Previous Topic: Implementing Privileged Accounts

Next Topic: Discover Privileged Accounts


How to Set Up Privileged Accounts

Privileged User Password Management (PUPM) is the process through which an organization secures, manages, and tracks all activities associated with the most powerful accounts within the organization. Before you can begin using privileged account passwords, you complete several steps that set up CA Access Control Enterprise Management for PUPM. Users can then start working with the privileged accounts that you define.

The following process explains the tasks that users in your enterprise must complete to set up privileged accounts. Users must have the specified role to complete each process step. A user with the System Manager admin role can perform every CA Access Control Enterprise Management task in this process.

Note: Before you begin this process, verify that email notification is enabled in CA Access Control Enterprise Management. If CA Access Control Enterprise Management cannot display a password to a user, it emails the password to the user instead.

To set up privileged accounts, users do the following:

  1. The PUPM Target System Manager creates password policies. Password policies set password rules and limitations for privileged accounts.
  2. The PUPM Target System Manager creates endpoints in CA Access Control Enterprise Management. Endpoints are devices that are managed by privileged accounts. You can create endpoints in CA Access Control Enterprise Management or use the PUPM feeder to import endpoints.
  3. The PUPM Target System Manager creates privileged accounts for each endpoint. Creating privileged accounts lets CA Access Control Enterprise Management manage the accounts. You can create privileged accounts in CA Access Control Enterprise Management or use the PUPM feeder to import privileged accounts.
  4. (Optional) The System Manager creates login applications, and the PUPM Target System Manager modifies PUPM endpoints to use the login applications. Login applications let users log in to a privileged account from CA Access Control Enterprise Management.
  5. The PUPM Policy Manager modifies the member policies of privileged access roles. Member policies define the users that can carry out the tasks in a role.

    Note: If you use Active Directory as your user store, we recommend that you modify each member policy to point to a corresponding Active Directory group. You can then add or remove users from a role by adding or removing them from the corresponding Active Directory group. This greatly simplifies administrative overhead.

  6. (Embedded user store) The PUPM User Manager specifies the manager of each user.

    Note: Only a manager can approve privileged account requests that the user makes. If you use Active Directory as your user store, verify that each user's manager is specified in Active Directory.

  7. (Optional) The System Manager configures the connection to CA Service Desk Manager.

    Integrating with CA Service Desk Manager lets you create multiple approval processes for privileged account requests.

The following diagram illustrates the privileged access role that performs each process step:

The flowchart shows the privileged access role that performs each step of the process to set up privileged access accounts.