Password Safe 24.
2
Getting Started Guide
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC:9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Table of Contents
Password Safe getting started guide 3
Workflow to add systems and accounts to Password Safe management 4
Use case preparation 5
Required service accounts 5
Preparation for Smart Groups 5
Use case 1: add local admin accounts for Windows servers 7
Use case 2: add local root accounts for Linux servers 13
Use case 3: add local admin accounts for network devices 19
Use case 4: add directory admin accounts for Windows servers 25
Use case 5: add directory admin accounts for Linux servers 28
Use case 6: add directory admin accounts for network devices 31
Use case 7: add dedicated directory accounts for Windows servers 34
Use case 8: dedicated directory accounts for Entra ID 38
Use case 9: define Just in Time access policies 41
Configure Password Safe access policies 41
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 2
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Password Safe getting started guide
This document is designed to help you understand the flow of a typical Password Safe implementation and to get you started with using
Password Safe by walking you through common use case examples.
Password Safe is your privileged access management solution to ensure your resources are protected from insider threats. It combines
privileged password and session management to discover, manage, and audit all privileged credential activity.
Password Safe creates and secures privileged accounts through automated password management, encryption, secure storage of
credentials, and a sealed operating system.This is designed to save you time and reduce the risk of human error.
Password Safe's random password generator algorithm does not use any common phrases or dictionary words as inputs or in its
generation. It selects each password character randomly from the list of allowable characters, numerals, and symbols to build the
password.
More specifically, you can use Password Safe to accomplish the following:
1. Scan, identify, and profile all assets for automated Password Safe management, ensuring no credentials are left unmanaged.
2. Control privileged user accounts, applications, SSH keys, cloud admin accounts, RPA accounts, and more.
3. Use adaptive access control for automated evaluation of just-in-time context for authorization access requests.
4. Monitor and record live sessions in real time and pause or terminate suspicious sessions.
5. Enable a searchable audit trail for compliance and forensics, and achieve complete control and accountability over privileged
accounts.
6. Restrict access to critical systems, including assets and applications, keeping them safe from potential inside threat risks.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 3
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Workflow to add systems and accounts to Password Safe
management
There are three ways to add systems and accounts to Password Safe:
l Add the asset manually.
l Run a Discovery Scan and then import the assets using an address group or directory query.
l Use API scripts.
The following is a high-level overview of the steps required to add systems and accounts to be managed in Password Safe.
1. Add the functional account: A functional account is one that can access the system with the privileges required to manage and
change passwords for shared accounts on the system.
2. Add the managed system: A managed system is a computer or device where one or more account passwords are to be
maintained by Password Safe. Managed systems can be Windows machines, Unix/Linux machines, network devices, databases,
firewalls, routers, iLO machines, and LDAP or Active Directory domains.
3. Add the managed account: A managed account is an account on the managed system whose password is being stored and
maintained through Password Safe. Typically, managed accounts are privileged accounts that can perform administrative tasks
on the managed system.
4. Configure managed system settings: After a system is added to Password Safe, configure settings that apply to the managed
system.
5. Set up role based access: Create user groups that permit users to:
l Log in to the Password Safe web portal.
l Assign Password Safe roles, such as Requester or Approver.
l Create access policies to permit accounts to access the systems, applications, and sessions, and to request password
releases.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 4
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Use case preparation
The use cases provided in this document use Smart Groups to accomplish the following:
l Discover assets and accounts using a Discovery Scan.
l Add assets and accounts into Password Safe management.
l Assign permissions and roles to user groups.
Required service accounts
Password Safe uses the following three types of service accounts that you must create in BeyondInsight prior to implementing the use
cases in this guide:
Credentials for Discovery Scans: Detailed and advanced Discovery Scans require a credential that has privileges to discover the
details for services, tasks, systems, devices, users, and databases from Active Directory or LDAP. To implement the use cases in this
guide, you must create a credential that has sufficient privileges to retrieve this information from your directory. You can create credentials
from the BeyondInsight Console, by navigating to Configuration > Discovery and Vulnerability Management > Credentials.
Functional Accounts: Smart Groups for adding assets into Password Safe management require a functional account that can access
the assets with the privileges required to manage and change passwords on the accounts associated with those assets. To implement the
use cases in this guide, you must create a functional account for each of the following:
l Windows servers
l Linux servers
l Network devices
Directory Credentials: Smart Groups for discovering Windows servers and directory accounts use a directory query for the Discovery
Scan to pull details from Active Directory or LDAP and populate the Smart Group. A directory query requires a directory credential that has
privileges to access the directory and request this information. To implement the use cases in this guide, you must create a directory
credential for each of the following:
l Windows servers
l Windows directory accounts
l Linux directory accounts
For more information, please see:
l Add Credentials for Use in Scans in the BeyondInsight User Guide at
https://www.beyondtrust.com/docs/beyondinsight-password-safe/bi/user/index.htm.
l Create a Functional Account in the Password Safe Admin Guide at https://www.beyondtrust.com/docs/beyondinsight-
password-safe/ps/admin/index.htm.
l Create and Edit Directory Credentials in the BeyondInsight User Guide at
https://www.beyondtrust.com/docs/beyondinsight-password-safe/bi/user/index.htm.
Preparation for Smart Groups
A Smart Group provides a way of grouping systems and accounts using filter conditions and actions called Smart Rules. The following
items must be configured in BeyondInsight prior to creating the smart groups for each use case:
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 5
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Directory Query: Smart Groups for discovering Windows servers and directory accounts use a directory query for the Discovery Scan to
pull details from Active Directory or LDAP and populate the Smart Group. You must create a directory query for each of the following:
l Windows servers
l Windows directory accounts
l Linux directory accounts
Address Group: Smart Groups for discovering Linux servers and network devices use address groups for the Discovery Scan to discover
and pull details for these assets from Active Directory or LDAP and populate the Smart Group. You need to create an address group for
each of the following:
l Linux servers
l Network devices
Access Policy: An access policy to allow approved RDP and SSH sessions must be configured so it can be assigned to user groups
when assigning roles and permissions for each of the use cases.
For more information, please see:
l Use Smart Rules to Organize Assets in the BeyondInsight User Guide at
https://www.beyondtrust.com/docs/beyondinsight-password-safe/bi/user/index.htm.
l Work with Smart Rules in the Password Safe Admin Guide at https://www.beyondtrust.com/docs/beyondinsight-
password-safe/ps/admin/index.htm.
l Create a Directory Query in the BeyondInsight User Guide at https://www.beyondtrust.com/docs/beyondinsight-
password-safe/bi/user/index.htm.
l Create an Address Group in the BeyondInsight User Guide at https://www.beyondtrust.com/docs/beyondinsight-
password-safe/bi/user/index.htm.
l Configure Access Policies in the Password Safe Admin Guide at https://www.beyondtrust.com/docs/beyondinsight-
password-safe/ps/admin/index.htm.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 6
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Use case 1: add local admin accounts for Windows servers
This use case walks through configuring the Smart Groups and user group roles and permissions required to enable automatic password
rotation for local admin accounts on Windows servers with auto-approval for RDP sessions enabled.
The shared local administrative account that exists on all Windows servers needs to be controlled, audited, and rotated on a regular
schedule. For this use case, you will bring in all Windows domain joined servers and manage the local built-in administrator account. You
will also grant permissions to a specific set of users who need access to all Windows servers. As you do not know if there are additional
local administrator accounts, you will configure a Smart Group to find them. You will also configure a Smart Group to ensure new servers
are added dynamically as they are joined to the domain on a recurring basis.
To accomplish all of the above, you must create the following Smart Groups in the BeyondInsight Console:
l An asset Smart Group for discovering the Windows servers
l An asset Smart Group for adding the Windows servers to Password Safe management
l A managed system Smart Group for granting system access to user groups
l A managed account Smart Group to add the local admin accounts to Password Safe management
You must also associate the managed account Smart Group to user groups, and then assign roles and permissions to the associated
managed account Smart Group.
Create asset based Smart Group to discover Windows servers
1. From the left menu in BeyondInsight, click Smart Rules.
2. Click Create Smart Rule.
3. Select the Category and enter a meaningful Name and Description for the Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 7
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Set Selection Criteria as:
l Directory Query, Include assets from query, <query
name>, Use to discover new assets during scans
(enabled)
l Enter the interval in hours to rerun the query to ensure new
servers that have joined the domain are automatically
captured
5. Set Actions as:
l Show asset as Smart Group, View assets in a standard
asset grid
6. Click Create Smart Rule.
You can now run a Discovery Scan against this Smart Group. In order to pull details, including local accounts, from each asset into
BeyondInsight, execute a scan with appropriate credentials.
You can initiate a scan from the vertical ellipsis menu for the Smart Group on the Smart Rules page in BeyondInsight. You can also
schedule a recurring scan to discover new assets and confirm the local accounts and services have not changed on the existing assets.
This is key to a dynamic onboarding process.
For more information on configuring a Discovery Scan, please see Run Discovery Scans in the BeyondInsight User Guide at
https://www.beyondtrust.com/docs/beyondinsight-password-safe/bi/user/discovery.htm.
Create asset-based Smart Group to add Windows servers to Password Safe
management
1. From the left menu in BeyondInsight, click Smart Rules.
2. Click Create Smart Rule.
3. Select the Category and enter a meaningful Name and Description for the Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 8
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Set Selection Criteria as:
l Operating System, contains, windows
l Asset fields, Domain Name, contains, domain
Note: The Operating System criteria is used to query servers
that have the same functional account. The action associates the
functional account with the system.
5. Set Actions as:
l Show asset as Smart Group, View assets in a standard
asset grid
l Manage Assets using Password Safe, Platform:
Windows, Account Name Format: Domain\Username,
Functional Account: <functional account name>
6. Click Create Smart Rule.
Note: To ensure new servers are automatically added to
Password Safe management, this Smart Group must be
repeatedly processed, especially after the last scan completes.
Create managed system Smart Group for granting system access to user groups
Creating this managed system Smart Group is not always required but it helps you to group systems that have specific managed accounts
associated with them and to assign asset level permissions to user groups. As the assets are added to Password Safe management, they
automatically populate within the All Managed Systems Smart Group.
This smart group specifically looks for all Windows servers that are managed by Password Safe.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 9
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed System from the Smart Rule Type filter list.
3. Click Create Smart Rule.
4. Select Managed Systems from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l Platforms, Windows
7. Set Actions as:
l Show managed system as Smart Group
8. Click Create Smart Rule.
Create managed account Smart Group to add accounts to Password Safe
management
The initial creation of this Smart Group only has the one account name of the built-in Administrator account. After researching and
reviewing reports, additional privileged account names may be added to this Smart Group.
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed Account from the Smart Rule Type filter list.
3. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 10
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Select Managed Accounts from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l User Account Attribute, Account Name, equals,
<Administrator>, Discover Accounts for Password Safe
Management: yes, Discover accounts from: <Smart
Group for adding Windows servers>
7. Set Actions as:
l Show managed account as Smart Group
l Manage Account Settings, Password Rule: <password
policy>, Enable Automatic Password Management:
yes, Change Password Time: <desired time>, Change
Password Frequency: <desired frequency>
Note: The Manage Account Settings action onboards the
specific account, if found in the system’s scan results. This action
also dictates whether the account is rotated immediately or not.
8. Click Create Smart Rule.
Assign user group permissions and roles for account access
Associate a user group to the Smart Group that you created for adding accounts to Password Safe management, and then assign
permissions, roles, and an access policy to the Smart Group. In this use case, the Password Safe users are Requestors with an access
policy to allow auto-approved RDP sessions.
1. From the left navigation in the BeyondInsight Console, click Configuration.
2. Under Role Based Access, click User Management.
3. Locate the user group in the grid, and then click the More Options (ellipsis) button for that group.
4. Select View Group Details.
5. From the Group Details pane, select Smart Groups.
6. In the Smart Groups Permissions grid, select the Smart Group
you created for adding the local Windows admin account to
Password Safe, and then click Assign Permissions above the
grid.
7. Select Assign Permissions Read Only.
8. Click the vertical ellipsis button for the Smart Group, and then select
Edit Password Safe Roles.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 11
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
9. Select the Requestor role, and then select the Access Policy.
10. Click Save Roles.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 12
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Use case 2: add local root accounts for Linux servers
This use case walks through configuring automatic password rotation for local admin accounts on Linux servers with auto-approval for
SSH sessions enabled.
Root level accounts on all Linux servers should be controlled, audited, and rotated on a regular schedule. For this use case, you will bring
in all Linux and Unix servers and manage the local root account. You will also grant permissions to a specific set of users who need access
to all Linux servers.
To accomplish all of the above, you must create the following smart groups in the BeyondInsight Console:
l An asset Smart Group for discovering the Linux servers
l An asset Smart Group for adding the Linux servers to Password Safe management
l A managed system Smart Group for granting system access to user groups
l A managed account Smart Group to add the local admin accounts to Password Safe management
You must also associate the managed account Smart Group to user groups, and then assign roles and permissions to the associated
managed account Smart Group.
Create asset based Smart Group to discover Linux servers
1. From the left menu in BeyondInsight, click Smart Rules.
2. Click Create Smart Rule.
3. Select the Category and enter a meaningful Name and Description for the Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 13
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Set Selection Criteria as:
l Address Group, <address group name>, Use to
discover new assets during scans (enabled)
l Enter the interval in hours to rerun the query to ensure new
servers that have joined the domain are automatically
captured
5. Set Actions as:
l Show asset as Smart Group, View assets in a standard
asset grid
6. Click Create Smart Rule.
You can now run a Discovery Scan against this Smart Group. In order to pull details, including local accounts, from each asset into
BeyondInsight, execute a scan with appropriate credentials.
You can initiate a scan from the vertical ellipsis menu for the Smart Group on the Smart Rules page in BeyondInsight. You can also
schedule a recurring scan to discover new assets and confirm the local accounts and services have not changed on the existing assets.
This is key to a dynamic onboarding process.
Note: Since an address group is a static list of hosts, this Smart Group doesn’t need to reprocess often -- only when known
changes to the address group have been made.
For more information on configuring a Discovery Scan, please see Run Discovery Scans in the BeyondInsight User Guide at
https://www.beyondtrust.com/docs/beyondinsight-password-safe/bi/user/discovery.htm.
Create asset based Smart Group to add Linux servers to Password Safe
management
1. From the left menu in BeyondInsight, click Smart Rules.
2. Click Create Smart Rule.
3. Select the Category and enter a meaningful Name and Description for the Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 14
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Set Selection Criteria as:
l Operating System, contains, linux
Note: The Operating System criteria is used to query servers
that have the same functional account. The action associates the
functional account with the system.
5. Set Actions as:
l Show asset as Smart Group, View assets in a standard
asset grid
l Manage Assets using Password Safe, Platform: Linux,
Account Name Format: SAM, Functional Account:
<functional account name>
6. Click Create Smart Rule.
Note: To ensure new servers are automatically added to
Password Safe management, this Smart Group must be
repeatedly processed, especially after the last scan completes.
Create managed system Smart Group for granting system access to user groups
Creating this managed system Smart Group is not always required but it helps you to group systems that have specific managed accounts
associated with them and to assign asset level permissions to user groups. As the assets are added to Password Safe management, they
automatically populate within the All Managed Systems Smart Group.
This smart group specifically looks for all Linux servers that are managed by Password Safe.
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed System from the Smart Rule Type filter list.
3. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 15
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Select Managed Systems from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l Platforms, Linux
7. Set Actions as:
l Show managed system as Smart Group
8. Click Create Smart Rule.
Create managed account Smart Group to add accounts to Password Safe
management
The initial creation of this Smart Group only has the one account name of the root account. After researching and reviewing reports,
additional privileged account names may be added to this Smart Group.
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed Account from the Smart Rule Type filter list.
3. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 16
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Select Managed Accounts from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l User Account Attribute, Account Name, equals, root,
Discover Accounts for Password Safe Management:
yes, Discover accounts from: <Smart Group for adding
Linux servers>
7. Set Actionsas:
l Show managed account as Smart Group
l Manage Account Settings, Password Rule: <password
policy>, Enable Automatic Password Management:
yes, Change Password Time: <desired time>, Change
Password Frequency: <desired frequency>
Note: The Manage Account Settings action onboards the
specific account, if found in the system’s scan results. This action
also dictates whether the account is rotated immediately or not.
8. Click Create Smart Rule.
Assign user group permissions and roles for account access
Associate a user group to the Smart Group that you created for adding accounts to Password Safe management, and then assign
permissions, roles, and an access policy to the Smart Group. In this use case, the Password Safe users are Requestors with an access
policy to allow auto-approved SSH sessions.
1. From the left navigation in the BeyondInsight console, click Configuration.
2. Under Role Based Access, click User Management.
3. Locate the user group in the grid, and then click the vertical ellipsis button for that group.
4. Select View Group Details.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 17
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
5. From the Group Details pane, select Smart Groups.
6. In the Smart Groups Permissions grid, select the Smart Group
you created for adding the Linux root account to Password Safe,
and then click Assign Permissions above the grid.
7. Select Assign Permissions Read Only.
8. Click the vertical ellipsis button for the Smart Group, and then select
Edit Password Safe Roles.
9. Select the Requestor role, and then select the Access Policy.
10. Click Save Roles.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 18
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Use case 3: add local admin accounts for network devices
This use case walks through configuring automatic password rotation for local admin accounts on network devices with auto-approval for
SSH sessions enabled.
Admin level accounts exist on all network devices that need to be controlled, audited, and rotated on a regular schedule. For this use case,
you will import all Cisco switches (or network devices from other vendors that allow administration via SSH) and manage the local admin
account. You will also grant permissions to a specific set of users who need access to all network devices.
To accomplish all of the above, you must create the following Smart Groups in the BeyondInsight console:
l An asset Smart Group for discovering the devices
l An asset Smart Group for adding the devices to Password Safe management
l A managed system Smart Group for granting system access to user groups
l A managed account Smart Group to add the local admin accounts to Password Safe management
You must also associate the managed account Smart Group with user groups, and then assign roles and permissions to the associated
managed account Smart Group.
Create asset-based Smart Group to discover network devices
1. From the left menu in BeyondInsight, click Smart Rules.
2. Click Create Smart Rule.
3. Select the Category and enter a meaningful Name and Description for the Smart Rule.
4. Set Selection Criteria as:
l Address Group, <address group name>, Use to
discover new assets during scans (enabled)
l Enter the interval in hours to rerun the query to ensure new
servers that have joined the domain are automatically
captured
5. Set Actions as:
l Show asset as Smart Group, View assets in a standard
asset grid
6. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 19
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
You can now run a Discovery Scan against this Smart Group. In order to pull details, including local accounts, from each asset into
BeyondInsight, execute a scan with appropriate credentials.
You can initiate a scan from the vertical ellipsis menu for the Smart Group on the Smart Rules page in BeyondInsight. You can also
schedule a recurring scan to discover new assets and confirm the local accounts and services have not changed on the existing assets.
This is key to a dynamic onboarding process.
Note: Since an address group is a static list of hosts, this Smart Group doesn’t need to reprocess often -- only when known
changes to the address group have been made.
For more information on configuring a Discovery Scan, please see Run Discovery Scans in the BeyondInsight User Guide at
https://www.beyondtrust.com/docs/beyondinsight-password-safe/bi/user/discovery.htm.
Create asset-based Smart Group to add network devices to Password Safe
management
1. From the left menu in BeyondInsight, click Smart Rules.
2. Click Create Smart Rule.
3. Select the Category and enter a meaningful Name and Description for the Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 20
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Set Selection Criteria as:
l Operating System, contains, cisco
Note: The Operating System criteria is used to query servers
that have the same functional account. The action associates the
functional account with the system.
5. Set Actions as:
l Show asset as Smart Group, View assets in a standard
asset grid
l Manage Assets using Password Safe, Platform: Cisco,
Account Name Format: SAM, Functional Account:
<functional account name>
6. Click Create Smart Rule.
Note: To ensure new servers are automatically added to
Password Safe management, this Smart Group must be
repeatedly processed, especially after the last scan completes.
Create managed system Smart Group for granting system access to user groups
Creating this managed system Smart Group is not always required but it helps you to group systems that have specific managed accounts
associated with them and to assign asset level permissions to user groups. As the assets are added to Password Safe management, they
automatically populate within the All Managed Systems Smart Group.
This Smart Group specifically looks for all network devices that are managed by Password Safe.
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed System from the Smart Rule Type filter list.
3. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 21
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Select Managed Systems from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l Platforms, Cisco
7. Set Actions as:
l Show managed system as Smart Group
8. Click Create Smart Rule.
Create managed account Smart Group to add accounts to Password Safe
management
The initial creation of this Smart Group only has the one account name of the local admin account. After researching and reviewing
reports, additional privileged account names may be added to this Smart Group.
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed Account from the Smart Rule Type filter list.
3. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 22
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Select Managed Accounts from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l User Account Attribute, Account Name, equals,
<Admin>, Discover Accounts for Password Safe
Management: yes, Discover accounts from: <Smart
Group for adding network devices>
7. Set Actionsas:
l Show managed account as Smart Group
l Manage Account Settings, Password Rule: <password
policy>, Enable Automatic Password Management:
yes, Change Password Time: <desired time>, Change
Password Frequency: <desired frequency>
Note: The Manage Account Settings action onboards the
specific account, if found in the system’s scan results. This action
also dictates whether the account is rotated immediately or not.
8. Click Create Smart Rule.
Assign user group permissions and roles for account access
Associate a user group with the Smart Group that you created for adding accounts to Password Safe management, and then assign
permissions, roles, and an access policy to the Smart Group. In this use case, the Password Safe users are Requestors with an access
policy to allow auto-approved RDP sessions.
1. From the left navigation in the BeyondInsight console, click Configuration.
2. Under Role Based Access, click User Management.
3. Locate the user group in the grid, and then click the More Options (ellipsis) button for that group.
4. Select View Group Details.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 23
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
5. From the Group Details pane, select Smart Groups.
6. In the Smart Groups Permissions grid, select the Smart Group
you created for adding the Cisco Admin account to Password Safe,
and then click Assign Permissions above the grid.
7. Select Assign Permissions Read Only.
8. Click the vertical ellipsis button for the Smart Group, and then select
Edit Password Safe Roles.
9. Select the Requestor role, and then select the Access Policy.
10. Click Save Roles.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 24
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Use case 4: add directory admin accounts for Windows servers
This use case walks through configuring automatic password rotation for directory admin accounts on Windows servers with auto-
approval for RDP sessions enabled.
Directory accounts that have elevated (privileged) access exist within Active Directory. These accounts have permissions to all domain
joined Windows servers and should be controlled, audited, and rotated on a regular schedule. For this use case, Password Safe is already
managing all Windows domain joined servers by implementing Use Case 1 and a specific set of users are allowed to use these shared
accounts.
Since you have already configured asset Smart Groups for discovering assets, asset Smart Groups for adding systems to Password Safe
management, and managed systems Smart Groups for granting system access from previous use cases, you do not need to create any
additional Smart Groups for these purposes.
If you need to add additional servers to Password Safe, you can create new Smart Groups using different address groups or directory
queries as applicable, and run new scans as applicable, following the steps outlined in previous use cases.
Additionally, if you require only a subset of systems to be allowed to use these directory accounts, you can create a new managed system
Smart Group using more specific selection criteria to provide access to a smaller selection of systems.
For this use case, you will create a managed account Smart Group to add the directory accounts to Password Safe and to link the
directory accounts to managed systems.
You must also associate the managed account Smart Group with user groups, and then assign roles and permissions to the associated
managed account Smart Group.
For more information, please see "Use case 1: add local admin accounts for Windows servers" on page 7.
Create managed account Smart Group to add directory accounts to Password
Safe and configure account linking
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed Account from the Smart Rule Type filter list.
3. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 25
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Select Managed Accounts from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l Directory Query, Include Accounts from Directory
Query, <query name>, Discover Accounts for
Password Safe Management: enabled
Tip: If Password Safe already manages the privileged accounts,
you can use criteria of Managed Account Fields > Account
Name in the Smart Rule instead of using a directory query. For an
example of this option, please see "Use case 6: add directory
admin accounts for network devices" on page 31.
7. Set Actions
l Link domain accounts to Managed Systems, Asset or
Managed System Smart Group: <Smart Group that
contains Windows servers that the accounts will be
associated to for session management>
l Manage Account Settings, Password Rule: <password
policy>, Enable Automatic Password Management: no
l Show managed account as Smart Group
Note: The Manage Account Settings action onboards the
specific account, if found in the system’s scan results. This action
also dictates whether the account is rotated immediately or not.
Tip: These actions can be separated into multiple managed
account Smart Groups with criteria of Child Smart Rule or other
specific criteria for the linking rule action, if desired.
8. Click Create Smart Rule.
Assign user group permissions and roles for account access
Associate a user group to the Smart Group that you created for adding accounts to Password Safe management, and then assign
permissions, roles, and an access policy to the Smart Group. In this use case, the Password Safe users are Requestors with an access
policy to allow auto-approved RDP sessions.
1. From the left navigation in the BeyondInsight Console, click Configuration.
2. Under Role Based Access, click User Management.
3. Locate the user group in the grid, and then click the vertical ellipsis button for that group.
4. Select View Group Details.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 26
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
5. From the Group Details pane, select Smart Groups.
6. In the Smart Groups Permissions grid, select the Smart Group
you created for adding Windows directory accounts to Password
Safe, and then click Assign Permissions above the grid.
7. Select Assign Permissions Read Only.
8. Click the vertical ellipsis button for the Smart Group, and then select
Edit Password Safe Roles.
9. Select the Requestor role, and then select the Access Policy.
10. Click Save Roles.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 27
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Use case 5: add directory admin accounts for Linux servers
This use case walks through configuring automatic password rotation for directory admin accounts on Linux servers with auto-approval for
SSH sessions enabled.
Directory accounts that have elevated (privileged) access exist within Active Directory. These accounts have permissions to all domain
joined Windows servers and should be controlled, audited, and rotated on a regular schedule. For this use case, Password Safe is already
managing all Linux domain joined servers by implementing Use Case 2, and a specific set of users are allowed to use these shared
accounts.
Since you have already configured asset Smart Groups for discovering assets, asset Smart Groups for adding systems to Password Safe
management, and managed systems Smart Groups for granting system access from previous use cases, you do not need to create any
additional Smart Groups for these purposes.
If you need to add additional servers to Password Safe, you can create new Smart Groups using different address groups or directory
queries as applicable, and run new scans as applicable, following the steps outlined in previous use cases.
Additionally, if you require only a subset of systems to be allowed to use these directory accounts, you can create a new managed system
Smart Group using more specific selection criteria to provide access to a smaller selection of systems.
For this use case, you will create a managed account Smart Group to add the directory accounts to Password Safe and to link the
directory accounts to managed systems.
You must also associate the managed account Smart Group with user groups, and then assign roles and permissions to the associated
managed account Smart Group.
For more information, please see "Use case 2: add local root accounts for Linux servers" on page 13.
Create managed account Smart Group to add directory accounts to Password
Safe and configure account linking
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed Account from the Smart Rule Type filter list.
3. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 28
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Select Managed Accounts from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l Directory Query, Include Accounts from Directory
Query, <query name>, Discover Accounts for
Password Safe Management: enabled
Tip: If Password Safe already manages the privileged accounts,
you can use criteria of Managed Account Fields > Account
Name in the Smart Rule instead of using a directory query. For an
example of this option, please see "Use case 6: add directory
admin accounts for network devices" on page 31.
7. Set Actions
l Link domain accounts to Managed Systems, Asset or
Managed System Smart Group: <Smart Group that
contains Linux servers that the accounts will be
associated to for session management>
l Manage Account Settings, Password Rule: <password
policy>, Enable Automatic Password Management: no
l Show managed account as Smart Group
Note: The Manage Account Settings action onboards the
specific account, if found in the system’s scan results. This action
also dictates whether the account is rotated immediately or not.
Tip: These actions can be separated into multiple managed
account Smart Groups with criteria of Child Smart Rule or other
specific criteria for the linking rule action, if desired.
8. Click Create Smart Rule.
Assign user group permissions and roles for account access
Associate a user group with the Smart Group that you created for adding accounts to Password Safe management, and then assign
permissions, roles, and an access policy to the Smart Group. In this use case, the Password Safe users are Requestors with an access
policy to allow auto-approved RDP sessions.
1. From the left navigation in the BeyondInsight console, click Configuration.
2. Under Role Based Access, click User Management.
3. Locate the group in the grid, and then click the vertical ellipsis button for that group.
4. Select View Group Details.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 29
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
5. From the Group Details pane, select Smart Groups.
6. In the Smart Groups Permissions grid, select the Smart Group
you created for adding directory accounts for Linux servers to
Password Safe, and then click Assign Permissions above the
grid.
7. Select Assign Permissions Read Only.
8. Click the vertical ellipsis button for the Smart Group, and then select Edit Password Safe Roles.
9. Select the Requestor role, and then select the Access Policy.
10. Click Save Roles.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 30
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Use case 6: add directory admin accounts for network devices
This use case walks through configuring automatic password rotation for local admin accounts on network devices with auto-approval for
RDP sessions enabled.
Directory accounts that have elevated (privileged) access exist within Active Directory. These accounts have permissions to all network
devices and need to be controlled, audited, and rotated on a regular schedule. For this use case, Password Safe is already managing
network devices by implementing Use Case 3, and a specific set of users are allowed to use these shared accounts.
Since you have already configured asset Smart Groups for discovering assets, asset Smart Groups for adding devices to Password Safe
management, and managed systems Smart Groups for granting system access from previous use cases, you do not need to create any
additional Smart Groups for these purposes.
If you need to add additional devices to Password Safe, you can create new Smart Groups using different address groups and run new
scans following the steps outlined in previous use cases.
Additionally, if you require only a subset of systems to be allowed to use these directory accounts, you can create a new managed system
Smart Group using more specific selection criteria to provide access to a smaller selection of devices.
For this use case, you will create a managed account Smart Group to link the directory accounts to the managed systems using the
Managed Account Fields > Account Name criteria.
You must also associate the managed account Smart Group to user groups, and then assign roles and permissions to the associated
managed account Smart Group.
For more information, please see "Use case 3: add local admin accounts for network devices" on page 19.
Create managed account Smart Group to link directory accounts to managed
system
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed Account from the Smart Rule Type filter list.
3. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 31
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Select Managed Accounts from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l Managed Account Fields, Account Name, equals,
<name>
7. Set Actions
l Show managed account as Smart Group
l Link domain accounts to Managed Systems, Asset or
Managed System Smart Group: <Smart Group that
contains network devices that the accounts will be
associated to for session management>
Tip: These actions can be separated into multiple managed
account Smart Groups with criteria of Child Smart Rule or other
specific criteria for the linking rule action, if desired.
8. Click Create Smart Rule.
Assign user group permissions and roles for account access
Associate a user group with the Smart Group that you created for adding accounts to Password Safe management, and then assign
permissions, roles, and an access policy to the Smart Group. In this use case, the Password Safe users are Requestors with an access
policy to allow auto-approved RDP sessions.
1. From the left navigation in the BeyondInsight console, click Configuration.
2. Under Role Based Access, click User Management.
3. Locate the user group in the grid, and then click the vertical ellipsis button for that group.
4. Select View Group Details.
5. From the Group Details pane, select Smart Groups.
6. In the Smart Groups Permissions grid, select the Smart Group
you created for linking AD Cisco accounts to managed systems,
and then click Assign Permissions above the grid.
7. Select Assign Permissions Read Only.
8. Click the vertical ellipsis button for the Smart Group, and then select
Edit Password Safe Roles.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 32
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
9. Select the Requestor role, and then select the Access Policy.
10. Click Save Roles.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 33
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Use case 7: add dedicated directory accounts for Windows servers
This use case walks through configuring automatic password rotation for dedicated directory accounts on Windows servers.
Individual administrative accounts that exist within Active Directory have permissions to all domain joined Windows servers and should be
controlled, audited, and rotated on a regular schedule. For this use case, Password Safe is already managing all Windows domain joined
servers by implementing Use Case 1. You have a specific set of user accounts which have a corresponding privileged account within
Active Directory that needs to be accessible via Password Safe, but still restricted to only being used by that individual. This is considered
to be a dedicated account in Password Safe.
If, in previous use cases, you already implemented asset Smart Groups for discovering assets and adding systems to Password Safe
management, as well as managed systems Smart Groups for granting system access to user groups, you do not need to create any
additional Smart Groups for these purposes. However, if you want to discover specific domain controllers, you can create a new Smart
Group for that purpose. It is the same concept as documented in Use Case 1, except you need to create a directory query to pull in domain
controllers instead of the Windows OU.
If you need to add additional servers to Password Safe, you can create new Smart Groups, using different address groups and directory
queries as applicable, and run new scans as applicable, following the steps outlined in previous use cases.
Additionally, if you require only a subset of systems to be allowed to use these directory accounts, you can create a new managed system
Smart Group using more specific selection criteria to provide access to a smaller selection of systems.
For this use case, you must create two managed account Smart Groups. The first will be the managed account Smart Group for adding
accounts to Password Safe management and to link accounts to managed systems. The second Smart Group maps dedicated accounts
to users.
For more information, please see "Use case 1: add local admin accounts for Windows servers" on page 7.
Create managed account Smart Group to add dedicatedaccounts to Password
Safe and configure account linking
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed Account from the Smart Rule Type filter list.
3. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 34
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Select Managed Accounts from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l Directory Query, Include Accounts from Directory
Query, <query name>, Discover Accounts for
Password Safe Management: enabled
7. Set Actions
l Link domain accounts to Managed Systems, Asset or
Managed System Smart Group: <Smart Group that
contains Windows servers that the accounts will be
associated to for session management>
l Manage Account Settings, Password Rule: <password
policy>, Enable Automatic Password Management: no
l Show managed account as Smart Group
Note: The Manage Account Settings action onboards the
specific account, if found in the system’s scan results. This action
also dictates whether the account is rotated immediately or not.
Tip: These actions can be separated into multiple managed
account Smart Groups with criteria of Child Smart Rule or other
specific criteria for the linking rule action, if desired.
8. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 35
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Create managed account Smart Group to map dedicated accounts to Password
Safe users
Note: This managed account Smart Group restricts the access to the individual correlating user by filtering the account name
with a suffix or prefix, and then mapping the dedicated account to a user group. The user group must exist in BeyondInsight
already to complete the rule action for this Smart Group.
IMPORTANT!
The privileged directory account and the unprivileged account you are mapping to must match. You must have a preconfigured
naming convention to allow for the match. If the prefix or suffix does not exist, the mapping action in the Smart Rule will not be
successful.
1. From the left menu in BeyondInsight, click Smart Rules.
2. Select Managed Account from the Smart Rule Type filter list.
3. Click Create Smart Rule.
4. Select Managed Accounts from the Category list.
5. Enter a meaningful Name and Description for the Smart Rule.
6. Set Selection Criteria as:
l Dedicated Account, Account Name, with Suffix,
<applicable suffix>
7. Set Actions
l Map Dedicated Accounts to, User Group, <user group
name>
l Show managed account as Smart Group
8. Click Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 36
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Assign user group permissions and roles for account access
Associate a user group to the Smart Group that you created for adding accounts to Password Safe management, and then assign
permissions, roles, and an access policy to the Smart Group. In this use case, the Password Safe users are Requestors with an access
policy to allow auto-approved RDP sessions.
The user group has a read permission assigned to the Smart Group that was created for mapping the dedicated account. Next you must
assign the Password Safe role to it. Even though the entire user group is assigned to the managed account Smart Group because of the
dedicated account criteria, only the user with the matching name sees the privileged account within Password Safe.
Note: If there are privileged accounts that do not have a corresponding user to match with, they are treated as shared
accounts and seen by all users in that same user group, similar to use cases 1 and 4.
1. From the left navigation in the BeyondInsight console, click Configuration.
2. Under Role Based Access, click User Management.
3. Locate the user group in the grid, and then click the vertical ellipsis button for that group.
4. Select View Group Details.
5. From the Group Details pane, select Smart Groups.
6. In the Smart Groups Permissions grid, select the Smart Group
you created for adding dedicated accounts to Password Safe, and
then click the vertical ellipsis button for that group.
7. Select Edit Password Safe Roles.
8. Select the Requestor role, and then select the Access Policy.
9. Click Save Roles.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 37
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Use case 8: dedicated directory accounts for Entra ID
This use case walks through configuring automatic password rotation for dedicated directory accounts for Entra ID.
Individual administrative accounts that exist within Entra ID have permissions to all Entra ID and should be controlled, audited, and rotated
on a regular schedule. You have a specific set of user accounts which have a corresponding privileged account within Entra ID that must
be accessible via Password Safe, but still restricted to only being used by that individual. This is considered to be a dedicated account in
Password Safe.
Previous use cases covered using asset Smart Groups for discovering assets and adding systems to Password Safe management, as
well as managed account smart groups for granting access to user groups. To discover and onboard Entra ID accounts, the same concept
is documented in Use Case 1, with the exception that you must first create an Entra ID managed system and then use a smart rule to pull
in matching accounts from Entra ID.
Additionally, if you require only a subset of users to be allowed to use these directory accounts, you can create a new managed account
Smart Group using more specific selection criteria to provide access to a smaller selection of accounts.
Use a dedicated account smart rule to assign a mapping between an Entra ID privileged account and a corresponding Password Safe
user to restrict use of that account to that specific user.
For more information, please see the following:
l Use Case 1: Add Local Admin Accounts for Windows Servers
l Use Dedicated Account Smart Rule
l Adding a Managed System Manually
Use an Entra ID Smart Rule
An Entra ID Smart Rule enables Password Safe to automatically discover Entra ID accounts. This allows privileged accounts in Entra ID to
be managed, including password rotation and check-in and check-out. RDP sessions, from an Azure-joined VM, can use Entra ID
credentials to connect to an Azure-joined VM.
Follow the steps below to discover Entra ID accounts.
1. From the left menu, click Smart Rules.
2. Select Managed Account from the Smart Rule type filter dropdown.
3. Click + Create Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 38
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
4. Configure the rule as follows:
l Category: Select Managed Accounts.
l Name: Provide a meaningful name and description that
allows for easy identification of the Smart Rule.
l Reprocessing Limit: If desired, select a reprocessing limit.
l Under Selection Criteria:
o Select Azure Directory Query from the dropdown.
There are several filters, and options are dynamic,
depending on other selections:
n Include ALL or ANY of the selection criteria.
n There are two matching options available for
discovering Entra ID accounts: Group Name
and User Principle Name. Use a Group
Name match to discover all accounts that
are a member of the specified group. Use a
User Principle Name match to allow a
partial name match.
n If using a Group Name, equals is the only
match option. Enter the Group Name.
n If using a User Principle Name, select
starts with or ends with and enter the
name.
o Set the value for how many hours for rerunning the
query.
o Check the Discover accounts in Azure synced
from on-premise option to include Entra ID
accounts synced from on-premises Entra ID, as well
as Azure-only accounts.
o Leave Discover accounts for Password Safe
Management checked.
o Select an Azure domain from the dropdown.
o Add additional selection criteria and groups, as
required.
5. Under Actions, select Show managed account as Smart Group,
and then add other actions as required to manage settings or work
with the managed account.
6. Click Create Smart Rule.
Tip: To view the contents of a Smart Rule when creating a new rule or editing an existing rule:
l Once the rule is saved, click View Results.
l You are taken to the associated grid, where the contents of the Smart Rule are listed.
l If the rule is actively processing, a banner displays letting you know that.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 39
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Note:
l View Results displays only if you have permissions to the grid corresponding to the Smart Rule, i.e.; Assets, Managed
Accounts, Managed Systems.
l The Smart Rule must be saved with Show <entity> as Smart Group selected under Actions to view the results.
Tip: Because the Smart Rule must process to display the contents in the grid, we recommend viewing the results using only
the Show <entity> as Smart Group action and before adding additional actions that may make changes to accounts and
assets in your network.
Once you have confirmed the rule contains your desired items, you can then add additional actions to the Smart Rule.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 40
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Use case 9: define Just in Time access policies
This use case walks through defining Just in Time access policies to include defining the time frame and frequency that users can request
passwords, remote access sessions, or access applications within Password Safe management.
Configure Password Safe access policies
An access policy defines the time frame and frequency that users can request passwords, remote access sessions, or access applications
under Password Safe management.
An access policy is selected when you are configuring the Requester role.
Create an access policy
1. Go to Configuration > Privileged Access Management Policies > Access Policies.
2. In the Access Policies pane, click Create New Access Policy.
3. Enter a name for the policy, and then click Create Access Policy.
4. On the Basic Details tab:
l Enter a description for the policy.
l Optionally, enable the Email Notifications option to send emails when a request is received for the policy.
Note: Recipients may receive a large number of email notifications. Selective use of this option is strongly advised. Multiple
addresses cannot be added at once. Each email address must be added one at time by clicking Add Another Email.
5. Select the Schedule tab, and then click Create Schedule.
6. Configure the recurrence, time, and date settings for the policy. If you select a daily recurrence, you can optionally select Allow
multi-day check-outs of accounts. This option allows the user continuous access to a granted request over a span of days.
7. Optionally, enable the Enable Location Restrictions option, and then select a location from the list.
8. If applicable, select an address from the X-Forwarded-For list. This field is an allowed value of X-Forwarded-For header, which
was added by an F5 load balancer or proxy. It uses address groups to verify if the IP address is to be in that list. The URL and
named host will be ignored. If the X-Forwarded-For field has a value of Any, then no X-Forwarded-For header is required or
verified. In the case where it is configured, the X-Forwarded-For header is required and its value should be in the list of IPs in the
address group.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 41
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
Note: In the case of a new configuration, this error message can be found in the log:
CheckLocationAllowed: XForwardedForHeaderValue 1.1.1.1 is not registered/trusted. Add
this XForwardedForHeaderValue to the TestGroupName Address group
9. Select the type of access to permit: View Password, RDP, SSH, or Application.
10. For each type of access selected, configure the parameters as required. Descriptions for each parameter are as follows:
Approvers Select the number of approvers required to permit access. Check
Auto Approve if the requests do not require any approvers.
Allow API Rotation Override Check this option for View Password access, to allow API callers
such as Password Safe Cache to override the Change
Password After Any Release managed account setting for view-
type requests.
Record Check the box to record the session.
Keystroke Logging Keystrokes can be logged during RDP, SSH, and application
sessions. Uncheck the boxes for each policy type to disable
keystroke logging for that type.
Enhanced Session Auditing Enhanced session auditing applies to RDP and application
sessions and is on by default. Click the toggle to turn off enhanced
session auditing.
Concurrent Set the number of sessions permitted at a time. Check Unlimited
to permit the user any number of connections to occur at the same
time.
Log off on Disconnect Check this box to automatically log off the user when the
connection to the session disconnects or the session window
closes. This option applies only to RDP and RDP application
sessions, and is active only when Enhanced Session Auditing is
enabled.
Note: If the session has been terminated by an Active
Sessions reviewer, the logoff on disconnect occurs
regardless of the access policy setting.
Force Termination Check this box to close the session when the time period expires.
When Log off on Disconnect is also selected, the user is logged
off the session. This check box applies to RDP, SSH, and
application sessions.
When the Requested Duration (as entered by the user on the
Requests page in the web portal) is exceeded, the session ends if
the Force Termination box is checked for the access policy.
The default and maximum release durations are configured on the
Managed Accounts page and Managed System Settings page.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 42
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.
PASSWORD SAFE 24.2
GETTING STARTED GUIDE
RDP Admin Console Select this option to show the RDP Admin Console check box on
RDP-based requests. This option allows administration of a
Remote Desktop Session host server in console mode (mstsc
/admin). This can be useful if the number of remote sessions is
maxed out on the host.
Using the RDP Admin Console allows you to use a remote session
without requiring other sessions to disconnect. Running a remote
session using the RDP Admin Console disables certain services
and functionality, such as, but not limited to:
l Remote Desktop Services client access licensing
l Time zone redirection
l Remote Desktop Connection Broker redirection
l Remote Desktop Easy Print
Connection Profile Select a profile from the list or click Manage Connection Profiles
to be taken to the Connection Profiles page to create a new
profile.
11. Under Policy Options:
l If you want users to provide a reason when making requests in Password Safe, click the toggle for the Reason is required
for new requests option to enable it.
l If you want users to provide a ticket number for a ticketing system when making requests in Password Safe, click the toggle
for the Require a ticket system and a ticket number for requests option to enable it.
o Once enabled, select the Ticket System from the dropdown. If you leave the Ticket System as User Selected,
the user can select any ticket system from the list when making their request. If you select a specific ticket system
for this option, the user is unable to change the ticket system when making their request.
12. Click Create Schedule. If the access policy is not yet marked as available, you are prompted to activate it now.
13. Assign the access policy to a user group as follows:
l Select the Assignees tab.
l Click Manage Assignees. You are taken to the User Management page.
l Click the vertical ellipsis for a group, and then select View Group Details.
l From the Group Details pane, click Smart Groups.
l Click the vertical ellipsis for a managed account Smart Group, and then select Edit Password Safe Roles.
l Check Requestor, and then select the access policy you just created from the dropdown.
l Click Save Roles.
14. Confirm the group is now listed as an assignee on the Assignees tab for the access policy you just created.
SALES: www.beyondtrust.com/contact SUPPORT: www.beyondtrust.com/support DOCUMENTATION: www.beyondtrust.com/docs 43
©2003-2024 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or TC: 9/4/2024
depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.