IBM Security Privileged Identity Manager, Version 2.1.1

Credential management

From the Privileged Identity Manager Service Center, a privileged administrator can create, modify, and delete credentials, specify the credential type, and connect it to an identity provider so that you can rotate passwords or SSH Keys automatically on the resource.

A privileged administrator can specify one of the following credential type when creating a credential:
Password-authenticated credential
Credentials that require passwords to authenticate into privileged accounts.
SSH Key-authenticated credential
Credentials that require SSH keys to authenticate into privileged accounts.
Note: A credential with the same name can be assigned to both types of credential. For example, cred1 can be a password-authenticated credential and an SSH key-authenticated credential. See Adding credentials in the Privileged Identity Manager Service Center.

Connected and disconnected credentials

Credentials can exist in the credential vault as connected or disconnected credentials.
Connected
Connected credentials are associated with an identity provider, with an equivalent Identity adapter available for the target system. You can manage passwords or SSH Keys of these credentials, such as configure automatic password or SSH Key rotation, which is often a compliance requirement.
Disconnected
Disconnected credentials exist as standalone objects (user ID and password or SSH Key) in the credential vault. These credentials simply use the credential vault as secure, controlled storage. You cannot configure automatic password or SSH Key rotation for disconnected credentials.

You typically want to configure connected credentials. For example, in deployments where users can view passwords or download SSH Keys in the self-service console, and the password or SSH Key is known by a IBM® Security Privileged Identity Manager user, you want to rotate the password or SSH Key automatically to minimize the risk exposure window. You can do this by enabling Change password or key upon check in.

You can on-board disconnected credentials, in cases where an Identity adapter is not available for the target system. To mitigate the lack of automatic password or SSH Key rotation, consider the following options:
  • Configure the credentials for automatic logon with Privileged Access Agent or Privileged Session Gateway. Disable the Allow view password or key download to user option for the self-service console.
    Note: Privileged Access Agent does not support SSH Key credentials
  • Perform periodic manual password rotation on the target systems, and manually update the passwords that are stored in IBM Security Privileged Identity Manager.
    Note: SSH Keys that are stored in IBM Security Privileged Identity Manager cannot be updated.

Exclusive and non-exclusive credentials

Exclusive credentials are privileged credentials that require check-out and can only be used by one user at a time. Non-exclusive credentials can be used concurrently by multiple users and are configured to not require check-outs.

It is recommended to configure exclusive credentials, which are credentials that require check-out.

Benefits of exclusive credentials:
  • Accountability and forensics. Only a single user can use the credential at a time.
  • Auditability. Allows the user enter a justification for using the credential.
  • Security. Allows passwords or SSH Keys of credentials to be rotated by enabling Change password or key upon check in in the Administrative console.
Benefits of non-exclusive credentials:
  • Used in App ID scenarios. For the application identity management scenarios, where credentials are consumed by applications, credentials must be configured to not require checkouts.
  • Only a single privileged credential available on the target system. For example, network devices only offer a single fixed 'admin' privileged credential, but different users require concurrent access to this single privileged credential.


Feedback