP account.
To synchronize a user with LDAP, the user must pass these conditions:

We also recommend setting the username in SecureAnyBox5 same as username (UID) in LDAP.

During the synchronization, the users’ information should be updated according to information in LDAP and fields LDAP connector, and LDAP DN should fill. Otherwise, synchronization was unsuccessful and please refer to the log of synchronization.
To view the synchronization protocol, go to the Logs > Connector sync log section in the Administration interface and click on the connector name in the table. On the Connector sync log page, you can view the protocol of the last synchronization with the connector, start synchronization, and open the connector configuration.
All issues that occurred during the synchronization have the WARNING logging level and have yellow coloring.

GUID is not unique

While entering the GUID into manually created user details, an error message that the GUID not unique appears.

Error message: GUID not unique

A user account may have been already imported from LDAP to SecureAnyBox5. You can search users by GUID on the Users management page. A user with the same GUID can even be in another domain. To search for users in all domains, please click the Find users button.
In a case, the user already imported from LDAP, please delete the imported account. Then enter the GUID into user details of the user who should be synchronized with LDAP and run the synchronization with LDAP.

Manually created user failed to synchronize with LDAP

To find the cause of a sync failure, go to the synchronization log page and enter the username in the search field.

Search sync log for "mbriggs"

Possible situations:

Existing user s UID (but different UUID) found in the database
In a SecureAnyBox5 database exists a user with the username (UID) that matches a user’s UID in LDAP, but with another GUID (UUID). This user cannot be synced and is skipped when syncing.

Example:

existing user with uid=‘peter’ (but different UUID) found in database → skipping cn=peter,o=org

A user with the username "peter" is manually created and should be synchronized with LDAP. However, the user account in LDAP has a different GUID (UUID) than the user in SecureAnyBox5. To successfully synchronize "peter" with LDAP, you need to modify the GUID according to UUID in LDAP.

Existing user cannot be renamed
Synchronized user has a different username in SecureAnyBox5 and the UID in LDAP. During the synchronization, SecureAnyBox5 tries to rename that user, so the username will be the same as is UID in LDAP. But in user domain is already another user with that username. Because in the domain, usernames have to be unique, SecureAnyBox5 cannot synchronize the user.
To successfully synchronize a manually created user with LDAP, you must edit the user’s username so that the conflict does not occur again at the next synchronization.

Example:

existing user ‘mbriggs’ cannot be renamed to ‘monica’ username not unique → skipping cn=monica,o=org

The user with username "mbriggs" is manually created and should synchronize with LDAP. In LDAP, the user with the same GUID (UUID) has different UID – "monica". During the synchronization, SecureAnyBox5 tries to change username "mbriggs" to "monica", so the username will be the same as is UID in LDAP. To successfully synchronize the user "mbriggs" with LDAP, it is necessary to edit or delete the user with username "monica".

Installation on Linux

Linux Standard Base (lsb) must be installed, otherwise, the SecureAnyBox5 can’t register for automatic start. Linux Standard Base is available through various online repositories.

The installation procedure depends on your distribution, it can be for example sudo yum install redhat-lsb-core for SUSE/RedHat/CentOS Linux(rpm based) or sudo apt-get install lsb-core for Ubuntu Linux, Debian (deb package based distributions).

For SUSE Linux Enterprise Server 15 SP4 distribution and OES 2023 distribution of Linux you can use:
wget https://download.opensuse.org/repositories/openSUSE:/Factory/standard/noarch/lsb-release-3.3-1.3.noarch.rpm
and after the package is downloaded install it by running the command:
rpm -ihv lsb-release-3.3-1.3.noarch.rpm —nodeps

On some Linux distributions (e.g. Open SUSE) it is also necessary to install insserv-compat package (for more information about the package, please refer to this page) to enable init scripts and start SecureAnyBox5 automatically. Installation of Linux Standard Base can be done manually by running the command:
sudo zypper install insserv-compat

If you decide not to install LSB or it is not available for your system, you still can register the starting script manually. We always create it in /etc/init.d/

We don’t support other JVMs than Oracle or Temurin Java. You can install Oracle/Temurin JVM manually, locate and use existing installation or choose private Temurin JVM installation. Tested and approved OpenJDK distribution from Adoptium – Eclipse Temurin JVM is always a part of the installation package. Optionally you can also select custom preinstalled Java runtime.

The default installation path is /opt/tdp/secureanybox, but you can choose whatever path/device you need.

Installation script then needs the IP address and port – this can be changed later, but you have to choose address:port combination which will not cause any conflict with other services running on the box. Thus we recommend starting with the default port. Once you enter the management console, you can change it or add more interfaces on a different address:port combinations. If a conflict will be detected, the system reverts to the last "good" configuration which allows you to continue.

It is highly recommended to switch to SSL (https) as soon as possible. You can use a built-in function for generating a self-signed certificate, or you can import your existing certificate with a private key (usually available in PKCS12 format). Please keep in mind, that interfaces are virtualized - it is necessary to set both IP address and URL otherwise system is not able to accept a request.

Please note – When using a custom JVM installation (such as Oracle), encryption policies may be restricted by default. You can download and apply unlimited encryption policies if it is legal in your country ( please refer to www.oracle.com for detailed information). You can’t use a password longer than 7 characters without application of unlimited policies.

In a case of upgrading the SecureAnyBox, the same installation script is used. Please confirm the same installation path like before and choose the default option NOT to overwrite the configuration file.

Upgrade on Linux

SecureAnyBox5 upgrade is provided by the installation script which is a part of the new release package downloaded from the website. Download the .bin package from the Downloads section at www.secureanybox5.com. Then start the installation by ./inst_secureanybox…

Upgrade on Linux - step 1

If your installation is standard with the embedded Oracle Java (recommended), answer No.

Upgrade on Linux - step 2

Then the script gets the path used for the previous installation and offers it as default. Confirm this path because this is an upgrade and the goal is to upgrade the existing installation – running instance.

Upgrade on Linux - step 3

The configuration.properties file must be preserved to upgrade the running system.
Confirm default answer N = not to overwrite

Upgrade on Linux - step 4

Now you are ready to start the new installed release – it will stop SecureAnyBox5 and rerun it. Once the new release is running, it will convert the database (if alteration is a part of the upgrade) seamlessly.
Don’t miss to authenticate to the system console and enter the configuration password if applied – otherwise, Agent support will not work.

Upgrade on Linux - step 5

Validate if HTPPS certificate is successfully imported on the station

Suppose the HTTPS keystore certificate is trusted on your Linux station. In that case, you can verify it in the terminal using this command:

python -c ‘import urllib2; import sys; resp = urllib2.urlopen("https://your.secureanyboxserveraddress.com"); rcode = resp.getcode(); body = resp.read(); print rcode; print "; print body;’

If validation is successful, the first row of the response is code 200.

If validation fails, an error is displayed.

urllib2.URLError:

If urllib2 not found

python ––version

Urllib2 is a built-in package of Python 2.×.×. To be able to run urllib2, it is necessary to have Python 2.×.x (recommended 2.7.18) installed properly. Some distributions of Linux may not have full version of Python 2.7.x installed. Try re-installing it.

wget https://www.python.org/ftp/python/2.7.18/Python-2.7.18.tgz

sudo tar xzf Python-2.7.18.tgz

cd Python-2.7.18/

sudo ./configure

sudo make altinstall

Installation steps of SecureAnyBox5 Agent

To install SecureAnyBox5 Agent, download the Agent Configuration file from the Downloads page in the SecureAnyBox section of the web interface. Click the configuration name to download. If the required configuration is missing, check that it includes settings for your platform.

Download Agent Configuration
MS Windows


To install the SecureAnyBox5 Agent on your Windows machine, first download the agent and the corresponding Agent Configuration file. After running the installer, double-click the secureanybox-agent.reg file to import the configuration into the Windows registry.


The agent automatically checks the configuration and connects with the server to update the password every 10 minutes. If the workstation is not yet registered, this process will register it. A successful registration is required to get the workstation password.


If you make any changes to the agent’s configuration on the server or rename the workstation, you must re-import the configuration file into the Windows registry. The agent will then register the workstation with the new values. This will happen during the next password change attempt, but you can force it by restarting the agent service. If re-registration fails, try deleting the original workstation registration. Workstations can also be registered manually.


To troubleshoot any issues, you can use the SecureAnyBox Agent Monitor, which is available on the SecureAnyBox/Downloads page. This utility displays a clear log of agent activities from the Windows Event Viewer.

macOS

Before installation, download the SecureAnyBox5 Agent and the macOS configuration file. Install the agent on your workstation. Once the installation is complete, run the configuration utility (sab-config), select the configuration file you downloaded, and apply it.

Linux

Before installation, download the SecureAnyBox5 Agent installation package for your Linux distribution, along with the Linux platform configuration file. After installing the agent, copy the configuration file (secureanybox-agent.properties) to the /etc/secureanybox folder, which was created during installation. This requires root permissions.

The new configuration will be applied automatically after 10 minutes. To apply it immediately, restart the agent by running /etc/init.d/secureanybox-agent restart in the terminal.

Requirements

For the agent to install and run successfully on Linux, your system must meet these requirements:

  • LSB (Linux Standard Base): Must be installed before the SecureAnyBox5 Agent.
  • Python 2.7: Version 2.7.18 is recommended. It must include the urllib2 package for the workstation to register successfully.
Installation of LSB

Linux Standard Base (lsb) must be installed. Linux Standard Base is available through various online repositories.

The installation procedure depends on your distribution. It can be, for example sudo yum install redhat-lsb-core for SUSE/RedHat/CentOS Linux(rpm based) or sudo apt-get install lsb-core for Ubuntu Linux, Debian (deb package-based distributions).

For SUSE Linux Enterprise Server 15 SP4 distribution and OES 2023 distribution of Linux, you can use:
wget https://rpmfind.net/linux/opensuse/distribution/leap/15.2/repo/oss/x86_64/lsb-4.0-lp152.4.4.×86_64.rpm
and after the package is downloaded, install it by running the command:
rpm -ihv lsb-4.0-lp152.4.4.×86_64.rpm —nodeps

On some Linux distributions (e.g. Open SUSE), it is also necessary to install insserv-compat package to enable init scripts and start SecureAnyBox5 Agent automatically. Installation of Linux Standard Base can be done manually by running the command:
sudo zypper install insserv-compat

Troubleshooting

In the case of problems with SecureAnyBox5 Agent, please refer to the log. Logging of the SecureAnyBox5 Agent on the Linux and macOS platforms runs automatically into a file var/log/secureanybox-agent.log. On Linux, you can even enable detailed debug logging in /etc/secureanybox/settings by renaming (or copying) the "settings.example" file to "settings" and uncommenting the "export SECUREANYBOX_AGENT_DEBUG = true" line.

The log file on the macOS platform can be viewed in the Console. The log file on the MS Windows platform is possible to view by using SecureAnyBox5 Monitor utility (download in SecureAnyBox/Downloads) or in the Windows Event Viewer.

Station that was previously registered fails to re-register
If the station was previously registered but cannot be registered after changes to the station, please first check that the station has the correct Agent Configuration uploaded. If the Agent Configuration on the station is correct, please go to the Station page in the SecureAnyBox part and remove the original registration of the station. The station should re-register automatically within 10 minutes. Alternatively, you can manually re-register the station.
Station that was previously registered fails to re-register after its station name was changed
If the station was previously registered but cannot be registered after change of its station name, please go to the Station page in the SecureAnyBox part and remove the original registration of the station. The station should re-register automatically within 10 minutes. Alternatively, you can manually re-register the station.
Station will not connect even though it has access to the server

If the station is not registered even though the station has access to the server, the most likely reason is an incorrect configuration of the Agent (e.g. the configuration has been changed on the server but not on the station) or a problem with HTTPS certificate verification. The HTTPS certificate must be imported as trusted on the Agent station. On Linux, it must be located in a Keystore that uses Python for certificate verification. This can be checked in the terminal using the command:

python -c ‘import urllib2; import sys; resp = urllib2.urlopen("https://your.secureanyboxserveraddress.com"); rcode = resp.getcode(); body = resp.read(); print rcode; print "; print body;’

If certificate validation is successful, on the first row of the response is code 200.

When the certificate validation fails, an error is displayed:

urllib2.URLError:

If urllib2 not found

  • Check which version of python is installed:

python —version

or

python -v

Urllib2 is a built-in package of Python 2.×.×. To be able to run urllib2, it is necessary to have Python 2.×.x (recommended 2.7.18) installed properly. Some distributions of Linux may not have a full version of Python 2.7.x installed. Try reinstalling it.

wget https://www.python.org/ftp/python/2.7.18/Python-2.7.18.tgz

sudo tar xzf Python-2.7.18.tgz

cd Python-2.7.18/

sudo ./configure

sudo make altinstall

Installation of SecureAnyBox5 Agent on macOS

To install SecureAnyBox5 Agent on macOS, run the installer (secureanybox-agent-1.×.pkg).
After running the installer, follow the steps. In step two, select the target disk for installation.

At the third step of the installation, it is possible to change an install location by clicking the appropriate button ( 1). To proceed with the installation, please click the Install button ( 2)

SecureAnyBox5Agent Installator

After clicking Install, enter your password to allow installation.

Enter the password to allow the installation

After installation, you will see a success message for SecureAnyBox5 Agent.

Installattion successfull

After closing the installer, go to the Applications list to find sab-config.

sab-config application

Launch the app by double-clicking its icon. Select the downloaded agent configuration file by clicking Select Configuration File. Then click Apply Configuration.

Select and apply the configuration

To apply the configuration, enter your user password.

Enter your password to apply the configuration

After uploading the configuration, a success message appears, and the Agent is fully installed.

Configuration updated

After the installation is complete, the SecureAnyBox5 Agent verifies that the uploaded agent configuration matches the configuration on the SecureAnyBox5 server. If so, it will automatically register the station.
If the SecureAnyBox5 Agent does not have access to the server, it is possible to register the station manually in the SecureAnyBox5 interface. In order for the agent to register the station, the SecureAnyBox5 server’s SSL certificate for macOS must be trusted. If the certificate is not issued by a CA that is already considered trusted in macOS, an error will occur when attempting to register:

2023-06-20 09:54:51 [ERROR] station registration failed – HTTP status = -1
2023-06-20 10:54:51 [ERROR] Error Code: -1202, Description: The certificate for
this server is invalid. You might be connecting to a server that is pretending
to be “172.22.78.78” which could put your confidential information at risk.

(See the log in the Console app – secureanybox.log, or in /var/log/secureanybox.log)

log in Console application

If needed, export the relevant certificate from the SecureAnyBox5 server interface, either from Administrative interface > Configuration > General/Web interface, or from SecureAnyBox > Agent configuration > General if you have a separate registration interface for agents.

Export certificate from Configuration Export certificate from Agent Configuration

Import the downloaded certificate into macOS Keychain – System section (by tapping or dragging) and set it as trusted. Then restart the agent from the terminal using the command:

launchctl stop com.tdp.secureanybox-agent

Export certificate from Agent Configuration

To allow the agent to set a password for an account or group, those accounts must not have a Secure Token set on macOS. Secure Token is set automatically for the account created with Apple’s Setup Assistant, and for accounts created under that account via Users and Groups in System Preferences. If the account to be managed has a Secure Token, the agent will fail to set the password:

2023-06-20 08:54:46 [ERROR] err4001 0×7fe9cc70a210
2023-06-20 08:54:46 [ERROR] Failed to change password for ‘sab5′ (Uknown)!

To check if an account has a Secure Token, use this command in Terminal:

sysadminctl -secureTokenStatus

You can deactivate Secure Token using the command:

sudo sysadminctl -secureTokenOff -password -adminUser -adminPassword

Then restart the agent with the command:

launchctl stop com.tdp.secureanybox-agent

Terminal window

Initialization of admin

After installation, SecureAnyBox5 starts, and the initialization page appears. To log in to the web interface, you must set the admin password first.

Init Admin

The Security Code field contains a unique code for your installation.
If not pre-filled, find it in the inst.id file in the SecureAnyBox5 server directory.
While entering the password, you can see its length, number of lowercase, uppercase, numbers, symbols, and its strength.
Click OK to confirm. After confirmation, the login page appears.

First login

FirstLoginContent

How to set automatic login of default user by SecureAnyBox5 Agent

Automatic login by SecureAnyBox5 can be set only for the station’s default user. Other users must log in manually. That is useful for stations used by multiple users, but primarily by a user with the lowest permissions. That user can be set as the default and will log in automatically.

To set up automatic login for SecureAnyBox5 Agent on stations, follow these steps:

Create Agent Configuration, where will be settings for all platforms of stations, on which you want install SecureAnyBox5 Agent.

At the Downloads page (in the SecureAnyBox section of the web interface), please select appropriate Agent Configuration and download the SecureAnyBox5 Agent and it’s configuration.

Download Agent Configuration

Install SecureAnyBox5 Agent on a station.

Installation steps for SecureAnyBox5 Agent:

SABAgentInstallationInfo

If in the Agent Configuration is set to change the password of a group, is necessary to have set local users group in which will be all users, who will be able to obtain the password from SecureAnyBox5. Default user has to be set as one of them.

To create a local group of users in MS Windows, please follow these steps:

On the desktop, right-click My Computer, and then click Manage.

In the Computer Management window, under System Tools, expand Local Users and Groups.

Right-click Groups, and then click New Group.

In the New Group dialog box, do the following:

Use this To do this
Group name Type the name of the group that you want to create.
Description Optionally, type a description for this group account.
Add Click Add to select members to add to the group.
Add all the user accounts that you want to the group.

Click Create.

Repeat steps 4 and 5 for the other required groups.

Click Close.

Click the Groups folder and verify that the group that you wanted to create are in the list.

Please set default user on your station.

If you want to update default user password by SecureAnyBox5 Agent, you need to have set a default user. Default user can log in to Windows automatically without entering his password.

To set default user for your station, please enter "netplwiz" into the Windows search field and click on the program in search results.

Windows searchs netplwiz

After clicking, User Accounts form displays. In a list of Users for this computer, please click on a user which will be set as default (1), uncheck Users must enter a user name and password to use this computer (2) and confirm this modification by clicking on the OK button (3).

Default user

After the restart of the station, the first automatic login should go through – the SecureAnyBox5 Agent sets the user’s password and changes it in the registers where the automatic login is stored. Password for default user can be obtained in SecureAnyBox at the Get Password page as for any other user.

Updating a password for default user in the Active Directory domain

Suppose the same default user is set on multiple stations. In that case, it’s useful to set password changes for the default user in Active Directory. When set up, after changing the LDAP user’s password, SecureAnyBox5 LDAP Agent checks all registered stations and changes the password for the default user on those stations.

To update a password for the default user in Active Directory, follow these steps:

Set Agent Configuration for stations. In Agent Configuration for LDAP platform set field Change password of to value default users in domain.

Default user in domain

If you not have set App URL in general configuration of SecureAnyBox,it is necessary to set it in the Agent Configuration. App URL has to be accessible from the internet (out of local network). Without setting of App URL, the SecureAnyBox5 Agent can have problems with connection to SecureAnyBox5 server.

Configure LDAP Agent. In LDAP Agent select Active Directory as Directory service and prepare Active Directory server.

Active Directory value in LDAP Agent form

Into LDAP Agent select the Agent Configuration, which you created in the first step.

Into the Default user domain field, enter Active Directory domain name into which default user belongs, and if necessary, modify the User id attribute. Please configure other required values in LDAP Agent form and create LDAP Agent by clicking on the OK button. To apply the LDAP Agent is necessary restarting SecureAnyBox5.

At the Downloads page, please select the Agent Configuration created in a first step and download the SecureAnyBox5 Agent and it’s configuration.

Please set default user on your station.

If you want to update default user password by SecureAnyBox5 Agent, you need to have set a default user. Default user can log in to Windows automatically without entering his password.

To set default user for your station, please enter "netplwiz" into the Windows search field and click on the program in search results.

Windows searchs netplwiz

After clicking, User Accounts form displays. In a list of Users for this computer, please click on a user which will be set as default (1), uncheck Users must enter a user name and password to use this computer (2) and confirm this modification by clicking on the OK button (3).

Default user

Install SecureAnyBox5 Agent on a station.

SABAgentDownloadInfo
SABAgentInstallationInfo

After successful installation of SecureAnyBox5 Agent, a station should automatically register in the SecureAnyBox5. Please check at the Stations page, that registration of the station ran successfully.

Registered station

When registering, SecureAnyBox5 Agent (for Windows) sends default user info, including the domain if it’s a domain user. If the default user is a domain user, the Agent does not set the password (it lacks permission). In that case, the LDAP Agent sets the password.

The LDAP Agent scans all registered stations and finds default users whose domain matches the one in the LDAP Agent Configuration. It generates and sets new passwords for these users. That happens at server start, every hour, and after clicking Execute.

Automatic authentication to KeyShield SSO

Depending on your configuration, users can authenticate via KeyShield SSO. For automatic authentication, install the KeyShield SSO client on the station.
Instructions for unattended installation are at KeyShield_server/static/kshield_msi.page. For manual installation/configuration, follow the screenshots:

KeyShield SSO Installation 1 KeyShield SSO Installation 2 KeyShield SSO Installation 3

OES client for Windows integration works like the former ClientTrust for BorderManager: KeyShield server creates a token and stores it as an attribute of the user’s object. The KeyShield client reads the value via the OES client for the Windows API, uses it as a challenge, generates a response, and sends it to the KeyShield server. The server validates the request and, if it is OK, accepts the authentication and sends confirmation. The client icon turns green to show that authentication is complete. The related setting is in the eDirectory connector of the KeyShield server (you can use multiple eDirectory trees, AD forests, etc.).

KeyShield SSO Installation 4

This is a custom setup, but not required. The best practice is to let KeyShield configure the eDirectory connector automatically.
First, enter the Connector ID and provide the LDAP server IP and port.

KeyShield SSO Installation 5

Then click "Create KeyShield SSO objects".

KeyShield SSO Installation 6

KeyShield SSO creates its own mgr account (proxy for eDirectory), extends the schema by an auxiliary class (removable) for tokens, and assigns minimum access rights.
After setup, automatic authentication with the OES client for Windows should work. If not, check the Diagnostic log.

Import certificate on MS Windows

Importing the certificate is necessary for automatic registration of the station into SecureAnyBox5 via HTTPS protocol.
To import the certificate, please follow these steps:

Click Start and into Windows search field please enter "mmc" (1) and click on the program in the search results (2).
Start Menu after searching for "mmc"

In the Console window, please click the File (1) → Add/Remove Snap-in(2).
"Microsoft Management Console window"

Select Certificates (1) in the left panel and click Add (2) to move a selection into the right panel. Then click the OK button (3).
Add or Remove Snap-Ins window

In the Certificates snap-in window, select Computer account option (1) and click Next button (2). At the next window click the Finish button (3).
Settings of Certificate Snap-In

In the Add or Remove Snap-ins window click OK button (1).
Add or Remove Snap-Ins window after certificate added

In the Console window, expand Certificates, and right-click Trusted Root CertificatesAll tasksImport
Import Certificate

In Certificate Import Wizard window click Next (1), and at the next screen please select certificate to import (2). When certificate select, please click Next (3).
CertificateImportWizard

Enter the certificate password (1), click Next (2), then Next (3) and Finish (4).
CertificateImportWizard
CertificateImportWizard

After import, the station should register in SecureAnyBox5 automatically (may take 10 minutes). For immediate registration, restart the SecureAnyBox5 Agent service.

Import certificate on macOS

To install a certificate on a Mac, download it and follow these steps:

To open Keychain Access, click Go in the Finder menu, then select Utilities.

In Utilities, click Keychain Access.

Note: Alternatively, you can open the Keychain Access by typing “Keychain Access” in the Spotlight search field at the top.

In Keychains, select System.

In the menu, select File > Import Items.

Browse to the .p12 or .pfx file, then open it.

Enter your admin password to authorize and click Modify Keychain.

Enter the password you used when creating the .p12 or .pfx file.

The SSL certificate should now be installed, and the station should register automatically.

Import Keyshield SSO certificate to Java Keystore

Download the KeyShield SSO certificate from the Certificate section of the KeyShield SSO server.

On the server where SecureAnyBox5 is installed, run a script like:
/bin/keytool -importcert -file -keystore /jre/lib/security/cacerts
where:
is the Java location for SecureAnyBox5 (e.g., /opt/tdp/secureanybox/jdk8/)
is the certificate file location (if running from the folder with the certificate, just enter the file name).

After importing the certificate, you can connect to the KeyShield SSO server and save the SecureAnyBox5 configuration.

Installing browser extension using GPO

Google Chrome

At first, install Chrome policy templates.

Group policy editor

Run GPEDIT (gpedit.msc).

In GPEDIT, go to Computer Configuration > Administrative templates > Google Chrome > Extensions > Configure the list of force-installed apps and extensions.
(Extensions in the list are installed silently, without user interaction, and cannot be uninstalled or disabled by the user.)

Add the SecureAnyBox5 Extension to the list in this format:
jmjiclmedngjhklhcafhkmbhmdiecgif;https://clients2.google.com/service/update2/crx
Where jmjiclmedngjhklhcafhkmbhmdiecgif is the extension ID. You can verify the ID from the Chrome store address.

Windows registry

Instead of GPEDIT, you can write settings directly to the Windows registry.
In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\ExtensionInstallForcelist, enter:
"1"="jmjiclmedngjhklhcafhkmbhmdiecgif;https://clients2.google.com/service/update2/crx"

Mozilla Firefox

At first, install Firefox policy templates.

Group policy editor

Run GPEDIT (gpedit.msc).

In GPEDIT, go to Computer Configuration > Administrative templates > Mozilla > Firefox > Extensions > Extensions to install.
(Extensions in the list are installed automatically.)

Add the path to the SecureAnyBox5 Extension file in one of these formats:

In GPEDIT, go to Computer Configuration > Administrative templates > Mozilla > Firefox > Extensions > Prevent extensions from being disabled or removed.
(Extensions in the list cannot be uninstalled or disabled by the user.)

Add the SecureAnyBox5 Extension ID: [email protected]

Windows registry

Instead of GPEDIT, you can write settings directly to the Windows registry.
In HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Mozilla\Firefox\Extensions\Install, enter:
"1"="http:///swb/down/secureanybox-1.1.14-fx.xpi"
And in HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Mozilla\Firefox\Extensions\Locked, enter:
"1"="[email protected]"

Recover SecureAnyBox5 data from backup

If you need to change the IP address in the configuration (e.g., after moving to another server), use the changeaddress utility in the SecureAnyBox5 server folder.
After starting the utility, confirm the note by pressing Enter.

The uploaded database includes all synchronized LDAP/Azure AD user accounts. If the user has previously logged into SecureAnyBox5, he or she can access SecureAnyBox5 without connecting to the LDAP/Azure AD server.

To restore SecureAnyBox5 data from backup, follow these steps:

Stop SecureAnyBox5 server

If you want to restore data from a backup to a new installation of SecureAnyBox5, do not start the server after installation, do not configure anything and stop the server if necessary.

If you need to change the IP address in the configuration (e.g., after moving to another server), use the changeaddress utility in the SecureAnyBox5 server folder.
After starting the utility, confirm the note by pressing Enter.

introductory note

Set the new IP address and ports for HTTP and HTTPS, then save (use Tab to move in the utility).

change address

After saving, you will be informed that the changes have been saved.

configuration changed

Select the backup zip file from which the data is to be restored.

Select the backup zip file from which the data is to be restored

Extract the files from the backup zip file to the SecureAnyBox5 server folder

Extract the files from the backup zip file to the SecureAnyBox5 server folder

Files can also be extracted using the command line (e.g. on a Linux server)

$ unzip -d

The user account that runs the script must have sufficient permissions.

Start SecureAnyBox5 server

When restoring data to a new SecureAnyBox5 server installation, you must also upload the license file.

Windows 11 Encrypted File System troubleshooting

If you have problems encrypting on Windows 11 while working with external files, check if:

You have the latest version of Windows 11.
- In particular, the initial version of Windows 11 is most likely to be affected.

You are not using Windows Home Edition
- Encrypted File System (EFS) is not available in the Windows Home edition. To be able to encrypt the files, you have to upgrade the Windows to Education, Enterprise, or Pro edition.

System drive if NTFS drive and not FAT32
- If you find that your system disk is formatted as FAT32, please change the format to NTFS to use the EFS function.

Enable EFS through Windows Registry

Open the Registry Editor
(Press Windows + R to open Run dialog box, type regedit and click OK.)

Once the Registry editor window opens, switch to the following location:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\FileSystem

Find the NtfsDisableEncryption and double-click on it to edit the value to 1. Once edited, press the Enter and hit OK button.

Enable EFS through Command Line

Start the Command Line as Administrator.
(Press Windows, type cmd (into the search bar) and click the Run as administrator option.)

When the Command Prompt window appears, enter fsutil behavior query disableEncryption to get status of the encryption.
To turn on the encryption, enter fsutil behavior set disableencryption 0.

To apply the new setting, it is necessary to reboot the station.

Additional information

CIDR format of subnet masks

SecureAnyBox5 stores subnets in CIDR notation.
The CIDR number is the count of 1’s in the subnet mask in binary. Use the table to find the CIDR equivalent of your subnet mask.

CIDR notation format Dotted decimal format Binary format
32 255.255.255.255 1111 1111 1111 1111 1111 1111 1111 1111
31 255.255.255.254 1111 1111 1111 1111 1111 1111 1111 1110
30 255.255.255.252 1111 1111 1111 1111 1111 1111 1111 1100
29 255.255.255.248 1111 1111 1111 1111 1111 1111 1111 1000
28 255.255.255.240 1111 1111 1111 1111 1111 1111 1111 0000
27 255.255.255.224 1111 1111 1111 1111 1111 1111 1110 0000
26 255.255.255.192 1111 1111 1111 1111 1111 1111 1100 0000
25 255.255.255.128 1111 1111 1111 1111 1111 1111 1000 0000
24 255.255.255.0 1111 1111 1111 1111 1111 1111 0000 0000
23 255.255.254.0 1111 1111 1111 1111 1111 1110 0000 0000
22 255.255.252.0 1111 1111 1111 1111 1111 1100 0000 0000
21 255.255.248.0 1111 1111 1111 1111 1111 1000 0000 0000
20 255.255.240.0 1111 1111 1111 1111 1111 0000 0000 0000
19 255.255.228.0 1111 1111 1111 1111 1110 0000 0000 0000
18 255.255.192.0 1111 1111 1111 1111 1100 0000 0000 0000
17 255.255.128.0 1111 1111 1111 1111 1000 0000 0000 0000
16 255.255.0.0 1111 1111 1111 1111 0000 0000 0000 0000
15 255.254.0.0 1111 1111 1111 1110 0000 0000 0000 0000
14 255.252.0.0 1111 1111 1111 1100 0000 0000 0000 0000
13 255.248.0.0 1111 1111 1111 1000 0000 0000 0000 0000
12 255.240.0.0 1111 1111 1111 0000 0000 0000 0000 0000
11 255.224.0.0 1111 1111 1110 0000 0000 0000 0000 0000
10 255.192.0.0 1111 1111 1100 0000 0000 0000 0000 0000
9 255.128.0.0 1111 1111 1000 0000 0000 0000 0000 0000
8 255.0.0.0 1111 1111 0000 0000 0000 0000 0000 0000
7 254.0.0.0 1111 1110 0000 0000 0000 0000 0000 0000
6 252.0.0.0 1111 1100 0000 0000 0000 0000 0000 0000
5 248.0.0.0 1111 1000 0000 0000 0000 0000 0000 0000
4 240.0.0.0 1111 0000 0000 0000 0000 0000 0000 0000
3 224.0.0.0 1110 0000 0000 0000 0000 0000 0000 0000
2 192.0.0.0 1100 0000 0000 0000 0000 0000 0000 0000
1 128.0.0.0 1000 0000 0000 0000 0000 0000 0000 0000

Dereference aliases

An alias is an entry which points to another object in the namespace – by containing its dn. Searching the entry that an alias entry points to is known as dereferencing an alias.
There are four modes of dereferencing aliases:

Example

In the directory have been set up two aliases:

In container "ou=People" are set up two other entries:

The following table summarizes the results of searching "ou=Employees" in different modes.

Dereference mode Results
Never no entries (because the "ou=Employees" alias never dereferenced)
Dereference while finding the base object no entries (because the "ou=Employees" alias never dereferenced)
Dereference while retrieving objects according to search scope two entries: "cn = Marie Smith, ou=People" and "cn = Robert Norman, ou=People" (because the "cn=Newbie, ou=People" alias never dereferenced)
Always three entries: "cn = Marie Smith, ou=People", "cn = Robert Norman, ou=People" and "cn= James Black, ou=NewHires"

Password Pattern Examples

Password pattern Entropy* Generated passwords (examples)
17 characters
CvddcVcAzduldAAvl 74.01 zi02gIfKT5Ah7frys Qo60histH3Pd4OQez hi82xOpGQ7Ft1Lzef
ZuAcVdAddcVlduldA 72.65 YLjvU9c67tol3Lc0P ETGgO0B66zek9Xi3M AIivE7q60kUr7Rt5y
uzVcsAnVdACCvdAnC 76.45 NCur]g6o5Ygru3Y[t CMul#F.A6mMfi8D(c BMEx/y_A9SFTy4S5X
dCVAAAAAdscVnuAnV 76.70 7siJIsnK0/ce$Cy*E 4WyKKsnr7$ky&Fu6A 4koceFZL7;wo
CvdscVcAznuldAAvl 77.13 Cy7)zYnVL5Vd4CYuo Za0&tEmAW4Qc7Lbon li7$rejUN*Og6Ixon
15 characters
vddcVcAZduldAvl 64.19 o56xYtWU6He9Sal a93vucrO8Gj5Oap u58xYnAI5Be5uic
AcdVAAVlCuldAdl 66.02 rz0ogHefmIf5A3w Eh1aSfegCYt7t5w pb1oPLYtPRg7P3n
uZcdVCVCZuAVcdA 65.94 ZIn7eMawIHDYk5W KAz9OCYgILLaz0t GYx0YCyfYWpiv2c
ZnAcVdnlAundCAV 66.65 A-LzI3:cPD;7SMy U$Xby2:ecG45nlU O4bpY6]wrQ71pMA
dCVAccAdcVduAdV 64.62 2gufrgC5by1Mm8u 3ZeFtbv7pa2NY9A 2Mavcqg2fO7Fa4u
12 characters
CulllduCldVz 53.25 rHevf4DXy1EZ bBuud7YKz2UM cCbtg8Zsy5IB
VAn*dAcVdlsu 53.50 Aj;O3mcy9b.H Ex2<7gmE8i-O UA2S8wry4y(W
ZVdAsCVndldA 52.34 UA2p/SU58k7b EO0C%HO@4s7r OI5c:Se*8e2r
uCldVdAsCVVA 52.56 Yxo8i3K>rUEF ZNs3U6g/BuAX Qwb6u6n&luYK
AcVdlsCuldAd 52.10 lty8i%JHy6F5 Cqu6t@xZk9m7 Ymu9i$XRh9t0
Easier to remember (alternating consonants and vowels)
cVcZdCvcddC 46.32 rumE9Zes04L kurA7jas53d tUlE8xiz14V
cvVcdVddzZzV 50.18 hyoh6Y78DUPO weyp8u59TYFA viyr8u33PIQI
cvcsdddcvcs 45.35 qab/141qor/ cyh/582wut@ guv$451vof@
CvcVsdcVcvd 46.45 GohI>5zini7 juny/7xYdi3 HamY&7dyqa4
zZzVdsdzZzV 47.03 PELa4[7TOQY GIKo1@5KAKU XAHa6#4NULa

* Password pattern entropy is counted as an average entropy of a hundred passwords that were generated based on the password pattern.

Password entropy

Password entropy measures how unpredictable a password is. Higher values are better.
SecureAnyBox5 recognizes four security levels based on entropy.

Password security   min. max. Description
really bad error 0 20 password should be changed immediately
unsatisfactory warning 20 35 password does not meet security standards, should be changed
satisfactory   35 50 password meets security standards, but it can be better
really good success 50 password is really secure

Examples of the use of Pattern Characters

To specify a set of characters to use when generating a password, enter them without separators (e.g., ‘abc’). The password will use only those characters.
To omit characters, start with ^ (e.g., ‘^0123′). The password will use allowed characters except those specified.

In Agent Configuration, you can use up to 3 different Pattern Characters settings. Each character in the password can use only one setting.

Recommended steps:

Characters used in generated passwords

lowercase vowels aeiouy
mixed case vowels AEIOUYaeiouy
uppercase vowels AEIOUY
lowercase consonants bcdfghjklmnpqrstvwxz
uppercase consonants BCDFGHJKLMNPQRSTVWXZ
mixed case consonants bcdfghjklmnpqrstvwxzBCDFGHJKLMNPQRSTVWXZ
lowercase alphabet characters abcdefghijklmnopqrstuvwxyz
uppercase alphabet characters ABCDEFGHIJKLMNOPQRSTUVWXYZ
mixed alphabet characters abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ
digits 0123456789
special charaters .@&*()<>_][%$#/\?;-:
Examples

To generate user-friendly passwords without easily interchangeable characters (like 0 and O, or I and l and 1):
Enter ^0O1Il in Pattern Characters 1 and as many ‘1’s in Password Pattern as the password length.

Example of password Pattern setting for a password without interchangeable characters

This setting will generate passwords such as: vZ\Z7q@hoqiPK, C_6wsK((AujbG, K(_H-T*C]c%fq

If you want to ommit all special characters also, just add all special charaters to the text in Pattern Characters 1 field.

Example of password Pattern setting for a password without interchangeable and special characters

This setting will generate passwords, such as: 2a5CMpdGUXytD, Zs7aPYqSUV8ps, AxnXkr5KZhFYw

To generate easily readable passwords (with alternating consonants and vowels):

For passwords where characters are alternating is necessary to set two pattern characters settings. Into the first pattern characters enter all consonants and into the second one enter all vowels. The password pattern field will be set as alternations of 1 and 2. A number of 1 and 2 depend on how many characters the new password should have.

Example of password pattern setting for a easily readable passwords

This setting will generate passwords, such as: fABOqucimac, minITafeJAl, NidedYvOKAt


To generate passwords that meet requirements (e.g., at least two capitals, one number, or a special character):

For passwords that conform to the password requirements, it is necessary to set all characters that can be used in the generated passwords as Pattern Characters 1, upper case characters as Pattern Characters 2, digits, and special characters as Pattern characters 3.

Example of password pattern setting that conform to the password requirements

As you can see on the image, in some cases, it can be simplier to specify characters to ommit. Text ‘^.&()<>_][%$#\?;:’ has same effect as text ‘abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789@-*/’

Example of password pattern setting that conform to the password requirements

This setting will generate passwords, such as: vaDB3/smCVR, oFhV62MQEvI, RWXZl2HiGth