Privileged Access Management (PAM) Operations FAQ


The UChicago Privileged Access Management (PAM) service is designed to help secure high-level systems, services, and passwords through a central management system. You can learn more about PAM and its functions by selecting a topic from the list below.

Contents


Will I need to share my system administrator account with others on my team?

Yes, you will need to provide BeyondTrust with an account and password to be able to rotate any account credentials that are onboarded.

Alert: Do not use your CNetID credentials as the administrator account.

Will I be able to access my systems with my own CNetID as I do today?

Yes, although the workflow will be different. Instead of going to a bastion host such as jump.uchicago.edu, you will sign into BeyondTrust Password Safe with your CNetID, then choose your system(s) from a list. Alternatively, you can use SSH, or RDP direct connect which will also ask for your CNetID and password to connect to your systems.

Will I need a dedicated account for protected entities?

Dedicated accounts are required to rotate the credentials for the functional and scanning accounts that are onboarded into the tool.

You will also use a dedicated account that will be checked out for use and checked back in when done. This will ensure that there is an audit trail of who used which account on what system and when.

What is a functional account used for?

Functional accounts are used to change the credentials on assets that are managed by BeyondTrust Password Safe.

What is a scanning account used for?

Scanning accounts are used to discover users, services, ports, etc. on the target asset so that they can then be managed by Password Safe.

What types of services, accounts, and devices can the University PAM protect?

This service is limited to protecting accounts with elevated privileges on servers that can be connected to via SSH, RDP, or Telnet. This service can also manage privileged accounts on databases. Also, web applications and regular applications.

How does PAM comply with HIPAA and Personal Identifiable Information (PII), and other data regulations?

No, PAM is not HIPPA nor PII compliant.

What training will my system administrators need to use PAM?

They will require learning the tool's interface with this BeyondTrust user guide (PDF).

What types of requests does the IAM team support?

Onboarding requests, password rotation schedule changes, adding new groups for PAM, manual password rotations, issue troubleshooting, adding new assets, and removing assets.

How long does it take to implement PAM?

Times are dependent on scope, systems, accounts to be vaulted, etc.

What testing do I need to do to implement PAM?

Servers need to be able to be connected to the three resource brokers, hardware, and firewall testing are needed.

The accounts that will be utilized with PAM will also need to have access to the system with appropriate permissions depending on function.

Functional account and scanning account privileges will also need to be tested to ensure that the functional account can rotate passwords on the desired systems and that the scanning accounts can discover the accounts that will be vaulted.

Does the BeyondTrust Scanner RDP into my system?

No. The scanner scans for open ports and enumerates system data using the IPC$ share.

Does the BeyondTrust Scanner SSH into my system?

Yes, it needs to do this to enumerate local users, services, etc.

Does this tool have the ability to create, edit, or delete user accounts or applications on a system?

No, this tool only allows specified account passwords to be managed.

After our systems are onboarded, does this mean anyone has access to these systems?

No, by default no one has access to the systems after they have been onboarded. It is only after the managed accounts are assigned that groups get access to specific systems.

Do the sessions record passwords that I enter into other applications?

The session monitor can protect password fields so that the password fields will not show up in the recordings where they are detected.

How long are the records held?

Records are held for one year.

What happens if the BeyondTrust systems are down for maintenance?

The Password Safe functionality will be unavailable until maintenance is complete. Therefore, you should have a plan for continuing operations if you need access to your assets while the Password Safe is unavailable.

How will we know that the BeyondTrust systems are down for maintenance?

You will receive a notification, in advance, from the Privileged Access Management Listserv including the expected window for downtime.

What is the default password rotation policy for vaulted accounts?

The default password rotation policy is as follows:

Policy

Setting

Default Password Policy

48-50 characters with uppercase/lowercase alpha and non-alphanumeric characters"

Change Password Time

6:30

Frequency

Every 30 Days

Default release duration (default checkout time)

2 hours

Maximum release duration (max checkout time)

2 hours

Max concurrent request (how many users can check out this account at once)

1

Password checked and reset after password check-in

On

Notification emails sent on release to

None

My computers are not joined to UCAD, can we still use PAM?

Yes. This tool supports any LDAP or Active Directory (AD) joined machines or accounts as well as local machine accounts.

What are the best practices for accounts when using PAM?

The typical model for privileged account management revolves around using role-based accounts per team, environment, etc. This means that a team will utilize the same accounts in some cases, but it will not be a personal administrator account

It is best practice to create a number of accounts based on specific privileges needed. These will be assigned to the groups/systems as needed.

For Active Directory and LDAP, account names should start with an underscore (_) followed by the organization and division (e.g. _itsiamadmin01). A ticket should be opened with the Windows Server team for Active Directory or Identity and Access Management team for LDAP.

What types of changes can I request for my protected assets?

  1. Password Rotation Policy Change
    A password rotation policy change adjusts how often and at what time account passwords are changed. The options for frequency are:
    1. First day of the month
    2. Last day of the month
    3. Daily
    4. Every X days (e.g. 5 days, 30 days)
      You may also specify what time the passwords are rotated.
  2. Password Policy Change
    Password policy changes affect the length and content of the passwords used in PAM. You may request the minimum and maximum length of the password as well as a minimum number of required characters of these types:
    1. Uppercase
    2. Lowercase
    3. Numeric
    4. Non-Alphanumeric
  3. Asset to Group Mapping Change
    Asset to Group Mapping Changes affects what systems and accounts a particular group has access to. The grouper group that needs to be changed as well as either the Asset Group Name or a list of systems and respective accounts will need to be provided.
  4. Add account to be managed by Password Safe
    This is another onboarding request. You will need to list the account(s) and system(s) you wish to be managed by password safe, as well as the Grouper group that needs access to the account(s) and system(s).
  5. Remove the account that is being managed by password safe.
    This describes an account that no longer needs to be managed. We need the account name(s) and system(s) affected.