![iDoperation 特権ID管理ソリューション](../assets/uploads/2021/03/idoperation_logo.png)
More about workflow / Privileged access granting
Access granting workflow
Work can proceed even when the approver is absent
If there is a sudden system problem, the approver is absent, etc., you can proceed with operation using post-approval. If a user requires urgent access, an email notification will be sent to the administrator and the user will be required to make a post-operation report. This can achieve a balance between smooth work operation and access control. Urgent access can be permitted or prohibited per workflow.
![承認者不在時でも、運用を止めることなく利用できます](../img/function/id-lend-detail/pict-1.png)
Access granting workflow
Users can customize the application form to suit the work
Users can customize items on privileged access application forms by editing or adding text as desired.
![運用に合わせて申請書をカスタマイズできます](../img/function/id-lend-detail/pict-2.png)
Access granting workflow
Three ways to choose accounts
When applying for privileged access, users choose a specific privileged ID.
Users specify who uses which privileged identity for which server and application. There are three ways to select accounts: 1) specify a shared privileged ID of the type pre-registered in iDoperation, 2) specify a one-time privileged ID, or 3) specify several privileged IDs together using a preset application form.
Specify a shared privileged ID
Specify one account at a time among registered privileged IDs in iDoperation.
![共有型の特権IDの指定](../img/function/id-lend-detail/img-3.png)
Specify using preset application
By registering multiple targets, accounts and applications in advance, you can specify privileged IDs collectively at the time of the application by simply selecting the preset content.
![申請プリセットの指定](../img/function/id-lend-detail/img-4.png)
Specify a one-time privileged ID
Specify one one-time privileged ID (only valid during the applied period) at a time. You can choose from multiple account groups depending on what you want to do.
![ワンタイム特権IDの指定](../img/function/id-lend-detail/img-5.png)
![](../img/icon/hat-green.png)
One-time privileged IDs
Cyber attacks are becoming increasingly frequent, and they often target privileged IDs. The challenge is how to prevent attackers from stealing privileged IDs to gain access to PCs and servers and spread malware. By disabling privileged IDs of systems that requires strict security, privileged IDs disappear from the system, so attackers will be unable to steal them.
iDoperation's one-time privileged ID granting allows you to create temporary privileged IDs when necessary on approval, grants them, and automatically deletes or deactivates them after use, strengthening your security.Reporting workflow
Granted access ends when a report is submitted
Privileged users submit a report via application after finishing the work. The privileged ID is revoked when the report is applied for or the usage period ends. In the case of a one-time privileged ID, the ID is automatically deleted or revoked.
![報告申請により、特権IDの貸出しが終了します](../img/function/id-lend-detail/img-6.png)
![報告申請により、特権IDの貸出しが終了します](../img/function/id-lend-detail/img-7.png)
Access granting workflow
Applications are displayed in an easy-to-understand manner.
All applications are listed and clearly categorized. Those that still require processing by the applicant or approver are under “Waiting” tabs.
![自分が処理する必要がある申請がわかりやすく表示されます](../img/function/id-lend-detail/pict-8.png)
Workflow management
It can set workflow suitable for each operation including multi-stage approval
iDoperation can set the workflow separately for each system. Examples of items: approval routes (up to nine levels of approval), permission for emergency applications, maximum granting period for emergency applications, application start date, maximum granting days, granting method (specify an account one by one, specify an account from a preset application form, specify a one-time privileged ID), mandate for report submission.
![多段承認など、運用に合わせたワークフロー設定が行えます](../img/function/id-lend-detail/img-9.png)
Granting of privileged access
It can grant privileged access in two ways
Privileged access can be granted with the password concealed or revealed (one-time password).
For remote access and the like, you can grant privileged access only to authorized privileged users by granting them with the password concealed. If you can't grant passwords confidentially, such as when working on a console, you can grant privileged access only to authorized privileged users by granting them with one-time passwords.
Privileged access granting with the password concealed
iDoperation grants and revokes privileged access to the authorized user, upon approval, at the scheduled day and time.
Access to the target is through single sign-on through iDoperation Client and the password is not revealed to the privileged user. This prevents unauthorized access by unauthorized users.
![パスワード秘匿による貸出し](../img/function/id-lend-detail/img-detail-10.png)
Granting access with one-time password
When local logging in to the target is needed, such as to work with the console, a one-time password can be used. The one-time password is automatically changed to a random password and made invalid when the requested period ends or the usage report is submitted. One-time passwords can be viewed in iDoperation Client or the workflow status window.
Check a password in iDoperation Client
![iDoperation Clientからパスワードを確認する方法](../img/function/id-lend-detail/img-11.png)
Click "Show password"
Check a password in the workflow status window
![貸出状況確認画面からパスワードを確認する方法](../img/function/id-lend-detail/img-12.png)
When an application is approved, you can check the one-time password on the status screen.
Granting of privileged access
You can also use Linux key authentication
The use of key authentication, such as Linux on AWS, has been increasing. iDoperation can grant privileged access with a concealed password for Linux that uses key authentication.
As with password-authenticated Linux, privileged users can achieve secure access without being aware of the key.
![鍵認証のLinuxでも利用できます](../img/function/id-lend-detail/img-13.png)
Granting of privileged access
It can increase usability for privileged users by switching the view of iDoperation Client
It helps privileged users handle privileged access with a switchable view.
In addition, iDoperation Client lets you check the application status and information on each target, which helps prevent mistaken access. The iDoperation Client screen supports the English language.
Target View
![ターゲットビュー](../img/function/id-lend-detail/img-14.png)
Application view
![申請ビュー](../img/function/id-lend-detail/img-15.png)
Granting of privileged access
It supports cases when the target belongs to more than one network or the target uses NAT
If the target has more than one IP address, privileged users can still select and access the destination.
For this reason, access control can be performed even in an environment where the network is isolated or in an environment where NAT is performed. In addition, inspection of the access log can be executed reliably.
![ターゲットが複数のネットワークに所属している場合や、NATされている場合でも利用できます](../img/function/id-lend-detail/img-16.png)
Granting of privileged access
Access granting methods
iDoperation is compatible with applications commonly used in system operation. Applications not standard compatible can be made compatible by your own script extensions.
Target Type |
Applications that support privileged access granting with the password concealed |
Supports one-time password |
Supports one-time privileged access granting |
|
---|---|---|---|---|
OS | Windows | RDP, WinSCP, FFFTP | ○ | ○ |
Active Directory | RDP | ○ | ○ | |
Linux, AI, Solari, HP-UX | TeraTerm, WinSCP, FFFTP | ○ | ○ | |
Directory Service |
Microsoft Active Directory | RDS | ○ | ○ |
AWS Managed Microsoft AD, AWS Simple AD |
- | ○ | ○ | |
Virtualization Software |
vSphere ESXi | vSphere Client, VMware Host Client | ○ | × |
vCenter Server Appliance | vSphere Web Client(*1) | ○ | × | |
Hyper-V Server | RDP | ○ | × | |
Database | Oracle, Amazon RDS for Oracle | SQL*Plus | ○ | × |
SQL Server,Azure SQL Database,
Amazon RDS for SQL Server |
SQL Server Management Studio | ○ | × | |
PostgreSQL | - | ○ | × | |
MariaD, Amazon RDS for MariaDB | - | ○ | × | |
MySQL | MySQL Command Line Client | ○ | × | |
Db2 | Db2 CLPPlus | ○ | × | |
HiRDB | HiRDB SQL Executer(line mode version) | ○ | × | |
Cloud | AWS Management Console(IAM) | AWS Management Console(*1) | ○ | ○ |
Azure AD | Azure Portal(*1, Office 365(*1) | ○ | × | |
BOX | BOX | × | × | |
Googole Cloud Platform(*1), Google Workspace(*1) |
○ | × | ||
Oracle Cloud Infrastructure(IAM) | Oracle Cloud Infrastructure Console(*1) | × | × | |
Salesforce | Salesforce(*1) | ○ | × | |
Application | iDoperation(administrator) | iDoperation Web Console(*1) | ○ | × |
- (*1)
- Supported browsers are Microsoft Edge, Google Chrome, and Safari.