Skip to content

Commit 7c9acce

Browse files
Merge pull request #106 from netwrix/corbin/nps-4.2-notestables
Corbin/nps 4.2 notestables
2 parents 8f6160c + 807fb99 commit 7c9acce

File tree

112 files changed

+919
-448
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

112 files changed

+919
-448
lines changed

docs/privilegesecure/4.2/admin/AuditReporting/accesscertification/entitlements.md

Lines changed: 20 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -23,8 +23,11 @@ The Entitlements table has the following features:
2323
- Approved – Existing access is approved
2424
- Denied – Access is removed for that specific user/resource/permission
2525

26-
**NOTE:** The user is not removed from the access policy. Instead, a ‘deny flag’ is set
26+
:::note
27+
The user is not removed from the access policy. Instead, a ‘deny flag’ is set
2728
against that attribute so that it can be re-enabled in the future.
29+
:::
30+
2831

2932
- User Name – Displays the name of the account
3033
- Resource – Name of the resource
@@ -69,8 +72,11 @@ The Review Activity Details window has the following features:
6972
- Approved – Existing access is approved
7073
- Denied – Access is removed for that specific user/resource/permission
7174

72-
**NOTE:** The user is not removed from the access policy. Instead, a ‘deny flag’ is set
75+
:::note
76+
The user is not removed from the access policy. Instead, a ‘deny flag’ is set
7377
against that attribute so that it can be re-enabled in the future.
78+
:::
79+
7480

7581
- Name – Displays the name of the account
7682
- Resource – Name of the resource
@@ -86,18 +92,27 @@ The Review Activity Details window has the following features:
8692

8793
**Step 5 –** To remove access, select the applicable row(s) and click Deny.
8894

89-
**NOTE:** The user is not removed from the access policy. Instead, a ‘deny flag’ is set against that
95+
:::note
96+
The user is not removed from the access policy. Instead, a ‘deny flag’ is set against that
9097
attribute so that it can be re-enabled in the future.
98+
:::
99+
91100

92101
**Step 6 –** When the entitlements have been reviewed, click Close. Changes are saved to the
93102
selected access certification task and shown on the Entitlements Tab for Access Certification.
94103

95-
**NOTE:** It is not necessary to review all entitlements at once. Changes are automatically saved to
104+
:::note
105+
It is not necessary to review all entitlements at once. Changes are automatically saved to
96106
the selected access certification task and can be returned to at any time (the Status will show as
97107
Incomplete).
108+
:::
98109

99-
**CAUTION:** Committed changes cannot be undone. A new access certification task must be created.
110+
111+
:::warning
112+
Committed changes cannot be undone. A new access certification task must be created.
100113
Alternatively, it is possible to manually reassign users to an access policy.
114+
:::
115+
101116

102117
**Step 7 –** When all entitlements have been reviewed, the Commit button is enabled. Click Commit to
103118
save the changes to user access.

docs/privilegesecure/4.2/admin/AuditReporting/accesscertification/users.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,10 @@ The Users table has the following features:
3131

3232
Follow the steps to add users and groups to the access certification task.
3333

34-
**NOTE:** It is not possible to add or remove users after they have been added.
34+
:::note
35+
It is not possible to add or remove users after they have been added.
36+
:::
37+
3538

3639
**Step 1 –** Navigate to the Audit and Reporting > Access Certification page.
3740

@@ -64,16 +67,22 @@ Users/Groups table and it is immediately moved to the Users & Groups to Add tabl
6467
**Step 6 –** (Optional) Click a row in the Users & Groups to Add table to move it back to the
6568
Available Users/Groups table.
6669

67-
**CAUTION:** It is not possible to add or remove users after they have been added to the access
70+
:::warning
71+
It is not possible to add or remove users after they have been added to the access
6872
certification task.
73+
:::
74+
6975

7076
**Step 7 –** Click Add to add the user(s) and group(s) to the access certification task.
7177

7278
The new user(s) and group(s) are added to the certification task and are shown on the Users Tab for
7379
Access Certification.
7480

75-
**NOTE:** Only the assigned reviewer can interact with the entitlements once the access
81+
:::note
82+
Only the assigned reviewer can interact with the entitlements once the access
7683
certification task is created.
84+
:::
85+
7786

7887
The reviewer can now log in to see the access certification task(s) assigned to them and begin the
7988
review process. See the [Entitlements Tab for Access Certification](/docs/privilegesecure/4.2/admin/AuditReporting/accesscertification/entitlements.md) topic for

docs/privilegesecure/4.2/admin/AuditReporting/logfiles/logfileoptions.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,8 +32,11 @@ The right of the page shows details of the selected service and has the followin
3232

3333
- Verbose – Extremely detailed logging
3434

35-
**NOTE:** There are not many Verbose log messages in Privilege Secure so the difference
35+
:::note
36+
There are not many Verbose log messages in Privilege Secure so the difference
3637
between Verbose and Debug is minimal.
38+
:::
39+
3740

3841
- Debug – More information for detailed analysis of system behavior. Customer support may ask
3942
for logs with this log level enabled for troubleshooting purposes

docs/privilegesecure/4.2/admin/AuditReporting/reporting.md

Lines changed: 13 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -28,20 +28,20 @@ report name. The report tree will then be filtered down to the matching reports.
2828

2929
The Reports tree contains the following folders.
3030

31-
Favorites Folder
31+
**Favorites Folder**
3232

3333
This folder in the report tree contains reports that have been marked with a star for easy access.
3434
Clicking the star on a favorite report will remove it from the Favorites folder.
3535

36-
Predefined Reports
36+
**Predefined Reports**
3737

3838
This folder contains predefined reports covering common reporting uses cases. Included are:
3939

4040
- Account Password Age
4141
- All Activity Sessions
4242
- Password Rotations
4343

44-
Predefined Platform-Based Reports
44+
**Predefined Platform-Based Reports**
4545

4646
This folder contains predefined reports that are filtered to specific platforms. Included are:
4747

@@ -54,7 +54,7 @@ This folder contains predefined reports that are filtered to specific platforms.
5454
- All Website Sessions
5555
- All Windows Sessions
5656

57-
My Reports
57+
**My Reports**
5858

5959
This folder contains all reports created using the “+” icon next to the Search Reports field or
6060
created by modifying and saving an existing predefined or platform based report.
@@ -90,7 +90,7 @@ The Filters tab has the following configuration options:
9090

9191
The Source drop-down list contains the following data sources for reports.
9292

93-
Activity Sessions
93+
**Activity Sessions**
9494

9595
This data source contains activity session information, and allows the report to be filtered on the
9696
following attributes for a given activity session:
@@ -102,7 +102,7 @@ following attributes for a given activity session:
102102
- Target Host
103103
- User
104104

105-
Resource Sync
105+
**Resource Sync**
106106

107107
This data source contains resource sync information, and allows the report to be filtered on the
108108
following attributes for a given synced resource:
@@ -112,7 +112,7 @@ following attributes for a given synced resource:
112112
- IP Address
113113
- Operating System
114114

115-
Password Rotation
115+
**Password Rotation**
116116

117117
This data source contains password rotation information, and allows the report to be filtered on the
118118
following attributes for a given password rotation event:
@@ -122,7 +122,7 @@ following attributes for a given password rotation event:
122122
- Change Reason
123123
- User
124124

125-
Password Age
125+
**Password Age**
126126

127127
This data source contains password age information, and allows the report to be filtered on the
128128
following attributes for a given user account:
@@ -133,8 +133,11 @@ following attributes for a given user account:
133133
- Name
134134
- Privilege
135135

136-
**NOTE:** The Subscriptions tab will not be enabled until saving the report. See the Subscriptions
136+
:::note
137+
The Subscriptions tab will not be enabled until saving the report. See the Subscriptions
137138
Tab topic for additional information.
139+
:::
140+
138141

139142
## Customize an Existing Report
140143

@@ -156,7 +159,7 @@ The Filters tab has the following configuration options:
156159
"All Linux Sessions-24-05-07-164307".
157160
- Save – Saves any modifications to the report. If this is a predefined or platform based report, it
158161
will save as a new report under My Reports
159-
- Delete **(available for custom reports only)** – Deletes the custom report
162+
- Delete (available for custom reports only) – Deletes the custom report
160163
- Source Drop-down List – Contains data sources that allow the report to look at different data sets
161164
related to Privilege Secure administration. See the Data Sources topic for additional information.
162165
- Timeframe Drop-down List – Contains several predefined timeframes, ranging from “Last Hour” to

docs/privilegesecure/4.2/admin/configuration/authentication/authenticationconnector.md

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,8 +20,11 @@ Follow the steps to add an authentication connector to the console.
2020
- Connector Description (Optional) – Enter a brief description to identify the service account
2121
- Connection Type – Indicates the type of authentication
2222

23-
**NOTE:** Once the Connection Type is selected, additional fields become available. The available
23+
:::note
24+
Once the Connection Type is selected, additional fields become available. The available
2425
fields will change depending on the selection.
26+
:::
27+
2528

2629
**Step 4 –** Enter the information from the applicable authentication connector provider. See the
2730
[Authentication Page](/docs/privilegesecure/4.2/admin/configuration/authentication/authentication.md) section for detailed descriptions of the fields.

docs/privilegesecure/4.2/admin/configuration/authentication/openidconnectconfigu/openidconnectauthentication.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -15,8 +15,11 @@ The following sections provide configuration information to use OpenID with an O
1515
In order to use the OpenID login functionality with Privilege Secure an Okta user must match a user
1616
in an AD domain that Privilege Secure is aware of.
1717

18-
**NOTE:** The user will also need to be given access to Privilege Secure by assigning them a role
18+
:::note
19+
The user will also need to be given access to Privilege Secure by assigning them a role
1920
from the Config->Role Management screen.
21+
:::
22+
2023

2124
To create a new user click the Directory menu item and select People from the drop-down. You should
2225
see this screen.
@@ -39,8 +42,11 @@ Username will be matched against – under the Login Format dropdown:
3942
- User Principal Name
4043
- Email Address
4144

42-
**NOTE:** Okta doesn’t allow sAMAccountName to be used as the Username so we can’t use that one
45+
:::note
46+
Okta doesn’t allow sAMAccountName to be used as the Username so we can’t use that one
4347
here.
48+
:::
49+
4450

4551
Users in sbpam.local are all set up with both UPN and Email Address – but they’re not the same.
4652

docs/privilegesecure/4.2/admin/configuration/authentication/openidconnectconfigu/openidconnectconfiguration.md

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -45,17 +45,22 @@ Follow the steps to verify the OpenID Connect configuration:
4545

4646
[protocol]//[hostname]:[port]
4747

48-
**CAUTION:** In the next step, verify that the Sign In page displays as expected, but do NOT sign in
48+
:::warning
49+
In the next step, verify that the Sign In page displays as expected, but do NOT sign in
4950
at this step.
51+
:::
52+
5053

5154
**Step 4 –** Click Test Connection to verify the connection configuration. This opens the Sign In
5255
page in the browser. Do NOT sign in.
5356

5457
- If the Sign In page does not display as expected, review the values configured for the OpenID
5558
Connect connector and modify them where needed. Then, verify the Sign In page again.
56-
- **NOTE:** When configuring OpenID Connect for Okta, it may be necessary to ensure that the Grant
59+
:::note
60+
When configuring OpenID Connect for Okta, it may be necessary to ensure that the Grant
5761
type in Okta is set to Implicit (hybrid) and the sub-settings Allow ID Token with implicit grant
5862
type and Allow Access Token with implicit grant type are both enabled.
63+
:::
5964

6065
**Step 5 –** Click the browser’s back arrow to return to the Configure Client wizard page.
6166

@@ -110,9 +115,12 @@ from the provider and will vary:
110115
the previous step. This represents the format of the value that will be used to sign in to the MFA
111116
during log in.
112117

113-
**NOTE:** These are not the credentials that will be used during the login process; only an
118+
:::note
119+
These are not the credentials that will be used during the login process; only an
114120
example of the format of those credentials. The actual credentials used are unique to each user
115121
and are setup during the MFA registration process for that user.
122+
:::
123+
116124

117125
**Step 11 –** Select a field to use for the User Id Field and click Select.
118126

docs/privilegesecure/4.2/admin/configuration/authentication/samlconfiguration.md

Lines changed: 9 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ It contains four pages:
1919
- Configure Id Mapping
2020
- Test Logout
2121

22-
## Configure OpenID Connect Authentication Connector
22+
## Configure SAML Authentication Connector
2323

2424
Follow the steps to verify the SAML configuration:
2525

@@ -45,8 +45,11 @@ Follow the steps to verify the SAML configuration:
4545

4646
[protocol]//[hostname]:[port]
4747

48-
**CAUTION:** In the next step, verify that the Sign In page displays as expected, but do NOT sign in
48+
:::warning
49+
In the next step, verify that the Sign In page displays as expected, but do NOT sign in
4950
at this step.
51+
:::
52+
5053

5154
**Step 4 –** Click Test Connection to verify the connection configuration. This opens the Sign In
5255
page in the browser. Do NOT sign in.
@@ -104,9 +107,12 @@ from the provider and will vary:
104107
the previous step. This represents the format of the value that will be used to sign in to the MFA
105108
during log in.
106109

107-
**NOTE:** These are not the credentials that will be used during the login process; only an
110+
:::note
111+
These are not the credentials that will be used during the login process; only an
108112
example of the format of those credentials. The actual credentials used are unique to each user
109113
and are setup during the MFA registration process for that user.
114+
:::
115+
110116

111117
**Step 11 –** Select a field to use for the User Id Field and click Select.
112118

docs/privilegesecure/4.2/admin/configuration/integrationconnector/integrationaccessanalyzer.md

Lines changed: 8 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -39,8 +39,11 @@ Select Tables and click Add to open the Select Database Objects window.
3939
- SA_ADInventory_ComputersView
4040
- SA ADInventory_UsersView
4141

42-
**NOTE:** Type in the Filter Objects by Name box to filter the list of objects by the characters
42+
:::note
43+
Type in the Filter Objects by Name box to filter the list of objects by the characters
4344
entered.
45+
:::
46+
4447

4548
**Step 5 –** Click OK to return to the Application Access page.
4649

@@ -61,7 +64,10 @@ app token:
6164

6265
**Step 8 –** Click Finish to close the wizard and click Save in the Access view accept the changes.
6366

64-
**NOTE:** Access Analyzer must be restarted after a new access role is configured.
67+
:::note
68+
Access Analyzer must be restarted after a new access role is configured.
69+
:::
70+
6571

6672
The next step is to use the Client ID and Client Secret to obtain an access token. This token is
6773
used to get data from the Access Analyzer endpoint.

0 commit comments

Comments
 (0)