Previous Topic: PUPM Endpoint and Privileged Account Creation

Next Topic: Access Control for PUPM Connection Information

Create an Endpoint

Creating endpoint definitions in CA Access Control Enterprise Management lets you manage endpoints and discover the privileged and service accounts on that endpoint.

Follow these steps:

  1. In CA Access Control Enterprise Management, click Privileged Accounts, Endpoints, Create Endpoint.

    The Create Endpoint: Select Endpoint page appears.

  2. (Optional) Select an existing endpoint to create the endpoint as a copy of it, as follows:
    1. Select Create a copy of an object of type Endpoint.
    2. Select an attribute for the search, type in the filter value, and click Search.

      A list of endpoints that match the filter criteria appears.

    3. Select the object that you want to use as a basis for the new endpoint.
  3. Click OK.

    The General tab of the Create Endpoint task page appears. If you created the endpoint from an existing object, the dialog fields are pre-populated with the values from the existing object.

  4. Complete the fields in the tab. The following fields are not self-explanatory:
    Name

    Defines the logical name of the endpoint.

    Note: This field defines how the name of the endpoint appears in CA Access Control Enterprise Management. You specify connection information when you select the endpoint type.

    Description

    (Optional) Defines the information that you want to record for this endpoint (free text).

    Endpoint Type

    Specifies the type of endpoint where your privileged or service accounts reside.

    Note: When you select the endpoint type, an additional dialog opens that lets you supply the credentials PUPM requires to manage privileged accounts on that type of endpoint. The endpoint type that you select affects the connection information you have to supply.

  5. (Optional) Click the Login Applications tab and complete the field in the tab.
    Login Applications

    Specifies the login applications to assign to this endpoint.

    Note: Create a login application before you can assign it to an endpoint. You can assign multiple login applications to the same endpoint.

    Disable Advance Login

    Specifies to disable the Advanced Login option for this endpoint.

  6. (Optional) Click the CA Enterprise Log Manager tab and complete the fields in the tab.

    This tab lets you view CA Enterprise Log Manager reports of privileged account audit events on PUPM endpoints in CA Access Control Enterprise Management. If you have not configured a connection to CA Enterprise Log Manager, this tab does not appear.

    Host Name

    Defines the host name as specified in CA Enterprise Log Manager.

    If you do not type a value in this field, CA Access Control Enterprise Management uses the host name that you specify in the Name field of the General tab.

    Event Log Name

    Defines the event log name as specified in CA Enterprise Log Manager. For example, the event log name for a Windows Agentless endpoint may be NT-Security.

    If you do not type a value in this field, audit events for all endpoint types are displayed when you view a report of privileged account audit events in CA Access Control Enterprise Management.

    Note: For more information about event log names, see the CA Enterprise Log Manager documentation.

  7. (Optional) Click the Information tab and complete the fields in the tab.

    This tab lets you specify endpoint-specific attributes and use the attributes when you define or modify privileged access roles.

    When a member of the access privileged role logs in to CA Access Control Enterprise Management, the user gains access to the privileged access accounts according to the attributes defined in the privileged access role.

    Owner

    Specify the name of the endpoint owner.

    Department

    Specify a name of a department.

    Example: Development

    Custom 1...5

    Specify up to five custom endpoint-specific attributes.

    Note: Specify the custom attributes in the privileged access role Members tab, Member Policy section, Member Rule window.

  8. Click Submit.

    CA Access Control Enterprise Management tries to connect to the endpoint using the credentials you provide. If the connection succeeds, the endpoint is created. Otherwise, you receive a connection error.

Related Topics:

Access Control for PUPM Connection Information

VMware ESX/ESXi Connection Information

Windows Agentless Connection Information

SSH Device Connection Information

SAP R3 Connection Information

CA Identity Manager Provisioning Connection Information

Disconnected Endpoint Connection Information

Create a Login Application