29
IBM® Security Secret Server Launchers IBM SECURITY SUPPORT OPEN MIC NOTICE : BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENT TO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING THE CALL, AS WELL AS TO IBM’S USE OF SUCH RECORDING IN ANY AND ALL MEDIA, INCLUDING FOR VIDEO POSTINGS ON YOUTUBE. IF YOU OBJECT, PLEASE DO NOT CONNECT TO THIS CALL. June 12, 2019

Security Secret Server Launchers

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security Secret Server Launchers

IBM® Security Secret ServerLaunchersIBM SECURITY SUPPORT OPEN MIC

NOTICE: BY PARTICIPATING IN THIS CALL, YOU GIVE YOUR IRREVOCABLE CONSENTTO IBM TO RECORD ANY STATEMENTS THAT YOU MAY MAKE DURING THE CALL, AS WELL AS TO IBM’S USE OF SUCH RECORDING IN ANY AND ALL MEDIA, INCLUDINGFOR VIDEO POSTINGS ON YOUTUBE. IF YOU OBJECT, PLEASE DO NOT CONNECTTO THIS CALL.June 12, 2019

Page 2: Security Secret Server Launchers

2 IBM Security

IBM VIP Rewards is a way to engage with and recognize the ways that you, the client, add value to IBM. Complete fun challenges and get rewarded for interacting with IBM, learning new technologies and sharing your knowledge.

Announcing IBM VIP Rewards

Engage. Earn points. Get Rewards.

Learn more…ibm.biz/vip-rewards

Join IBM VIP Rewards for Security…ibm.biz/JoinIBMVIPRewards-Security

Page 3: Security Secret Server Launchers

3 IBM Security

Name – role in IBMName – role in IBMName – role in IBMName – role in IBM

Name – Moderator - role in IBM

IBM Security Learning Academy

• Courses• Videos • Hands-on Labs • Live Events• Badges

Learning at no cost.

New content published daily.

Page 4: Security Secret Server Launchers

4 IBM Security

Panelists

Jensen Toma – Presenter – L2 Support

Dan Barto – Moderator – L2 ManagerGrey Thrasher – L2 Team LeadDaryl Romano – L2 SupportMohammad Khan – L2 SupportGary Sedler – L2 Support

Page 5: Security Secret Server Launchers

5 IBM Security

Agenda

• What are Launchers?

• Launcher Types̶ Remote Desktop, PuTTY, Web, Custom

• Session Management

• SSH Proxy̶ SSH Command Menus

• Live Demo

• Troubleshooting tips

• Q&A

Page 6: Security Secret Server Launchers

6 IBM Security

What are Launchers?

• Secret Server launchers open a connection to a remote computer or device or logs into a website using the secret’s credentials directly from the webpage̶ Convenient and easy to use̶ Circumvents the user having to know the password̶ Launchers only work on Windows and Mac clients

Page 7: Security Secret Server Launchers

7 IBM Security

Enabling Launchers

• By default, launchers are enabled̶ Administration > Configuration

Page 8: Security Secret Server Launchers

8 IBM Security

Enabling Launchers

• Microsoft ClickOnce technology̶ https://docs.microsoft.com/en-us/visualstudio/deployment/clickonce-security-and-deployment?view=vs-2019̶ Applicable if majority of users use Internet Explorer

• Protocol Handler (default)̶ Recommended if Firefox and Chrome are used

Page 9: Security Secret Server Launchers

9 IBM Security

Enabling Launchers

• Launcher Tools̶ Tools > Launcher Tools

Page 10: Security Secret Server Launchers

10 IBM Security

Types of Launchers

• Admin -> Secret Templates > Click on “Configure Launchers”

Page 11: Security Secret Server Launchers

11 IBM Security

Types of Launchers

• You can disable individual launchers by clicking on the launcher name, edit, then removing the checkbox in the ”Active” field

• You can also change the launcher name if you prefer to use something else

Page 12: Security Secret Server Launchers

12 IBM Security

Remote Desktop Launcher

• Initiates an RDP connection to a target machine

Page 13: Security Secret Server Launchers

13 IBM Security

Putty Launcher

• Initiates an SSH session to a UNIX/Linux device

Page 14: Security Secret Server Launchers

14 IBM Security

Web Password Filler

• Opens a web page and injects login credentials

Page 15: Security Secret Server Launchers

15 IBM Security

Custom Launcher

• Custom Launcher for TOAD

Page 16: Security Secret Server Launchers

16 IBM Security

Custom Launcher

• Admin > Secret Templates > Configure Launchers > New

Page 17: Security Secret Server Launchers

17 IBM Security

Session Management

• Admins can terminate active sessions that were initiated thru a launcher

Page 18: Security Secret Server Launchers

18 IBM Security

Session Management

• The same functionality can be used to send a message to the user

Page 19: Security Secret Server Launchers

19 IBM Security

SSH Proxy

• RDP and SSH sessions will be proxied thru the Secret Server̶ Admin > SSH Proxy

• Distributed Engines can also be used as a proxy for greater network flexibility

Page 20: Security Secret Server Launchers

20 IBM Security

SSH Command Menus

• Can be enabled to restrict the commands available to a user̶ Requires that SSH Proxy be enabled̶ Creates a menu of commands that can be run

• No other commands are available to the user

Page 21: Security Secret Server Launchers

Live Demonstration

Page 22: Security Secret Server Launchers

Troubleshooting Tips

Page 23: Security Secret Server Launchers

23 IBM Security

Requirements

• .NET Framework 4.5.1

• Workstation must trust the SSL certificate installed on the IIS server protecting Secret Server̶ If the SSL cert and/or signer certs are not trusted, launchers will fail and return an error

Page 24: Security Secret Server Launchers

24 IBM Security

Items to Double Check

• Protocol Handler is installed to: ̶ C:\Program Files\Thycotic Software Ltd\Secret Server Protocol Handler

• Double check that Firefox / Chrome add-ons are installed and enabled

Page 25: Security Secret Server Launchers

25 IBM Security

Common Error Messages

• The Secret Server Launcher failed to load. Exception: The underlying connection was closed: Could not establish trust relationship for the SSL/TLS secure channel̶ Verify that the Secret Server SSL cert and/or signer certs are trusted by the workstation

• The process (process name) was not found̶ The application is not installed on the machine. If the application is installed, the folder location should be added to

the path.

• The stub received bad data (1783)̶ The process is set to launch using the credentials of the secret but the username or domain is incorrect.

Page 26: Security Secret Server Launchers

26 IBM Security

Protocol Handler Logging

• To enable logging of the Protocol Handler, edit:̶ C:\Program Files\Thycotic Software Ltd\Secret Server Protocol Handler\RDPWin.exe.config

Page 27: Security Secret Server Launchers

27 IBM Security

Questions and AnswersQ: For RDP, can we restrict the connection to local disk or other resources?

A: I believe those are RDP client itself....so you might be able to accomplish the same with custom launcher that executes mstsc with some command options to restrict to local disks. There is an option on the Windows AD Secret(s) (in "Personalize" tab) to "Allow Access to Drives", which might be what you're looking for as well.

Q: SSH Proxy is a way to implement a bastion or Jump server?A: You could use Distributed Engine(s) on other servers, for SSH Proxy(s). But yes...this would allow for more control over the access from client to endpoints, especially useful for offsite workers and/or access to systems in different network segments/behind firewalls etc. (typically not accessible directly from clients)

Q: Equivalent function for the other protocols?A: SSH and RDP supported.

Q: When will the “ssh command blacklisting” will be added? user can use any commands, except those that are on the black list.A: That would be a question for Product Management. If required, please submit a Request For Enhancement here: https://www.ibm.com/developerworks/rfe/

Q: Do you know if SAPlogon has been managed with a custom launcher with success?A: I believe I've heard of some customers/partners creating SAP custom launchers, but I have no details. I found someone had used the SHORTCUT parameters for sapgui.exe to accomplish this.

Page 28: Security Secret Server Launchers

28 IBM Security

Where do you get more information?Search first, then ask in the new IBM Support Forum: http://ibm.biz/SecretServer-SupportForum

More information:• Security Learning Academy: http://ibm.biz/ISSS-LearningAcademy• IBM Knowledge Center: https://www.ibm.com/support/knowledgecenter/en/SSWHLP_10.6.0/com.ibm.isss.doc/kc-

homepage.html• IBM Security Secret Server Support: https://ibm.biz/SecretServerSupport

Useful links:Get started with IBM Security Support

IBM My Support | Sign up for “My Notifications”FREE learning resources on the Security Learning Academy

ibm.com/security/community

Follow us:

www.youtube.com/user/IBMSecuritySupport twitter.com/askibmsecurity http://ibm.biz/ISCS-LinkedIn

Page 29: Security Secret Server Launchers

© Copyright IBM Corporation 2019. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

FOLLOW US ON:

THANK YOU

xforce.ibmcloud.com

@askibmsecurity

youtube/user/IBMSecuritySupport

securityintelligence.com

SecurityLearningAcademy.com

ibm.com/security/community

IBM Security Client Success