Skip to content

Commit 5ed5f67

Browse files
committed
tables + notes scripts update
1 parent 0ef7f3d commit 5ed5f67

File tree

80 files changed

+709
-248
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

80 files changed

+709
-248
lines changed

docs/privilegesecure/4.1/admin/audit&reporting/accesscertification/entitlements.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,11 @@ The Entitlements table has the following features:
2323
- Approved – Existing access is approved
2424
- Denied – Access is removed for that specific user/resource/permission
2525

26-
**NOTE:** The user is not removed from the access policy. Instead, a 'deny flag' is set
26+
:::note
27+
The user is not removed from the access policy. Instead, a 'deny flag' is set
2728
against that attribute so that it can be re-enabled in the future.
29+
:::
30+
2831

2932
- User Name – Displays the name of the account
3033
- Resource – Name of the resource
@@ -69,8 +72,11 @@ The Review Activity Details window has the following features:
6972
- Approved – Existing access is approved
7073
- Denied – Access is removed for that specific user/resource/permission
7174

72-
**NOTE:** The user is not removed from the access policy. Instead, a 'deny flag' is set
75+
:::note
76+
The user is not removed from the access policy. Instead, a 'deny flag' is set
7377
against that attribute so that it can be re-enabled in the future.
78+
:::
79+
7480

7581
- Name – Displays the name of the account
7682
- Resource – Name of the resource
@@ -86,19 +92,28 @@ The Review Activity Details window has the following features:
8692

8793
**Step 5 –** To remove access, select the applicable row(s) and click Deny.
8894

89-
**NOTE:** The user is not removed from the access policy. Instead, a 'deny flag' is set against that
95+
:::note
96+
The user is not removed from the access policy. Instead, a 'deny flag' is set against that
9097
attribute so that it can be re-enabled in the future.
98+
:::
99+
91100

92101
**Step 6 –** When the entitlements have been reviewed, click Close. Changes are saved to the
93102
selected access certification task and shown on the
94103
[Entitlements Tab for Access Certification](/docs/privilegesecure/4.1/admin/audit&reporting/accesscertification/entitlements.md).
95104

96-
**NOTE:** It is not necessary to review all entitlements at once. Changes are automatically saved to
105+
:::note
106+
It is not necessary to review all entitlements at once. Changes are automatically saved to
97107
the selected access certification task and can be returned to at any time (the Status will show as
98108
Incomplete).
109+
:::
99110

100-
**CAUTION:** Committed changes cannot be undone. A new access certification task must be created.
111+
112+
:::warning
113+
Committed changes cannot be undone. A new access certification task must be created.
101114
Alternatively, it is possible to manually reassign users to an access policy.
115+
:::
116+
102117

103118
**Step 7 –** When all entitlements have been reviewed, the Commit button is enabled. Click Commit to
104119
save the changes to user access.

docs/privilegesecure/4.1/admin/audit&reporting/accesscertification/users.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,10 @@ The Users table has the following features:
3131

3232
Follow the steps to add users and groups to the access certification task.
3333

34-
**NOTE:** It is not possible to add or remove users after they have been added.
34+
:::note
35+
It is not possible to add or remove users after they have been added.
36+
:::
37+
3538

3639
**Step 1 –** Navigate to the Audit and Reporting > Access Certification page.
3740

@@ -64,8 +67,11 @@ Users/Groups table and it is immediately moved to the Users & Groups to Add tabl
6467
**Step 6 –** (Optional) Click a row in the Users & Groups to Add table to move it back to the
6568
Available Users/Groups table.
6669

67-
**CAUTION:** It is not possible to add or remove users after they have been added to the access
70+
:::warning
71+
It is not possible to add or remove users after they have been added to the access
6872
certification task.
73+
:::
74+
6975

7076
**Step 7 –** Click Add to add the selected user(s) or group(s).
7177

@@ -74,8 +80,11 @@ The new user(s) and group(s) are added to the certification task and are shown o
7480

7581
**Step 8 –** Click Close to return to the Access Certification page.
7682

77-
**NOTE:** Only the assigned reviewer can interact with the entitlements once the access
83+
:::note
84+
Only the assigned reviewer can interact with the entitlements once the access
7885
certification task is created.
86+
:::
87+
7988

8089
The reviewer can now log in to see the access certification task(s) assigned to them and begin the
8190
review process. See the

docs/privilegesecure/4.1/admin/audit&reporting/logfiles/logfileoptions.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,11 @@ The right of the page shows details of the selected service and has the followin
3232

3333
- Verbose – Extremely detailed logging
3434

35-
**NOTE:** There are not many Verbose log messages in Privilege Secure so the difference
35+
:::note
36+
There are not many Verbose log messages in Privilege Secure so the difference
3637
between Verbose and Debug is minimal.
38+
:::
39+
3740

3841
- Debug – More information for detailed analysis of system behavior. Customer support may ask
3942
for logs with this log level enabled for troubleshooting purposes

docs/privilegesecure/4.1/admin/audit&reporting/reporting.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -134,8 +134,11 @@ following attributes for a given user account:
134134
- Name
135135
- Privilege
136136

137-
**NOTE:** The Subscriptions tab will not be enabled until saving the report. See the
137+
:::note
138+
The Subscriptions tab will not be enabled until saving the report. See the
138139
[Subscriptions Tab](#subscriptions-tab) topic for additional information.
140+
:::
141+
139142

140143
## Customize an Existing Report
141144

docs/privilegesecure/4.1/admin/configurationinterface/authentication/authenticationconnector.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,11 @@ Follow the steps to add an authentication connector to the console.
2020
- Connector Description (Optional) – Enter a brief description to identify the service account
2121
- Connection Type – Indicates the type of authentication
2222

23-
**NOTE:** Once the Connection Type is selected, additional fields become available. The available
23+
:::note
24+
Once the Connection Type is selected, additional fields become available. The available
2425
fields will change depending on the selection.
26+
:::
27+
2528

2629
**Step 4 –** Enter the information from the applicable authentication connector provider. See the
2730
[Authentication Page](/docs/privilegesecure/4.1/admin/configurationinterface/authentication/authentication.md)

docs/privilegesecure/4.1/admin/configurationinterface/authentication/openidconnectconfiguration/openidconnectauthentication.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,11 @@ The following sections provide configuration information to use OpenID with an O
1515
In order to use the OpenID login functionality with Privilege Secure an Okta user must match a user
1616
in an AD domain that Privilege Secure is aware of.
1717

18-
**NOTE:** The user will also need to be given access to Privilege Secure by assigning them a role
18+
:::note
19+
The user will also need to be given access to Privilege Secure by assigning them a role
1920
from the Config->Role Management screen.
21+
:::
22+
2023

2124
To create a new user click the Directory menu item and select People from the drop-down. You should
2225
see this screen.
@@ -39,8 +42,11 @@ Username will be matched against – under the Login Format dropdown:
3942
- User Principal Name
4043
- Email Address
4144

42-
**NOTE:** Okta doesn’t allow sAMAccountName to be used as the Username so we can’t use that one
45+
:::note
46+
Okta doesn’t allow sAMAccountName to be used as the Username so we can’t use that one
4347
here.
48+
:::
49+
4450

4551
Users in sbpam.local are all set up with both UPN and Email Address – but they’re not the same.
4652

docs/privilegesecure/4.1/admin/configurationinterface/authentication/openidconnectconfiguration/openidconnectconfiguration.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,11 @@ Follow the steps to verify the OpenID Connect configuration:
4646

4747
[protocol]//[hostname]:[port]
4848

49-
**CAUTION:** In the next step, verify that the Sign In page displays as expected, but do NOT sign in
49+
:::warning
50+
In the next step, verify that the Sign In page displays as expected, but do NOT sign in
5051
at this step.
52+
:::
53+
5154

5255
**Step 4 –** Click Test Connection to verify the connection configuration. This opens the Sign In
5356
page in the browser. Do not sign in.
@@ -111,9 +114,12 @@ from the provider and will vary:
111114
the previous step. This represents the format of the value that will be used to sign in to the MFA
112115
during log in.
113116

114-
**NOTE:** These are not the credentials that will be used during the login process; only an
117+
:::note
118+
These are not the credentials that will be used during the login process; only an
115119
example of the format of those credentials. The actual credentials used are unique to each user
116120
and are setup during the MFA registration process for that user.
121+
:::
122+
117123

118124
**Step 11 –** Select a field to use for the User Id Field and click Select.
119125

docs/privilegesecure/4.1/admin/configurationinterface/authentication/samlconfiguration.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -46,8 +46,11 @@ Follow the steps to verify the SAML configuration:
4646

4747
[protocol]//[hostname]:[port]
4848

49-
**CAUTION:** In the next step, verify that the Sign In page displays as expected, but do NOT sign in
49+
:::warning
50+
In the next step, verify that the Sign In page displays as expected, but do NOT sign in
5051
at this step.
52+
:::
53+
5154

5255
**Step 4 –** Click Test Connection to verify the connection configuration. This opens the Sign In
5356
page in the browser. Do NOT sign in.
@@ -105,9 +108,12 @@ from the provider and will vary:
105108
the previous step. This represents the format of the value that will be used to sign in to the MFA
106109
during log in.
107110

108-
**NOTE:** These are not the credentials that will be used during the login process; only an
111+
:::note
112+
These are not the credentials that will be used during the login process; only an
109113
example of the format of those credentials. The actual credentials used are unique to each user
110114
and are setup during the MFA registration process for that user.
115+
:::
116+
111117

112118
**Step 11 –** Select a field to use for the User Id Field and click Select.
113119

docs/privilegesecure/4.1/admin/configurationinterface/integrationconnectors/integrationaccessgovernance.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,8 +45,11 @@ Select Tables and click Add to open the Select Database Objects window.
4545
- SA_ADInventory_ComputersView
4646
- SA ADInventory_UsersView
4747

48-
**NOTE:** Type in the Filter Objects by Name box to filter the list of objects by the characters
48+
:::note
49+
Type in the Filter Objects by Name box to filter the list of objects by the characters
4950
entered.
51+
:::
52+
5053

5154
**Step 5 –** Click OK to return to the Application Access page.
5255

@@ -67,7 +70,10 @@ app token:
6770

6871
**Step 8 –** Click Finish to close the wizard and click Save in the Access view accept the changes.
6972

70-
**NOTE:** Audit must be restarted after a new access role is configured.
73+
:::note
74+
Audit must be restarted after a new access role is configured.
75+
:::
76+
7177

7278
The next step is to use the Client ID and Client Secret to obtain an access token. This token is
7379
used to get data from the Enterprise Auditor endpoint.
@@ -153,8 +159,11 @@ To view the import progress, navigate to **Service Nodes** > Action Services. Se
153159
[Action Service](/docs/privilegesecure/4.1/admin/configurationinterface/servicenodes/servicenodes/action.md)
154160
topic for additional information.
155161

156-
**NOTE:** The Use Secure Tunnel feature is enabled by default on all proxy services when installed
162+
:::note
163+
The Use Secure Tunnel feature is enabled by default on all proxy services when installed
157164
and the proxy service is selected by default.
165+
:::
166+
158167

159168
Refer to the
160169
[Action Service](/docs/privilegesecure/4.1/admin/configurationinterface/servicenodes/servicenodes/action.md)

docs/privilegesecure/4.1/admin/configurationinterface/integrationconnectors/integrationbyov/byovconnectorconfig.md

Lines changed: 23 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -21,8 +21,11 @@ Begin by setting up an Integration Connector for using Netwrix Privilege Secure
2121
Ensure that the account you wish to use for your activity is managed by Privilege Secure or is
2222
contained within a Secret Vault resource in Privilege Secure.
2323

24-
**NOTE:** For managed accounts, ensure that the account has been rotated at least once since being
24+
:::note
25+
For managed accounts, ensure that the account has been rotated at least once since being
2526
managed. Otherwise, there will be no vaulted password in the Netwrix Privilege Secure database.
27+
:::
28+
2629

2730
### Configure the Activity Connector
2831

@@ -192,7 +195,10 @@ next to the account name.
192195
**Step 3 –** Click on the **Manage** button that becomes available above the list, and select
193196
**Manual**.
194197

195-
**NOTE:** Ensure the user is not already managed or added into Privilege Secure.
198+
:::note
199+
Ensure the user is not already managed or added into Privilege Secure.
200+
:::
201+
196202

197203
See the
198204
[Credentials Dashboard](/docs/privilegesecure/4.1/admin/dashboard/credentials.md)
@@ -217,8 +223,11 @@ account.
217223

218224
**Step 3 –** Enter a password to match the AD password, then click **Save**.
219225

220-
**NOTE:** For versions before Privilege Secure 4.1, a support ticket will be needed as the Set
226+
:::note
227+
For versions before Privilege Secure 4.1, a support ticket will be needed as the Set
221228
Password feature is not available.
229+
:::
230+
222231

223232
See the
224233
[Manage Internal Service Accounts](/docs/privilegesecure/4.1/admin/interface/credentials/manageinternalserviceaccount.md)
@@ -246,16 +255,22 @@ Follow the steps to create an activity.
246255
- Vault Connector — Displays a list of previously configured vault connectors. Select the vault
247256
connector created from the steps above.
248257

249-
**NOTE:** You may use accounts stored in a Vault and added as a resource once the integration is
258+
:::note
259+
You may use accounts stored in a Vault and added as a resource once the integration is
250260
created. Also, you may apply domain or other local accounts managed by Netwrix Privilege Secure, but
251261
the password must be rotated once prior to use with an activity.
262+
:::
263+
252264

253265
![BYOV create an Activity](/img/product_docs/privilegesecure/4.1/accessmanagement/admin/configuration/add/byovconnectoractivity.webp)
254266

255267
**Step 4 –** Click Save to create the Activity.
256268

257-
**NOTE:** Ensure the Login Account Template uses the format DOMAIN\samAccountName (e.g.,
269+
:::note
270+
Ensure the Login Account Template uses the format DOMAIN\samAccountName (e.g.,
258271
NWXTECH\dgrayson).
272+
:::
273+
259274

260275
See the
261276
[Add Activity](/docs/privilegesecure/4.1/admin/interface/activities/activity/activity.md)
@@ -303,5 +318,7 @@ management.
303318

304319
![My Activities BYOV Connector](/img/product_docs/privilegesecure/4.1/accessmanagement/admin/configuration/add/byovconnectormyactivities.webp)
305320

306-
_Remember,_ Always verify configurations and permissions, especially when integrating with systems
321+
:::tip
322+
Remember, Always verify configurations and permissions, especially when integrating with systems
307323
like AD and using specific user accounts for critical operations.
324+
:::

0 commit comments

Comments
 (0)