Solved

HiPAM Hitachi ID Privileged Access Manager

Posted on 2014-10-08
1
1,130 Views
Last Modified: 2014-10-14
Hitachi is recommending that we not add "HiPAM to the domain for the reasons noted below.   How I want to add HiPAM to the Domain.  Has anyone worked with HiPAM and what do you suggest?

connecting HiPAM boxes to the domain, they pointed me to their documentation. Please see the excerpt below.
I am waiting for answers to some of our other questions.

4.1.1.1 Domain requirements
:While Hitachi ID Privileged Access Manager servers are capable of operating as domain members, we
suggest you take the following into consideration:

• Security / limited accessibility:
If the Privileged Access Manager server is part of the domain, then other administrative users from
the domain (who may not be Privileged Access Manager administrators) can gain administrative logon
access to the server and can then access (encrypted) credentials for target systems other than the
domain.

A policy of segregation of duties suggests that it is preferable to eliminate the ability of administrators
of one system to access privileged accounts for another system and since Privileged Access Manager
houses such credentials, it makes sense to avoid domain membership.

• Windows credential conflicts:
To change/verify passwords on an Active Directory domain, Privileged Access Manager uses ADSI,
which may connect a named pipe to a share on a domain controller, such as the NETLOGON share.
If an administrative user logs into the Privileged Access Manager server console and makes a similar
connection but using his personal credentials (not those encoded into Privileged Access Manager),
then the Windows network provider may produce a credential conflict error. This can interrupt Privileged
Access Manager’s ability to manage user objects on the domain, for the duration of the interactive login
session.

If Privileged Access Manager is not a domain member, then the set of administrators who are able
to inadvertently cause this error condition is significantly reduced and so Privileged Access Manager
operation is more reliable (less prone to human-induced errors).

• Password randomization
Credential problems can also occur if the Privileged Access Manager server is also a Domain Controller,
and Privileged Access Manager is used to manage the administrator account used to target
the system. When the administrator account has its password randomized, the target system administrator
credentials may not be updated.
0
Comment
Question by:HyperTech1911
1 Comment
 
LVL 63

Accepted Solution

by:
btan earned 500 total points
ID: 40370037
HiPAM is a PIM in short which means managing only privileged accounts e.g. super user or administrator. Typically for PIM soln, they are the fronting gateway to all other appl server which will have login credential passed over from PIM to them.

This is a useful link for ref (Further down the article, you can find a "Network Architecture")
http://hitachi-id.com/privileged-access-manager/docs/securing-privileged-accounts-with-hitachi-id-pam.html

In experience - The PIM itself will synchronised with the credential directory in term of password and account alignment. When I meant synchronisation, it leads to the typically a password vault that PIM owns since all privileged account password is helmed by it now - the directory old password is no longer exist and in most case re-generated like randomised and store in its password vault. as to how often the password is changed really depends on the organisation policy and this change enforcement is transparent to user.

Every user session is authenticated and once successful, the account mapped to it (as per directory) will be retrieved from PIM vault and attempt session login into the backend app server (or equivalent). Hence, you can see  PIM is really the bouncer to the critical service for the key admin. PIM can also enforce the SSH, RDP or other protocol login session. They even can drill down to recording video of the user interaction to the backend server...PIM online storage is to be size up accordingly then..


There are other candidates as well such as CyberArk and Xceedium
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The next five years are sure to bring developments that are just astonishing, and we will continue to try to find the balance between connectivity and security. Here are five major technological developments from the last five years and some predict…
Many businesses neglect disaster recovery and treat it as an after-thought. I can tell you first hand that data will be lost, hard drives die, servers will be hacked, and careless (or malicious) employees can ruin your data.
With the power of JIRA, there's an unlimited number of ways you can customize it, use it and benefit from it. With that in mind, there's bound to be things that I wasn't able to cover in this course. With this summary we'll look at some places to go…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question