Fudo System Documentation
Fudo System Documentation
4 - System
Documentation
Fudo Security
1 About documentation 1
3 Introduction 6
3.1 System overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.2 Supported protocols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2.1 HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2.2 Modbus . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2.3 MS SQL (TDS) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
3.2.4 MySQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.2.5 RDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
3.2.6 SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
3.2.7 Telnet 3270 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
3.2.8 Telnet 5250 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.2.9 Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.2.10 VNC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
3.2.11 X11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.2.12 TCP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.2.13 Secret Checkout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
3.3 Deployment scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
3.4 Connection modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
3.5 User authentication methods and modes . . . . . . . . . . . . . . . . . . . . . . . 24
3.6 Security measures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.6.1 Data encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
3.6.2 Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.6.3 Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.6.4 Sandboxing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
3.6.5 Reliability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.6.6 Cluster configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.7 Data model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
3.8 Dashboard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
3.8.1 Widgets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
3.8.2 Adding, customizing and removind dashlets . . . . . . . . . . . . . . . . 31
3.8.3 Hard drives status information . . . . . . . . . . . . . . . . . . . . . . . . 32
3.9 User Portal (Access Gateway) . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
i
3.10 Third-Party Licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
4 System deployment 34
4.1 Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.2 Hardware overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
4.3 System initiation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
4.3.1 Virtual machine . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
5 Quick start 50
5.1 SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
5.1.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
5.1.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
5.1.3 Establishing connection . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
5.1.4 Viewing user session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56
5.2 SSH in bastion mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5.2.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5.2.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
5.2.3 Establishing connection . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
5.2.4 Viewing user session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
5.3 RDP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
5.3.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
5.3.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65
5.3.3 Establishing an RDP connection with a remote host . . . . . . . . . . . 69
5.3.4 Viewing user session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71
5.4 RDP in bastion mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
5.4.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
5.4.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
5.4.3 Establishing an RDP connection with a remote host . . . . . . . . . . . 77
5.4.4 Viewing user session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
5.5 Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
5.5.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
5.5.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
5.5.3 Establishing a telnet connection with the remote host . . . . . . . . . . . 86
5.5.4 Viewing user’s session . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
5.6 Telnet 5250 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
5.6.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
5.6.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
5.6.3 Establishing a telnet connection with the remote host . . . . . . . . . . . 93
5.6.4 Viewing user’s session . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
5.7 MySQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.7.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
5.7.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
5.7.3 Establishing connection with a MySQL database . . . . . . . . . . . . . 100
5.7.4 Viewing user session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
5.8 MS SQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
5.8.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
5.8.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
5.8.3 Establishing connection with a MS SQL database . . . . . . . . . . . . . 108
5.8.4 Viewing user session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
5.9 HTTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
5.9.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
5.9.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
ii
5.9.3 Connecting to remote resource . . . . . . . . . . . . . . . . . . . . . . . . 116
5.9.4 Viewing user session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
5.10 VNC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
5.10.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
5.10.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
5.10.3 Establishing connection . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
5.10.4 Viewing user session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
5.11 User authentication against external LDAP server . . . . . . . . . . . . . . . . . 124
5.11.1 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
5.11.2 Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
6 Users 127
6.1 Creating a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
6.2 Copying user grants . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
6.3 Editing a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
6.4 Blocking a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
6.5 Unblocking a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
6.6 Deleting a user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
6.7 Authentication failures counter . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
6.8 Roles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
6.9 Users synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
7 Servers 149
7.1 Creating a server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
7.1.1 Creating an HTTP server . . . . . . . . . . . . . . . . . . . . . . . . . . 149
7.1.2 Creating a Modbus server . . . . . . . . . . . . . . . . . . . . . . . . . . 152
7.1.3 Creating a MS SQL server . . . . . . . . . . . . . . . . . . . . . . . . . . 153
7.1.4 Creating a MySQL server . . . . . . . . . . . . . . . . . . . . . . . . . . 155
7.1.5 Creating an RDP server . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
7.1.6 Creating an SSH server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159
7.1.7 Creating a Telnet server . . . . . . . . . . . . . . . . . . . . . . . . . . . 161
7.1.8 Creating a Telnet 3270 server . . . . . . . . . . . . . . . . . . . . . . . . 163
7.1.9 Creating a Telnet 5250 server . . . . . . . . . . . . . . . . . . . . . . . . 165
7.1.10 Creating a VNC server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
7.1.11 Creating a TCP server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
7.2 Importing a server list from CSV file . . . . . . . . . . . . . . . . . . . . . . . . . 170
7.3 Editing a server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
7.4 Blocking a server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
7.5 Unblocking a server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
7.6 Deleting a server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
8 Pools 176
8.1 Creating a pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
8.2 Deleting a pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
10 Accounts 182
10.1 Creating an account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
iii
10.1.1 Creating an anonymous account . . . . . . . . . . . . . . . . . . . . . . . 183
10.1.2 Creating a forward account . . . . . . . . . . . . . . . . . . . . . . . . . 185
10.1.3 Creating a regular account . . . . . . . . . . . . . . . . . . . . . . . . . . 189
10.2 Editing an account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195
10.3 Blocking an account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 196
10.4 Unblocking an account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
10.5 Deleting an account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
10.6 Managing security alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
10.6.1 Triggering password change . . . . . . . . . . . . . . . . . . . . . . . . . 199
10.6.2 Ignoring security alert . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
11 Listeners 202
11.1 Creating a listener . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
11.1.1 Setting up the SSH listener . . . . . . . . . . . . . . . . . . . . . . . . . 204
11.1.2 Setting up the RDP listener . . . . . . . . . . . . . . . . . . . . . . . . . 207
11.1.3 Setting up the VNC listener . . . . . . . . . . . . . . . . . . . . . . . . . 211
11.1.4 Setting up the HTTP listener . . . . . . . . . . . . . . . . . . . . . . . . 213
11.1.5 Setting up the Modbus listener . . . . . . . . . . . . . . . . . . . . . . . 217
11.1.6 Setting up the MySQL listener . . . . . . . . . . . . . . . . . . . . . . . 218
11.1.7 Setting up the TCP listener . . . . . . . . . . . . . . . . . . . . . . . . . 220
11.1.8 Setting up the MS SQL listener . . . . . . . . . . . . . . . . . . . . . . . 223
11.1.9 Setting up the Telnet listener . . . . . . . . . . . . . . . . . . . . . . . . 225
11.1.10 Setting up the Telnet 3270 listener . . . . . . . . . . . . . . . . . . . . . 227
11.1.11 Setting up the Telnet 5250 listener . . . . . . . . . . . . . . . . . . . . . 229
11.2 Editing a listener . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
11.3 Blocking a listener . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
11.4 Unblocking a listener . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
11.5 Deleting a listener . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
12 Safes 235
12.1 Creating a safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 236
12.2 Editing a safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
12.3 Blocking a safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
12.4 Unblocking a safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 241
12.5 Deleting a safe . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
13 Discovery 244
13.1 Creating a rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.1.1 Creating a rule for accounts . . . . . . . . . . . . . . . . . . . . . . . . . 245
13.1.2 Creating a rule for servers . . . . . . . . . . . . . . . . . . . . . . . . . . 247
13.2 Managing rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
13.3 Creating a scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248
13.3.1 Creating a scanner for Domain Controller Accounts . . . . . . . . . . . . 248
13.3.2 Creating a scanner for Domain Controller Servers . . . . . . . . . . . . . 251
13.3.3 Creating a scanner for local accounts . . . . . . . . . . . . . . . . . . . . 252
13.4 Managing scanners . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
13.5 Managing discovered accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . 254
13.6 Managing discovered servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
iv
14.1.2 Editing a password changer policy . . . . . . . . . . . . . . . . . . . . . . 259
14.1.3 Deleting a password changer policy . . . . . . . . . . . . . . . . . . . . . 259
14.2 Custom password changers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
14.2.1 Defining a custom password changer . . . . . . . . . . . . . . . . . . . . 259
14.2.2 Editing a custom password changer . . . . . . . . . . . . . . . . . . . . . 263
14.2.3 Deleting a custom password changer . . . . . . . . . . . . . . . . . . . . 263
14.3 Connection modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
14.3.1 SSH . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263
14.3.2 LDAP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
14.3.3 Telnet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 265
14.3.4 WinRM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 266
14.4 Setting up password changing on a Unix system . . . . . . . . . . . . . . . . . . 267
15 Policies 269
15.1 AI module-based policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
15.2 Regular expression-based policy . . . . . . . . . . . . . . . . . . . . . . . . . . . 273
16 Downloads 277
16.1 Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
16.2 Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 277
19 Sessions 288
19.1 Filtering sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
19.1.1 Defining filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
19.1.2 Managing user defined filter definitions . . . . . . . . . . . . . . . . . . . 291
19.1.3 Full text search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
19.2 Viewing sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
19.3 Pausing connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
19.4 Terminating connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
19.5 Joining live session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
19.6 Sharing sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 301
19.7 Commenting sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
19.8 Sessions’ retention lockdown . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
19.9 Exporting sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
19.10 Deleting sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
19.11 OCR processing sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
19.12 Session data replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
19.13 Timestamping selected sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
19.14 Cancelling sessions timestamping . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
19.15 Approving pending user requests . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
19.15.1 Fudo management interface . . . . . . . . . . . . . . . . . . . . . . . . . 312
19.16 Declining pending requests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
19.16.1 Fudo administration interface . . . . . . . . . . . . . . . . . . . . . . . . 313
19.17 AI sessions processing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
19.17.1 Content models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
v
19.17.2 Session scoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315
19.17.3 Quantitive models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
20 Reports 318
21 Productivity 322
21.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
21.2 Sessions analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
21.3 Activity comparison . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
22 Administration 326
22.1 System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
22.1.1 Date and time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
22.1.2 SSL certificates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
22.1.3 Deny new connections . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
22.1.4 SSH access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
22.1.5 Sensitive features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
22.1.6 System update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
22.1.6.1 Updating system . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
22.1.6.2 Restoring previous system version . . . . . . . . . . . . . . . . . 333
22.1.6.3 Deleting upgrade snapshot . . . . . . . . . . . . . . . . . . . . . 334
22.1.7 License . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
22.1.8 Hotfix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
22.1.9 Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
22.1.10 Configuration encryption . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
22.1.11 Default domain . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
22.1.12 Password complexity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
22.1.13 Single Sign On . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
22.1.13.1 Setting up Fudo Enterprise for SSO . . . . . . . . . . . . . . . . 342
22.1.13.2 Single Sign On in Admin Panel . . . . . . . . . . . . . . . . . . . 342
22.1.13.3 Single Sign On in User Portal . . . . . . . . . . . . . . . . . . . . 343
22.1.13.4 Setting up domain controller . . . . . . . . . . . . . . . . . . . . 344
22.1.13.5 Setting up user workstations . . . . . . . . . . . . . . . . . . . . 344
22.1.14 Password changers - active cluster node . . . . . . . . . . . . . . . . . . . 344
22.1.14.1 Cluster Password Changers . . . . . . . . . . . . . . . . . . . . . 345
22.2 Network settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
22.2.1 Network interfaces configuration . . . . . . . . . . . . . . . . . . . . . . . 346
22.2.1.1 Managing physical interfaces . . . . . . . . . . . . . . . . . . . . 346
22.2.1.2 Defining IP address using system console . . . . . . . . . . . . . 349
22.2.1.3 Setting up a network bridge . . . . . . . . . . . . . . . . . . . . . 352
22.2.1.4 Setting up virtual networks (VLANs) . . . . . . . . . . . . . . . 353
22.2.1.5 Setting up LACP link aggregation . . . . . . . . . . . . . . . . . 354
22.2.2 Labeled IP addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
22.2.3 Routing configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
22.2.4 DNS configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
22.2.5 ARP table configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
22.3 Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
22.4 Artificial Intelligence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362
22.4.1 Configuring models trainers . . . . . . . . . . . . . . . . . . . . . . . . . 362
22.4.2 Behavioral analysis models . . . . . . . . . . . . . . . . . . . . . . . . . . 364
22.5 Trusted time-stamping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366
22.6 Certificate-based authentication scheme . . . . . . . . . . . . . . . . . . . . . . . 367
vi
22.7 Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 368
22.7.1 External authentication server definition . . . . . . . . . . . . . . . . . . 369
22.7.2 OATH authentication definition . . . . . . . . . . . . . . . . . . . . . . . 371
22.7.3 SMS authentication definition . . . . . . . . . . . . . . . . . . . . . . . . 371
22.7.4 DUO authentication definition . . . . . . . . . . . . . . . . . . . . . . . . 373
22.7.5 OpenID Connect authentication definition . . . . . . . . . . . . . . . . . 374
22.8 External passwords repositories . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
22.8.1 CyberArk Enterprise Password Vault . . . . . . . . . . . . . . . . . . . . 376
22.8.2 CyberArk Credential Provider . . . . . . . . . . . . . . . . . . . . . . . . 378
22.8.3 Thycotic Secret Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
22.8.4 Local Administrator Password Solutions (LAPS) . . . . . . . . . . . . . 381
22.9 Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
22.9.1 RDP/VNC login screen configuration . . . . . . . . . . . . . . . . . . . . 383
22.9.2 User portal login screen configuration . . . . . . . . . . . . . . . . . . . . 386
22.10 System version restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388
22.11 System restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
22.12 SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
22.12.1 Configuring SNMP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
22.12.2 Configuring SNMPv3 TRAP . . . . . . . . . . . . . . . . . . . . . . . . . 391
22.12.3 SNMP MIBs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 392
22.12.4 Getting SNMP readings using snmpwalk . . . . . . . . . . . . . . . . . . 392
22.12.5 Fudo Enterprise specific SNMP extensions . . . . . . . . . . . . . . . . . 393
22.13 Backup and retention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
22.13.1 System backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394
22.13.2 Data retention . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
22.14 External storage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398
22.14.1 Configuring external storage . . . . . . . . . . . . . . . . . . . . . . . . . 398
22.14.2 Expanding external storage device . . . . . . . . . . . . . . . . . . . . . 399
22.15 Exporting/importing system configuration . . . . . . . . . . . . . . . . . . . . . 399
22.15.1 Exporting system configuration . . . . . . . . . . . . . . . . . . . . . . . 399
22.15.2 Importing system configuration . . . . . . . . . . . . . . . . . . . . . . . 400
22.16 Cluster configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401
22.16.1 Initiating cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
22.16.2 Adding cluster nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404
22.16.3 Editing cluster nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
22.16.4 Deleting cluster nodes . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
22.16.5 Redundancy groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
22.17 Events log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
22.17.1 External syslog servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
22.17.2 Exporting events log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
22.18 Changing encryption passphrase . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
22.19 Integration with CERB server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
22.20 System maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
22.20.1 Backing up encryption keys . . . . . . . . . . . . . . . . . . . . . . . . . 422
22.20.2 Monitoring system condition . . . . . . . . . . . . . . . . . . . . . . . . . 426
22.20.3 Health Check . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427
22.20.3.1 API Health Check . . . . . . . . . . . . . . . . . . . . . . . . . . 428
22.20.4 Call Home . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
22.20.5 Hard drive replacement . . . . . . . . . . . . . . . . . . . . . . . . . . . . 429
22.20.6 Resetting configuration to default settings . . . . . . . . . . . . . . . . . 430
vii
23 Reference information 434
23.1 RDP connections broker . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 434
23.2 Log messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
23.3 Footer Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
28 Troubleshooting 475
28.1 Booting up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475
28.2 Connecting to servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
28.3 Logging to administration panel . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
28.4 Session playback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
28.5 Cluster configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 481
28.6 Trusted timestamping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
28.7 Support mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
31 Glossary 540
viii
Index 543
ix
CHAPTER 1
About documentation
The target audience of this document are system administrators and operators, responsible for
managing Fudo Enterprise’s configuration and supervising remote access.
Documentation Structure
1. About documentation
This chapter provides information about the documentation.
2. Layout themes of the Admin Panel
This chapter provides information on how to change layout themes for the Fudo Enterprise’s
Admin Panel.
3. Introduction
This chapter provides information on Fudo Enterprise modules, describes data model, covers
deployment scenarios as well as connections modes and user authentication methods.
4. System deployment
This chapter covers system deployment procedure along with the system initiation.
5. Quick start
This chapter contains typical configuration examples.
6. Users
This chapter covers users management topics.
7. Servers
This chapter covers servers management topics.
8. Pools
This chapter covers pools management topics.
9. Remote applications
1
Fudo Enterprise 5.4 - System Documentation
2
Fudo Enterprise 5.4 - System Documentation
This chapter contains client applications configuration instructions for selected protocols.
27. Troubleshooting
This chapter contains solutions for potential problems which may occur when using Fudo En-
terprise.
28. Frequently asked questions
This chapter contains frequently requested information about Fudo Enterprise.
29. Glossary
This chapter contains list of terms used throughout this documentation.
Conventions and symbols
This documentation is written using the following conventions:
• italic - this formatting is used to mark user interface elements.
• example - this formatting is used to write example value of a parameter, API
method name or code example.
• Note field:
Note: Note field usually contains additional information closely related with de-
scribed topic, e.g. suggestion concerning given procedure step; additional conditions
which have to be met.
• Warning field:
Disclaimer
All trademarks, product names, and company names or logos cited in this document are the
property of their respective owners and are used for information purpose only.
3
CHAPTER 2
There are three layout themes available to choose for the Admin Panel. Click the icon in the
lower right corner of the screen to access the list of variants.
Light theme:
Dark theme:
4
Fudo Enterprise 5.4 - System Documentation
Terminal theme:
Related topics:
• Introduction
5
CHAPTER 3
Introduction
Fudo Enterprise is a complete solution for managing remote privileged access. Fudo Enterprise
comprises four modules each dedicated to different aspects of remote access management:
• Privilege Session Monitoring (PSM)
• Secret Manager
• Productivity Analyzer
• Application to Application Password Manager (AAPM)
PSM
PSM module enables facilitating constant monitoring of remote access sessions to IT infrastruc-
ture. Fudo Enterprise acts as a proxy between users and monitored servers and it registers users’
actions, including mouse pointer moves, keystrokes and transferred files.
The PSM module records complete network traffic along with meta data, enabling precise session
playback and full-text content search.
Fudo Enterprise enables viewing current connections and intervening in a monitored session in
case the administrator notices a potential misuse of access rights.
The PSM module supports following system configurations:
• Linux,
• FreeBSD,
• Mac OS X
6
Fudo Enterprise 5.4 - System Documentation
3.2.1 HTTP
Warning: HTTP rendering is a CPU intensive process and may have negative impact on
system’s performance. A physical appliance is recommended for monitoring rendered HTTP
connections with the following limitations regarding the maximum number of concurrent
rendered HTTP sessions.
3.2.2 Modbus
Due to the fact that MS SQL Studio may create multiple connections for sending internal queries,
the sessions, connected via the TDS layer protocol using MS SQL Studio are getting aggregated
by Fudo Enterprise.
Fudo Enterprise follows an algorithm that verifies if there is an already connected session on a
current node. If the algorithm identifies that the main connection objects (listener, account,
server address (server), user, and safe) of the new session are correlating with already
existing session, both sessions are aggregated into one.
If the main connection objects of the new session are not correlating with any of already existing
sessions, a new session is created.
This makes multiple queries to be grouped within one session. Every query has a unique tag
that allows filtering important connections with users’ queries in the Fudo Enterprise player.
Supported connection modes:
• Bastion,
• Gateway,
• Proxy,
• Transparent.
Supported client applications:
• SQL Server Management Studio,
• sqsh.
Notes:
• Session joining is not supported.
3.2.4 MySQL
3.2.5 RDP
• Ukrainian
• Polish
• Hungarian
• Russian
Supported algorithms
• when TLS encryption selected and the option Legacy ciphers is disabled:
– TLS_AES_256_GCM_SHA384
– TLS_CHACHA20_POLY1305_SHA256
– TLS_AES_128_GCM_SHA256
– ECDHE-ECDSA-CHACHA20-POLY1305
– ECDHE-RSA-CHACHA20-POLY1305
– ECDHE-ECDSA-AES256-GCM-SHA384
– ECDHE-RSA-AES256-GCM-SHA384
– ECDHE-ECDSA-AES256-SHA384
– ECDHE-RSA-AES256-SHA384
– DHE-RSA-AES256-GCM-SHA384
– AES256-GCM-SHA384
– AES128-GCM-SHA256
– AES128-SHA256
• when TLS encryption selected and the option Legacy ciphers is enabled:
– TLS_AES_256_GCM_SHA384
– TLS_CHACHA20_POLY1305_SHA256
– TLS_AES_128_GCM_SHA256
– ECDHE-ECDSA-AES256-GCM-SHA384
– ECDHE-RSA-AES256-GCM-SHA384
– DHE-RSA-AES256-GCM-SHA384
– ECDHE-ECDSA-CHACHA20-POLY1305
– ECDHE-RSA-CHACHA20-POLY1305
– DHE-RSA-CHACHA20-POLY1305
– ECDHE-ECDSA-AES128-GCM-SHA256
– ECDHE-RSA-AES128-GCM-SHA256
– DHE-RSA-AES128-GCM-SHA256
– ECDHE-ECDSA-AES256-SHA384
– ECDHE-RSA-AES256-SHA384
– DHE-RSA-AES256-SHA256
– ECDHE-ECDSA-AES128-SHA256
– ECDHE-RSA-AES128-SHA256
– DHE-RSA-AES128-SHA256
– ECDHE-ECDSA-AES256-SHA
– ECDHE-RSA-AES256-SHA
– DHE-RSA-AES256-SHA
– ECDHE-ECDSA-AES128-SHA
– ECDHE-RSA-AES128-SHA
– DHE-RSA-AES128-SHA
– AES256-GCM-SHA384
– AES128-GCM-SHA256
– AES256-SHA256
– AES128-SHA256
– AES256-SHA
– AES128-SHA
Notes:
• RDP protocol implementation supports user authentication over RADIUS in challenge-
response mode.
• For RDP servers are supported NLA mode and TLS mode.
• For RDP listeners, besides the standard security level, the Enhanced RDP Security with
TLS option is supported.
• In case the NLA option enabled, Fudo Enterprise requires NTLM protocol version 2 or
newer. To properly handle NLA authentication connections, enable option to only send
NTLMv2 response both on client and server side.
1. Click Start > All Programs > Accessories > Run.
2. Type secpol.msc in the Open input field and click OK.
3. Select Local Policies > Security Options and double-click Network Security: LAN
Manager authentication level.
4. Select Send NTLMv2 response only. Refuse LM & NTLM from the drop-down list.
5. Click Apply.
• Fudo Enterprise verifies input language settings when negotiation connection and does not
support dynamic language change on the login screen.
RemoteApp
Fudo natively supports RemoteApp connections over RDP protocol. Application windows are
recorded the same way as RDP connections, enforcing all Fudo Enterprise security restrictions.
To monitor RemoteApp sessions, the connection must be launched through a *.rdp configuration
file with the Fudo Enterprise IP address and the port number defined.
Connections initiated over Remote Desktop Web Access can be monitored by Fudo only in
Transparent/Gateway mode as the Remote Desktop Web Access can not provide Fudo IP address
instead of original destination server.
3.2.6 SSH
– [email protected]
• Supported encryption algorithms:
– [email protected]
– aes128-ctr
– aes192-ctr
– aes256-ctr
– [email protected]
– [email protected]
• additionally, there are 10 more encryption algorithms supported when the Legacy ciphers
option is enabled:
– aes128-cbc
– aes192-cbc
– aes256-cbc
– [email protected]
– 3des-cbc
– arcfour256
– arcfour128
– arcfour
– blowfish-cbc
– cast128-cbc
• Supported MAC algorithms:
– [email protected]
– [email protected]
– [email protected]
– [email protected]
– [email protected]
– [email protected]
– hmac-sha2-256
– hmac-sha2-512
• plus, there are 11 more MAC algorithms supported when the Legacy ciphers option is
enabled:
– hmac-sha1
– [email protected]
– [email protected]
– hmac-sha1-96
– hmac-ripemd160
– [email protected]
– [email protected]
– hmac-md5
– hmac-md5-96
– [email protected]
– [email protected]
Notes:
• SSH protocol implementation supports user authentication over RADIUS in challenge-
response mode.
Note: The FreeBSD terminal version of telnet(1) client (in comparison to those available
on Linux distributions, like Debian) automatically passes the user login name to the destination
server during the authentication process. This is due to the -a parameter, which is enabled by
default and is responsible for passing the login name so that the user doesn’t have to input it
while loggin in. In order to disable automatic passing of the login name, use -K parameter or
-l parameter with empty login.
It’s recommended to pay attention to the default settings of your Telnet client.
Note: The FreeBSD terminal version of telnet(1) client (in comparison to those available
on Linux distributions, like Debian) automatically passes the user login name to the destination
server during the authentication process. This is due to the -a parameter, which is enabled by
default and is responsible for passing the login name so that the user doesn’t have to input it
while loggin in. In order to disable automatic passing of the login name, use -K parameter or
-l parameter with empty login.
It’s recommended to pay attention to the default settings of your Telnet client.
3.2.9 Telnet
Note: The FreeBSD terminal version of telnet(1) client (in comparison to those available
on Linux distributions, like Debian) automatically passes the user login name to the destination
server during the authentication process. This is due to the -a parameter, which is enabled by
default and is responsible for passing the login name so that the user doesn’t have to input it
while loggin in. In order to disable automatic passing of the login name, use -K parameter or
-l parameter with empty login.
It’s recommended to pay attention to the default settings of your Telnet client.
3.2.10 VNC
3.2.11 X11
Supported servers:
• Xorg,
• Xming,
• XQuartz.
Supported fonts:
For a list of fonts available for the applications that use core X11 protocol to draw text, check
the list of fonts available in Fudo Enterprise.
3.2.12 TCP
Secret Checkout is a virtual protocol for establishing an access session to the account secret.
Checkout function allows user to temporarily take a secret from a secret vault. Then, the user
informs Fudo that the secret is no longer needed by returning it to the secret vault with a
Checkin operation.
Note: The protocol is virtual in a sense that there is no TCP/IP session related to it, only
meta information is stored (for example checkout time, checkin time, who accessed the secret).
As there is no TCP/IP, no data that can be played are saved. This makes checkout sessions
lightweight compared to sessions recorded with data, such as RDP.
In case of a breach, having secret checkouts recorded as sessions, allows one to pinpoint who had
access to the leaked secret.
A request for a secret checkout is sent by a user via the User Portal. The request can be approved
or declined by an administrator if a given safe is set to require approval. The user can see and
copy the password anytime during the session, which counts active till the password is returned
or the password’s valid time is over.
The secret can be returned automatically after the given period of time or returned manually
by the user via the User Portal. More on how to configure a timeout for automatic return of the
password is at Creating a safe page under Users tab section and at Creating an account with
regular type page under Credentials section.
When a checkout timeout is configured for an account with an ongoing checkout session, the
other user can checkout the secret, too . In this situation the user has to confirm the operation
by forcing checkout. This way the user can use soft exclusiveness of the checkout operation.
After return, the secret can be automatically changed to a new one, generated in accordance
with the specified Password Change Policy for a particular account.
Notes:
• Session joining feature is not supported.
• Playback is not supported.
Note: It is advised to deploy the Fudo Enterprise within the IT infrastructure, so it only
mediates administrative connections. It will allow for lowering system load, network traffic
optimization as well as maintaining access to hosted services in case of hardware malfunction.
Bridge
In bridge mode Fudo Enterprise mediates communication between users and servers regardless
whether the traffic is being monitored (i.e. it uses any of supported protocols) or not.
Mediating packages transfer, Fudo Enterprise preserves source IP address when forwarding re-
quests to destination servers.
Such solution allows keeping existing rules on firewalls which control access to internal resources.
For more information on configuring bridge refer to the Network configuration topic.
Forced routing
Forced routing mode requires using a properly configured router. Such solution allows control-
ling network traffic in third ISO/OSI network layer, so only administrative requests are routed
through Fudo Enterprise and the rest of the traffic is forwarded directly to the destination server.
This mode does not require changes in existing network topology and enables network traffic
optimization due to separating requests from system administrators and regular users.
Related topics:
• Connection modes
• Managing servers
• User authentication methods and modes
• System overview
• Quick start - SSH connection configuration
• Quick start - RDP connection configuration
• Initial boot up
Transparent
In transparent mode, users connect to destination server using given server’s IP address.
Gateway
In gateway mode, users connect to destination server using the server’s actual IP address. Fudo
Enterprise mediates connection with the server using own IP address. This ensures that the
traffic from the server to the user goes through Fudo Enterprise.
Proxy
In proxy mode, administrator connects to destination server using combination of Fudo Enter-
prise IP address and unique port number assigned to given server. Uniqueness of this combina-
tion enables establishing connection with a particular resource.
Such approach enables concealing actual IP addressing and allows configuring servers to only
accept requests sent from Fudo Enterprise.
Bastion
Note: The bastion mode is supported when connecting over SSH, RDP, VNC, Telnet, Telnet
In bastion mode, the target host is specified within the string identifying the user and the server
their are trying to connect to, e.g. ssh user#root#10.0.2.22. This enables facilitating access
to a group of monitored servers through the same IP address and port number combination.
Note: If an account object doesn’t have a login defined, the Fudo Enterprise system will ask
for a login while connecting to the target server.
Related topics:
• Deployment scenarios
• Managing servers
• User authentication methods and modes
• System overview
• Quick start - SSH connection configuration
• Quick start - RDP connection configuration
• Initial boot up
Note:
• External authentication servers CERB, RADIUS, LDAP and Active Directory as well
as SMS and DUO require configuration. For more information, refer to the External
authentication topic.
• RDP, SSH and VNC protocols support user authentication over RADIUS in challenge-
response mode.
Authentication modes
After authenticating the user, Fudo proceeds with establishing connection with the target system
using original user credentials or substituting them with values stored locally or fetched from a
password vault.
Note: Due to specifics of VNC protocol, which authenticates the user using password only,
the login entered on the logon screen is ignored when establishing a VNC connection.
Note:
• The password to the target system can be either explicitly defined in the account or can
be obtained from internal or external password vault upon each access request. For more
information, refer to the Password changers and External passwords repositories topics.
• Due to specifics of VNC protocol, which authenticates the user using password only, the
login entered as the substitution string is ignored when establishing a VNC connection.
Note: In case of Oracle database, the user password and the privileged account password must
be both either shorter than 16 characters or 16-32 characters long.
Two-fold authentication
In two-fold authentication mode user is asked for login and password twice. Once for authenti-
cating against Fudo and once again to access the target system.
Authentication with password substitution
In this authentication mode, Fudo forwards login provided by user and substitutes the password
when establishing connection with the target system.
Note:
• The password to the target system can be either explicitly defined in the connection or can
be obtained from the external passwords repository upon each access request. For more
information, refer to the External passwords repositories topic.
• Due to specifics of VNC protocol, which authenticates the user using password only, the
login entered on the logon screen is ignored when establishing a VNC connection.
Data stored on Fudo Enterprise is encrypted with AES-XTS algorithm using 256 bit encryption
keys. AES-XTS algorithm is most effective hard drive encryption solution.
Appliance
Encryption keys are stored on two USB flash drives. Flash drives delivered with Fudo Enterprise
are uninitialized. Keys initialization takes place during initial system boot-up, during which both
flash drives have to be connected (initiation procedure is described in chapter System initiation).
After encryption keys have been initiated and Fudo Enterprise has booted up, both USB flash
drives can be removed and placed somewhere safe. During daily operation, encryption key is
required only for system boot up. If safety procedures allow, one USB flash drive can stay
connected to Fudo Enterprise, which will allow Fudo Enterprise to boot up automatically in
case of a power outage or system reboot after software update.
Virtual machine distribution
Fudo Enterprise’s file system, running in virtual environment is encrypted using an encryption
phrase, which is set up during system initiation and has to be entered each time the system
boots up.
Database
Sensitive data, such as passwords, keys, logins, etc. are encrypted in the internal database itself.
The encryption key, called Master Key, is a random 256-bit key which is used to derive further
keys used to encrypt each section of database, such as Configuration information (User data,
Accounts, Safes, etc.), Database Backup and External Storage. Furthermore, Fudo makes use of
HMACs to “seal” the encrypted data. Master Key can be exported by superadministrator but
only when prior to MK export Fudo is provided a key to encrypt the Master Key itself.
Master Key export procedure allows superadministrator to create a backup of the Master Key,
without which data in the database as well as backups and external filesystems cannot be used.
3.6.2 Backups
User sessions data can be backed up on external servers running rsync service.
3.6.3 Permissions
Each data model entity, has a list of users defined, who are allowed to manage given object,
according to assigned user role.
For more information on user roles refer to Roles topic.
3.6.4 Sandboxing
Fudo Enterprise takes advantage of CAPSICUM sandboxing mechanism, which separates each
connection on Fudo Enterprise operating system level. Precise control over assigned system
resources and limiting access to information on the operating system itself, increase security and
greatly influence system’s stability and availability.
3.6.5 Reliability
System hardware configuration is optimized to deliver high performance and high availability.
Fudo Enterprise supports cluster configuration in multimaster mode where system configuration
(connections, servers, sessions, etc.) is synchronized on each cluster node and in case a given
node crashes, remaining nodes will immediately take over user connection requests ensuring
service continuity.
Warning: Cluster configuration does not facilitate data backup. If session data is deleted
on one of the cluster nodes, it is also deleted from other nodes.
Virtual IP addresses are aggregated in redundancy groups which enable facilitating static load
balancing while preserving cluster’s high availability nature.
Related topics:
• User authorization methods and modes
• System overview
• Quick start - SSH connection configuration
• Quick start - RDP connection configuration
• System initiation
Fudo Enterprise defines five base object types: user, server, account, safe and listener.
User defines a subject entitled to connect to servers within monitored IT infrastructure. Detailed
object definition (i.e. unique login and domain combination, full name, email address etc.)
enables precise accountability of user actions when login and password are substituted with a
shared account login credentials.
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
Proper system operation requires configuration of servers, users, listeners, accounts and safes.
Warning: Data model objects: safes, users, servers, accounts and listeners are replicated
within the cluster and object instances must not be added on each node. In case the replica-
tion mechanism fails to copy objects to other nodes, contact technical support department.
Safe is the central data model object. It regulates access to monitores servers by specifying
privileged accounts on monitored servers along with the listeners which determine the actual
connection parameters (e.g. IP address, port number) depending on the given protocol. This
kind of data model allows for optimal objects’ management. A given server can be accessed
differently as defined by the listener. A safe groups accounts enabling convenient control over
access to monitored resources.
Related topics:
• System overview
• User authorization methods and modes
• Quick start
3.8 Dashboard
Fudo Enterprise dashboard page enables quick access to essential status information. It com-
prises customizable dashlets allowing you to pick and choose the data that’s the most important
to you.
Note:
• Select Keep me logged in if you do not want Fudo to log you out automatically as long as
you are on the dashboard screen.
• Click Full screen to togge full-screen view.
3.8. Dashboard 30
Fudo Enterprise 5.4 - System Documentation
3.8.1 Widgets
3.8. Dashboard 31
Fudo Enterprise 5.4 - System Documentation
To view hard drive status information enable the Node dashlet and click the disks status icon.
3.8. Dashboard 32
Fudo Enterprise 5.4 - System Documentation
Related topics:
• Initial boot up
• Quick start - SSH connection configuration
• Quick start - RDP connection configuration
Access Gateway enables browsing available resources and initiating connections with monitored
servers using selected listener.
Related topics:
• Requirements
• Data model
• Security measures
This section contains third-party license information for certain third-party products included
with Fudo Enterprise.
All the relevant licenses for third-party tools we depend on to deliver our product are available
here. Please click on the link to view copies of the licenses text.
If the indicated location does not contain a license for specific product, it means that it was not
provided by the developer.
System deployment
This topic describes Fudo Enterprise appliance and the system initiation procedure.
4.1 Requirements
Administration panel
System is managed in administration panel available through web browser. Recommended
browsers are Google Chrome, Mozilla Firefox and Microsoft Edge (Chromium based).
Network requirements
Correct operation requires:
• ability to establish connections to Fudo Enterprise on port 443, for administration pur-
poses,
• ability for users to connect to Fudo Enterprise and for Fudo Enterprise to connect to target
systems.
Hardware requirements
Fudo Enterprise is a complete solution combining both hardware and software. Installing system
requires 2U (F100x model) or 3U (F300x model) of space in 19” rack cabinet and connection to
network infrastructure.
Virtual appliance requirements
34
Fudo Enterprise 5.4 - System Documentation
Note: Storage size should be determined individually as it directly depends on the number of
sessions monitored and recorded by Fudo Enterprise.
Fudo Enterprise is delivered in a 2U (F100x), 3U (F300x) or 4U (F500x) 19” rack server case.
Fudo Enterprise F1002
• Chassis: 19” 2U
• Dimensions: 89 mm (height), 437 mm (width), 647 mm (depth)
• PSU: 2x 920 W
• System memory: 32 GB
• Internal storage: 12x 2 TB, 2x 480 GB SSD
• Network interfaces:
– 4 x RJ45 Gigabit Ethernet LAN ports
– 1 x RJ45 Dedicated IPMI LAN port
The situation might be different, depending on the use of the expansion cards.
Related topics:
• Initial boot up
• Quick start - SSH connection configuration
• Quick start - RDP connection configuration
Appliance
Fudo Enterprise is delivered with two uninitiated USB flash drives. During initial boot up,
Fudo Enterprise generates encryption keys, which are stored on enclosed USB flash drives. More
information on encryption keys can be found in the Security measures chapter.
1. Install device in 19” rack cabinet.
2. Connect both power supply units to 230V/110V power outlets.
Note: Initial boot up requires conecting both USB flash drives. More information on encryption
keys can be found in Security measures chapter.
Warning:
• One of the USB flash drives containing encryption key must be disconnected and placed
in a secure location, accessible only to authorized personnel.
• If the USB flash drives with encryption keys are lost, device will not be able to boot up
and stored sessions will not be accessible. Manufacturer does not store any encryption
keys.
Note:
• In daily operation, one encryption key is required to start the system after which it can
be disconnected.
6. Enter the name of the new management interface (Fudo Enterprise web interface is acces-
sible through the management interface).
7. Enter IP address along with the network subnet mask separated with / (e.g. 10.0.0.8/24)
and press Enter.
Local Fudo Enterprise deployment is based on uploading the OVA / OVF file into virtualization
tool and running the Fudo Enterprise instance on browser. Please follow below chapters to
deploy Fudo Enterprise using the VMware or Proxmox virtualization tools. In order to proceed
the deployment, the OVA or OVF file is needed.
VMware Installation with OVA file
1. Click the Create / Register VM button.
2. In the modal window, select the Deploy a virtual machine from an OVF or OVA file option.
3. Select the downloaded OVA file and upload it, or just drag and drop it into the upload
area.
7. Click Finish and wait for the configuration file to be fully uploaded.
8. Initialize the machine by selecting its record.
9. Click the Console button and select the Launch remote console option. Select your appli-
cation and verify certificate.
10. In the console, provide a passphrase.
Note: The password is optional and can be left empty. However, if the password is provided,
the Fudo system encrypts it and asks for it every time the VM is rebooted.
11. Select the region and city by providing respective codes and confirming your choice.
12. Enter date and time in DD.MM.YYYY HH:MM format.
Note: Your Fudo Enterprise instance has been successfully initiated! Now you can enter the
registered IP address in your browser and start with your first configuration.
9. Select the region and city by providing respective codes and confirming your choice.
10. Enter date and time in DD.MM.YYYY HH:MM format.
11. Set the network configuration:
a. Sign in as an administrator:
login: admin
password: proxycrypto
b. From the list of the Fudo configuration utility, select the option 3 - Reset network
settings.
c. Select new management interface and enter the IP address with a mask.
d. Enter a new default gateway IP address.
12. Enter the registered IP address in your browser bar and sign in as an administrator.
13. In the Network configuration settings input a name for the Access Gateway address. Click
Save.
14. Add a new DNS server address in the Name & DNS sub-tab. Click Save.
15. In the System settings, add a new NTP server address. Click Save.
16. From the contextual menu in the upper right corner, select the Restart option.
17. Wait for the system to be restarted and sign in back again.
Related topics:
• Requirements
• Quick start - SSH connection configuration
• Quick start - RDP connection configuration
• System overview
• Security measures
Quick start
5.1 SSH
This chapter contains an example of a basic Fudo Enterprise configuration, to monitor SSH
access to a remote server. In this scenario, the user connects to the remote server over the SSH
protocol and logs in to the Fudo Enterprise using an individual login and password combination
(john_smith/john). When establishing the connection with the remote server, Fudo Enter-
prise substitutes the login and the password with the previously defined values: root/password
(authentication modes are described in the User authentication modes section).
50
Fudo Enterprise 5.4 - System Documentation
5.1.1 Prerequisites
Description below assumes that the system has been already initiated. The initiation procedure
is described in the System initiation topic.
5.1.2 Configuration
Adding a server
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
1. Select Management > Servers.
2. Click + Add server.
3. Provide essential configuration parameters:
Parameter Value
General
Name ssh_server
Description
Blocked
Protocol SSH
Legacy ciphers
Bind address Any
Permissions
Granted users
Destination
Address 10.0.150.151
Mask 32
Port 22
Server verification None
5.1. SSH 51
Fudo Enterprise 5.4 - System Documentation
2. Click + Add.
3. Provide essential user information:
Parameter Value
General
Name john_smith
Role user
Blocked
Account validity Indefinite
Settings Tab
Safes
Authentication section
Authentication failures
Enforce password complex-
ity
Add authentication Static password
method:
Password john
Permissions Tab
Granted users
4. Click Save.
Adding a listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
1. Select Management > Listeners.
2. Click + Add.
3. Provide essential configuration parameters:
5.1. SSH 52
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name ssh_listener
Blocked
Protocol SSH
Legacy ciphers
Case insensitivity
Permissions
Granted users
Connection
Mode proxy
Local address 10.0.150.152
Port 1022
External address
External port
Note: For security reasons the form displays server’s public key derived from the generated or
uploaded private key.
5. Click Save.
Adding an account
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
1. Select Management > Accounts.
2. Click + Add.
3. Provide essential configuration parameters:
5.1. SSH 53
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name SSH-account
Blocked
Type regular
Session recording all
Notes
Data retention
Override global retention
settings
Delete session data after 61 days
Permissions
Granted users
Server
Server ssh_server
Credentials
Domain
Login root
Replace secret with with password
Password password
Repeat password password
Password change policy Static, without restrictions
Note: For security reasons the form displays server’s public key derived from the generated or
uploaded private key.
5. Click Save.
Defining a safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
1. Select Management > Safes.
2. Click + Add.
3. Provide essential configuration parameters:
5.1. SSH 54
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name ssh_safe
Notifications
Login reason
Require approval
Policies
Note access No access
Protocol functionality
RDP
SSH
VNC
At this point john_smith can connect to the target host over the SSH protocol.
Example:
5.1. SSH 55
Fudo Enterprise 5.4 - System Documentation
Note: Note that the fingerprint displayed when connecting to the target host for the first time
is the same as was generated during server configuration.
After accepting the connection, user will be asked for the password. After successful authenti-
cation Fudo Enterprise starts recording user’s activities.
Related topics:
• PuTTY
• Requirements
5.1. SSH 56
Fudo Enterprise 5.4 - System Documentation
• Data model
• Quick start - RDP connection configuration
• Quick start - HTTP connection configuration
• Quick start - MySQL connection configuration
• Quick start - Telnet connection configuration
This chapter contains an example of a basic Fudo Enterprise configuration, to monitor SSH
access in bastion mode. In this scenario, the user connects to the remote server over the SSH
protocol and logs in to the Fudo Enterprise using an individual login and password combination
(john_smith/john). The user specifies user name along with account login on the target server
and target server address in the login string (john_smith#root#192.168.0.110) and connects to
it over default SSH port number. Upon establishing connection, login credentials are substituted
with the previously defined values: root/password (authentication modes are described in the
User authentication modes section).
5.2.1 Prerequisites
Description below assumes that the system has been already initiated. The initiation procedure
is described in the System initiation topic.
5.2.2 Configuration
Adding a server
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
1. Select Management > Servers.
2. Click + Add server.
3. Provide essential configuration parameters:
Parameter Value
General
Name ssh_server
Description
Blocked
Protocol SSH
Legacy ciphers
Bind address Any
Permissions
Granted users
Destination
Address 192.168.0.100
Mask 32
Port 22
Server verification None
4. In the Server verification section select Server public key and provide respective public
key data or click Get public key.
5. Click Save or Save and close.
Adding a user
User defines a subject entitled to connect to servers within monitored IT infrastructure. Detailed
object definition (i.e. unique login and domain combination, full name, email address etc.)
enables precise accountability of user actions when login and password are substituted with a
shared account login credentials.
1. Select Management > Users.
2. Click + Add.
3. Provide essential user information:
Parameter Value
General
Name john_smith
Role user
Blocked
Account validity Indefinite
Settings Tab
Safes
Authentication section
Authentication failures
Enforce password complex-
ity
Add authentication Static password
method:
Password john
Permissions Tab
Granted users
4. Click Save.
Adding a listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
1. Select Management > Listeners.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name ssh_listener
Blocked
Protocol SSH
Legacy ciphers
Case insensitivity
Permissions
Granted users
Connection
Mode bastion
Local address 10.0.150.151
Port 22
External address
External port
Note: For security reasons the form displays server’s public key derived from the generated or
uploaded private key.
5. Click Save.
Adding an account
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
1. Select Management > Accounts.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name admin_ssh_server
Blocked
Account type regular
Session recording all
Notes
Data retention
Override global retention
settings
Delete session data after 61 days
Permissions
Granted users
Server
Server ssh_server
Credentials
Domain
Login root
Replace secret with with password
Password password
Repeat password password
Password change policy Static, without restrictions
Note: For security reasons the form displays server’s public key derived from the generated or
uploaded private key.
5. Click Save.
Defining a safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
1. Select Management > Safes.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name ssh_safe
Notifications
Login reason
Require approval
Policies
Note access No access
Protocol functionality
RDP
SSH
VNC
4. Click Open.
5. Enter user name along with account login on the target server and target server address.
6. Enter password.
Example:
1. Open a web browser and enter the Fudo Enterprise administrator panel IP address.
2. Enter the login and password to login to the Fudo Enterprise administration panel.
3. Select Management > Sessions.
4. Find John Smith’s session and click the playback icon.
Related topics:
• Requirements
• Data model
• Quick start - RDP connection configuration
• Quick start - HTTP connection configuration
• Quick start - MySQL connection configuration
• Quick start - Telnet connection configuration
5.3 RDP
This chapter contains an example of a basic Fudo Enterprise configuration, to monitor RDP
access to a remote server. In this scenario, the user connects to the remote server over the RDP
protocol and logs in to the Fudo Enterprise using an individual login and password combination
(john_smith/john). When establishing the connection with the remote server, Fudo Enterprise
substitutes the login with specified in Account and the password with the password managed
by a password changer (authentication modes are described in the User authentication modes
section).
5.3. RDP 64
Fudo Enterprise 5.4 - System Documentation
5.3.1 Prerequisites
Description below assumes that the system has been already initiated. The initiation procedure
is described in the System initiation topic.
5.3.2 Configuration
Adding a server
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
1. Select Management > Servers.
2. Click + Add server.
3. Provide essential configuration parameters:
Parameter Value
Name rdp_server
Description
Blocked
Protocol RDP
TLS enabled
NLA enabled
Legacy ciphers
Inform about existing con-
nection
Bind address 10.0.150.151
Permissions
Granted users
Destination
Address 10.0.35.54
Mask 32
Port 3389
Server verification None
5.3. RDP 65
Fudo Enterprise 5.4 - System Documentation
enables precise accountability of user actions when login and password are substituted with a
shared account login credentials.
1. Select Management > Users.
2. Click + Add.
3. Provide essential user information:
Parameter Value
General
Name john_smith
Role user
Blocked
Account validity Indefinite
Settings Tab
Safes
Authentication section
Authentication failures
Enforce password complex-
ity
Add authentication Static password
method:
Password john
Permissions Tab
Granted users
4. Click Save.
Adding a listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
1. Select Management > Listeners.
2. Click + Add.
5.3. RDP 66
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name rdp_listener
Blocked
Protocol RDP
Security Standard RDP Security
Announcement
Permissions
Granted users
Connection
Mode proxy
Local address 10.0.150.151
Port 3389
External address
External port
Note: For security reasons the form displays server’s public key derived from the generated or
uploaded private key.
5. Click Save.
Adding an account
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
1. Select Management > Accounts.
2. Click + Add.
3. Provide essential configuration parameters:
5.3. RDP 67
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name admin_rdp_server
Blocked
Type regular
Session recording all
OCR sessions
OCR Language English
Notes
Data retention
Override global retention
settings
Delete session data after 61 days
Permissions
Granted users
Server
Server rdp_server
Credentials
Domain
Login administrator
Replace secret with with password
Password password
Repeat password password
Password change policy Static, without restrictions
4. Click Save.
Defining a safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
1. Select Management > Safes.
2. Click + Add.
3. Provide essential configuration parameters:
5.3. RDP 68
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name rdp_safe
Blocked
Notifications
Login reason
Requires approval
Policies
Note access No access
Users john_smith
Protocol functionality
RDP
SSH
VNC
5.3. RDP 69
Fudo Enterprise 5.4 - System Documentation
3. Enter user login and password and press the [Enter] keyboard key.
5.3. RDP 70
Fudo Enterprise 5.4 - System Documentation
Note: Fudo Enterprise enables using custom login, no access and session termination screens
for RDP and VNC connections. For more information on user defined images for graphical
remote sessions, refer to the Resources topic.
Related topics:
• Microsoft Remote Desktop
• Requirements
• Data model
5.3. RDP 71
Fudo Enterprise 5.4 - System Documentation
This chapter contains an example of a basic Fudo Enterprise configuration, to monitor RDP
access to a remote server. In this scenario, the user connects to the remote server in bastion
mode by specifying the user name along with account login on the target server and target server
address in the login string. Bastion mode enables facilitating privileged accounts monitoring
while preserving default protocols port numbers.
5.4.1 Prerequisites
Description below assumes that the system has been already initiated. The initiation procedure
is described in the System initiation topic.
5.4.2 Configuration
Adding a server
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
1. Select Management > Servers.
2. Click + Add server.
3. Provide essential configuration parameters:
Parameter Value
Name rdp_server
Description
Blocked
Protocol RDP
TLS enabled
NLA enabled
Legacy ciphers
Inform about existing con-
nection
Bind address 10.0.150.151
Permissions
Granted users
Destination
Address 10.0.35.54
Mask 32
Port 3389
Server verification None
Parameter Value
General
Name john_smith
Role user
Blocked
Account validity Indefinite
Settings Tab
Safes
Authentication section
Authentication failures
Enforce password complex-
ity
Add authentication Static password
method:
Password john
Permissions Tab
Granted users
4. Click Save.
Adding a listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
1. Select Management > Listeners.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name rdp_listener_bastion
Blocked
Protocol RDP
Security Standard RDP Security
Announcement
Permissions
Granted users
Connection
Mode bastion
Local address 10.0.150.151
Port 3389
External address
External port
Note: For security reasons the form displays server’s public key derived from the generated or
uploaded private key.
5. Click Save.
Adding an account
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
1. Select Management > Accounts.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name admin_rdp_server
Blocked
Type regular
Session recording all
OCR sessions
OCR Language English
Notes
Data retention
Override global retention
settings
Delete session data after 61 days
Permissions
Granted users
Server
Server rdp_server
Credentials
Domain
Login admin
Replace secret with with password
Password password
Repeat password password
Password change policy Static, without restrictions
4. Click Save.
Defining a safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
1. Select Management > Safes.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name rdp_safe
Blocked
Notifications
Login reason
Require approval
Policies
Note access No access
Protocol functionality
RDP
SSH
VNC
Note:
• In case you do not specify login credentials, Fudo will display the internal login screen to
enter the account name along with the username and password.
• In case the specified account is not found, Fudo Enterprise will try to match the name
with a server object. If a matching server is not found, system tries to match the string
to a host’s DNS name.
• Fudo Enterprise enables using a custom logo on the login screen for RDP and VNC con-
nections. For more information refer to the Resources topic.
1. Open a web browser and enter the Fudo Enterprise administrator panel IP address.
Note: Make sure that the entered IP address has the control panel sharing option enabled in
the Network configuration settings.
2. Enter the login and password to login to the Fudo Enterprise administration panel.
3. Select Management > Sessions.
4. Find John Smith’s session and click the playback icon.
Related topics:
• Microsoft Remote Desktop
• Requirements
• Data model
• Quick start - RDP connection configuration
• Quick start - HTTP connection configuration
• Quick start - MySQL connection configuration
• Quick start - Telnet connection configuration
5.5 Telnet
This chapter contains an example of a basic Fudo Enterprise configuration, to monitor Telnet
connections to a remote server. In this scenario, the user connects to the remote server using
Telnet client and logs in using individual login and password. Fudo Enterprise authenticates
the user against the information stored in the local database, establishes connection with the
remote server and starts recording.
Note: Telnet connections do not support login credentials forwarding and login credentials
substitution. When connecting to target host over telnet protocol, users are asked to provide
their login credentials twice. First time to authenticate against Fudo Enterprise and then again,
to connect to the target host.
5.5. Telnet 80
Fudo Enterprise 5.4 - System Documentation
5.5.1 Prerequisites
Description below assumes that the system has been already initiated. For more information on
the initiation procedure refer to the System initiation topic.
5.5.2 Configuration
Adding a server
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
1. Select Management > Servers.
2. Click + Add server.
3. Provide essential configuration parameters:
Parameter Value
General
Name telnet_server
Description
Blocked
Protocol Telnet 5250
TLS enabled
Bind address Any
Permissions
Granted users
Destination
Address 10.0.35.137
Mask 32
Port 23
5.5. Telnet 81
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name john_smith
Role user
Blocked
Account validity Indefinite
Settings Tab
Safes
Authentication section
Authentication failures
Enforce password complex-
ity
Add authentication Static password
method:
Password john
Permissions Tab
Granted users
4. Click Save.
Adding a listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
1. Select Management > Listeners.
2. Click + Add.
3. Provide essential configuration parameters:
5.5. Telnet 82
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name telnet_listener
Blocked
Protocol Telnet
Permissions
Granted users
Connection
Mode proxy
Local address 10.0.150.151
Port 23
Use TLS
4. Click Save.
Adding an account
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
1. Select Management > Accounts.
2. Click + Add.
3. Provide essential configuration parameters:
5.5. Telnet 83
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name admin_telnet_server
Blocked
Type forward
Session recording all
Notes
Data retention
Override global retention
settings
Delete session data after 61 days
Permissions
Granted users
Server
Server telnet_server
Credentials
Replace secret with with password
Password
Repeat password
Forward domain
4. Click Save.
Defining a safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
1. Select Management > Safes.
2. Click + Add.
3. Provide essential configuration parameters:
5.5. Telnet 84
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name telnet_safe
Blocked
Notifications
Login reason
Require approval
Policies
Note access
Protocol functionality
RDP
SSH
VNC
Permissions
Granted users
5.5. Telnet 85
Fudo Enterprise 5.4 - System Documentation
FUDO Authentication.
FUDO Login: john_smith
FUDO Password:
Related topics:
• Quick start - SSH connection configuration
• Quick start - HTTP connection configuration
• Quick start - MySQL connection configuration
• Quick start - RDP connection configuration
• Requirements
5.5. Telnet 86
Fudo Enterprise 5.4 - System Documentation
• Data model
• Resources
This chapter contains an example of a basic Fudo Enterprise configuration, to monitor Telnet
5250 connections to a remote server. In this scenario, the user connects to the remote server using
Telnet client and logs in using individual login and password. Fudo Enterprise authenticates
the user against the information stored in the local database, establishes connection with the
remote server and starts recording.
Note: Telnet connections do not support login credentials forwarding and login credentials
substitution. When connecting to target host over telnet protocol, users are asked to provide
their login credentials twice. First time to authenticate against Fudo Enterprise and then again,
to connect to the target host.
5.6.1 Prerequisites
Description below assumes that the system has been already initiated. For more information on
the initiation procedure refer to the System initiation topic.
5.6.2 Configuration
Adding a server
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
1. Select Management > Servers.
2. Click + Add and select Static server.
3. Provide essential configuration parameters:
Parameter Value
General
Name telnet_server
Description
Blocked
Protocol Telnet 5250
TLS enabled
Bind address Any
Permissions
Granted users
Destination
Address 10.0.35.137
Mask 32
Port 23
Parameter Value
General
Name john_smith
Role user
Blocked
Account validity Indefinite
Settings Tab
Safes
Authentication section
Authentication failures
Enforce password complex-
ity
Add authentication Static password
method:
Password john
Permissions Tab
Granted users
4. Click Save.
Adding a listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
1. Select Management > Listeners.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name telnet_listener
Blocked
Protocol Telnet 5250
Permissions
Granted users
Connection
Mode proxy
Local address 10.0.150.151
Port 23
Use TLS
Legacy ciphers
Server certificate
4. Click Save.
Adding an account
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
1. Select Management > Accounts.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name admin_telnet_server
Blocked
Type forward
Session recording all
Notes
Data retention
Override global retention
settings
Delete session data after 61 days
Permissions
Granted users
Server
Server telnet_server
Credentials
Replace secret with with password
Password
Repeat password
Forward domain
4. Click Save.
Defining a safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
1. Select Management > Safes.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name telnet_safe
Blocked
Notifications
Login reason
Require approval
Policies
Note access
Protocol functionality
RDP
SSH
VNC
Permissions
Granted users
Related topics:
• Quick start - SSH connection configuration
5.7 MySQL
This chapter contains an example of a basic Fudo Enterprise configuration, to monitor SQL
queries to a remote MySQL database server.
In this scenario, the user connects to a MySQL database using individual login and password.
When establishing the connection with the remote server, Fudo Enterprise substitutes the login
and the password with the previously defined values: root/password (authorization modes are
described in the User authorization modes section).
Warning: Note that the MySQL server caching_sha2_password plugin isn’t sup-
ported by Fudo Enterprise. Supportable MySQL plugins by Fudo Enterprise are
mysql_native_password and mysql_old_password. Server plugin should be set to
mysql_native_password in /etc/mysql/mysql.conf.d/mysqld.cnf and a User object is
created with mysql_native_password plugin.
5.7.1 Prerequisites
The following description assumes that the system has been already initiated. For more infor-
mation on the initiation procedure refer to the System initiation topic.
5.7. MySQL 95
Fudo Enterprise 5.4 - System Documentation
5.7.2 Configuration
Adding a server
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
1. Select Management > Servers.
2. Click + Add server.
3. Provide essential configuration parameters:
Parameter Value
General
Name mysql_server
Description
Blocked
Protocol MySQL
Bind address Any
Permissions
Granted users
Destination
Address 10.0.1.35
Mask 32
Port 3306
5.7. MySQL 96
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name john_smith
Role user
Blocked
Account validity Indefinite
Settings Tab
Safes
Authentication section
Authentication failures
Enforce password complex-
ity
Add authentication Static password
method:
Password john
Permissions Tab
Granted users
4. Click Save.
Adding a listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
1. Select Management > Listeners.
2. Click + Add.
3. Provide essential configuration parameters:
5.7. MySQL 97
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name mysql_listener
Blocked
Protocol Mysql
Permissions
Granted users
Connection
Mode proxy
Local address 10.0.150.151
Port 3306
4. Click Save.
Adding an account
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
1. Select Management > Accounts.
2. Click + Add.
3. Provide essential configuration parameters:
5.7. MySQL 98
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name admin_mysql_server
Blocked
Type regular
Session recording all
Notes
Data retention
Override global retention
settings
Delete session data after 61 days
Permissions
Granted users
Server
Server mysql_server
Credentials
Domain
Login root
Replace secret with with password
Password password
Repeat password password
Password change policy Static, without restrictions
4. Click Save.
Defining a safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
1. Select Management > Safes.
2. Click + Add.
3. Provide essential configuration parameters:
5.7. MySQL 99
Fudo Enterprise 5.4 - System Documentation
Parameter Value
General
Name mysql_safe
Blocked
Notifications
Login reason
Require approval
Policies
Note access No access
Protocol functionality
RDP
SSH
VNC
Related topics:
• Quick start - SSH connection configuration
• Quick start - RDP connection configuration
• Quick start - HTTP connection configuration
• Quick start - Telnet connection configuration
• Requirements
• Data model
5.8 MS SQL
This chapter contains an example of a basic Fudo Enterprise configuration, to monitor MS SQL
connections to a remote MS SQL database server.
In this scenario, the user connects to a MS SQL database using individual login and password
using SQL Server Management Studio. When establishing the connection with the remote
server, Fudo Enterprise substitutes the login and the password with the previously defined
values: fudo/password (authorization modes are described in the User authorization modes
section).
5.8.1 Prerequisites
The following description assumes that the system has been already initiated. For more infor-
mation on the initiation procedure refer to the System initiation topic.
Note: Make sure that the SQL Server has the SQL Server and Windows Authentication mode
enabled.
5.8.2 Configuration
Adding a server
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
1. Select Management > Servers.
2. Click + Add server.
3. Provide essential configuration parameters:
Parameter Value
General
Name mssql_server
Description
Blocked
Protocol MS SQL (TDS)
Bind address Any
Permissions
Granted users
Destination
Address 10.0.150.154
Mask 32
Port 1433
Parameter Value
General
Name john_smith
Role user
Blocked
Account validity Indefinite
Settings Tab
Safes
Authentication section
Authentication failures
Enforce password complex-
ity
Add authentication Static password
method:
Password john
Permissions Tab
Granted users
4. Click Save.
Adding a listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
1. Select Management > Listeners.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name MSSQL_proxy
Blocked
Protocol MS SQL (TDS)
Permissions
Granted users
Connection
Mode proxy
Local address 10.0.150.150
Port 1433
4. Click Save.
Adding an account
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
1. Select Management > Accounts.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name admin_mssql_server
Blocked
Type regular
Session recording all
Notes
Data retention
Override global retention
settings
Delete session data after 61 days
Permissions
Granted users
Server
Server mssql_server
Credentials
Domain
Login fudo
Replace secret with with password
Password password
Repeat password password
Password change policy Static, without restrictions
4. Click Save.
Defining a safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
1. Select Management > Safes.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name mssql_safe
Blocked
Notifications
Login reason
Require approval
Policies
Note access No access
Protocol functionality
RDP
SSH
VNC
Note: Due to the fact that MS SQL Studio may create multiple connections for sending
internal queries, the sessions, connected via the TDS layer protocol using MS SQL Studio are
Related topics:
• SQL Server Management Studio
• Quick start - MySQL connection configuration
• Requirements
• Data model
5.9 HTTP
This chapter contains an example of a basic Fudo Enterprise configuration, to monitor access to
Twitter over HTTPS. In this scenario, the user uses its individual login credentials to log in to
a monitored Twitter account. The connection will timeout after 15 minutes (900 seconds) and
the user will have to login again to continue browsing the server’s contents.
Warning: HTTP rendering is a CPU intensive process and may have negative impact on
system’s performance. A physical appliance is recommended for monitoring rendered HTTP
connections with the following limitations regarding the maximum number of concurrent
rendered HTTP sessions.
5.9.1 Prerequisites
The following description assumes that the system has been already initiated. For more infor-
mation on the initiation procedure refer to the System initiation topic.
5.9.2 Configuration
Adding a server
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
1. Select Management > Servers.
2. Click + Add server.
3. Provide essential configuration parameters:
Parameter Value
General
Name twitter
Description
Blocked
Protocol HTTP
TLS enabled
Legacy ciphers
HTTP host
HTTP timeout 900
HTTP Authentication Twitter
Bind address 10.0.236.70
Permissions
Granted users
Destination
Address twitter.com
Port 443
Server verification None
Parameter Value
General
Name john_smith
Role user
Blocked
Account validity Indefinite
Settings Tab
Safes
Authentication section
Authentication failures
Enforce password complex-
ity
Add authentication Static password
method:
Password john
Permissions Tab
Granted users
4. Click Save.
Adding a listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
1. Select Management > Listeners.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name twitter_listener
Blocked
Protocol HTTP
Render sessions
Permissions
Granted users
Connection
Mode proxy
Local address 10.0.150.151
Port 997
Use TLS
Legacy ciphers
4. Click Save.
Adding an account
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
1. Select Management > Accounts.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name twitter_admin
Blocked
Type regular
Session recording all
Notes
Data retention
Override global retention
settings
Delete session data default settings
Permissions
Granted users
Server
Server twitter
Credentials
Domain
Login YourTwitterAccountUsername
Replace secret with with password
Password ******
Repeat password ******
Password change policy Static, without restrictions
4. Click Save.
Defining a safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
1. Select Management > Safes.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name twitter_safe
Blocked
Notifications
Login reason
Require approval
Policies
Note access No access
Users john_smith
Protocol functionality
RDP
SSH
VNC
Note: In case you are authenticating using two factors, input your static password along with
the dynamic factor (token value) in the password field as a single string of characters.
Related topics:
• Requirements
• HTTP protocol
• Data model
• Quick start - SSH connection configuration
• Quick start - RDP connection configuration
• Quick start - MySQL connection configuration
• Quick start - Telnet connection configuration
5.10 VNC
This chapter contains an example of a basic Fudo Enterprise configuration, to monitor VNC
access to a remote server. In this scenario, the user connects to the remote server over the VNC
protocol and logs in to the Fudo Enterprise using an individual login and password combination
(john_smith/john). When establishing the connection with the remote server, Fudo Enterprise
substitutes the password with the previously defined value: password (authentication modes are
described in the User authentication modes section).
Note: Due to specifics of VNC protocol, which authenticates the user using password only,
the substitution login string entered in account properties is ignored when establishing a VNC
connection.
5.10.1 Prerequisites
Description below assumes that the system has been already initiated. The initiation procedure
is described in the System initiation topic.
5.10.2 Configuration
Adding a server
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
1. Select Management > Servers.
2. Click + Add server.
3. Provide essential configuration parameters:
Parameter Value
General
Name vnc_server
Description
Blocked
Protocol VNC
Bind address Any
Permissions
Granted users
Destination
Address 10.0.40.230
Mask 32
Port 5900
Parameter Value
General
Name john_smith
Role user
Blocked
Account validity Indefinite
Settings Tab
Safes
Authentication section
Authentication failures
Enforce password complex-
ity
Add authentication Static password
method:
Password john
Permissions Tab
Granted users
4. Click Save.
Adding a listener
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
1. Select Management > Listeners.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name vnc_listener
Blocked
Protocol VNC
Announcement
Permissions
Granted users
Connection
Mode proxy
Local address 10.0.150.151
Port 5900
External address
External port
4. Click Save.
Adding an account
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
1. Select Management > Accounts.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name admin_vnc_server
Account type regular
Session recording all
OCR sessions
OCR language English
Notes
Data retention
Override global retention
settings
Delete session data after 61 days
Permissions
Granted users
Server
Server vnc_server
Credentials
Domain
Login
Replace secret with password
Password root
Repeat password root
Password change policy Static, without restrictions
4. Click Save.
Defining a safe
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
1. Select Management > Safes.
2. Click + Add.
3. Provide essential configuration parameters:
Parameter Value
General
Name vnc_safe
Blocked
Notifications
Login reason
Require approval
Policies
Note access
Protocol functionality
RDP
SSH
VNC
1. Launch TightVNC Viewer, enter 10.0.150.151 in the server address field and press the
enter key.
This chapter contains an example of configuring user authentication against external LDAP
service.
5.11.1 Prerequisites
The following description assumes that the admin user’s authentication data is stored on LDAP
server accessible through 10.0.0.2 IP address and default LDAP service port number - 389.
User definition is stored under cn=admin,dc=example,dc=com.
5.11.2 Configuration
Parameter Value
Type LDAP
Host 10.0.0.2
Port 389
Bind to 10.0.0.10
Bind DN dc=example,dc=com
Encrypted connection
Delete
4. Click Save.
Adding user authentication method
1. Select Management > Users.
2. Find and click the admin user definition.
3. On the User Data Tab, in the LDAP base field specify the location of admin object in the
directory structure cn=admin,dc=example,dc=com.
Note: Leave the LDAP base field empty if you specified where users are stored in the LDAP
server configuration (cn=##username##,dc=example,dc=com).
4. Select External authentication type of authentication method from the Add authentication
method drop-down list.
5. Choose method “LDAP 10.0.0.2:389 bind dn:dc=example,dc=com” and click Save.
6. Click Save to save user definition.
Related topics:
• Authentication
• Creating a user
• Quick start - SSH connections monitoring
Users
User defines a subject entitled to connect to servers within monitored IT infrastructure. Detailed
object definition (i.e. unique login and domain combination, full name, email address etc.)
enables precise accountability of user actions when login and password are substituted with a
shared account login credentials.
Note: Fudo Enterprise allows importing user definitions from services such as Active Directory
or other LDAP-compliant services. For more information on users synchronization service, refer
to the Users synchronization topic.
127
Fudo Enterprise 5.4 - System Documentation
Warning: Data model objects: safes, users, servers, accounts and listeners are replicated
within the cluster and object instances must not be added on each node. In case the replica-
tion mechanism fails to copy objects to other nodes, contact technical support department.
Warning: When creating a User object for MySQL connections, please note that Fudo
Enterprise does not support the MySQL server caching_sha2_password plugin. The sup-
ported MySQL plugins are mysql_native_password and mysql_old_password. To ensure
compatibility, server plugin should be set to mysql_native_password in /etc/mysql/mysql.
conf.d/mysqld.cnf file, and a User object should be created with mysql_native_password
plugin.
Note:
• While there can be more than one user with the same Name, the Name and domain
combination must be unique.
• The Name field is not case sensitive.
Warning: It’s not allowed to include % and # characters within the usernames.
4. From the Role drop-down list select user’s role, which will determine the access rights.
service
• Accessing SNMP information.
operator
• Logging in to the administration panel.
• Browsing objects: servers, users, safes, accounts, to which the user
has been assigned sufficient access permisions.
• Blocking/unblocking objects: servers, users, safes, listeners, accounts,
to which the user has been assigned sufficient access permisions.
• Generating reports on demand and subscribing to periodic reports.
• Managing email notifications.
• Viewing live and archived sessions involving objects (user, safe, ac-
count, server), to which the user has been assigned sufficient access
permissions.
• Converting sessions and downloading converted content involving ob-
jects (user, safe, account, server), to which the user has been assigned
sufficient access permissions.
• Available dashboard widgets: concurrent sessions, suspicious sessions,
account alerts, active users, cluster status, concurrent sessions chart.
5. Select the Blocked option to prevent user from accessing servers and resources monitored
by Fudo Enterprise.
6. Define account’s validity period.
7. In the Settings tab, in the Safes field, select desired safes to grant access to.
8. In the User Data tab, in the Domain field, enter Fudo domain.
Note:
• Fudo domain is used to authenticate the user against the Fudo Enterprise.
• With the Fudo domain specified, user will have to include it when logging into the admin-
istration panel and Access Gateway or when establishing monitored connections.
• Additionally to the Fudo domain it is possible to set up the Default domain in the System
tab. If Default domain is specified, user can either include the Fudo domain in Username
or skip it during login. Please refer to the Default domain section to learn more about the
behavior of this option.
Note: While the Fudo domain is used to authenticate the user against the Fudo Enterprise,
the AD domain is taken into account when authenticating the user in front of the server with
which they establish a session. This option is related to the Fudo Domain settings in the user
specification.
Note:
• LDAP base is necessary for authenticating the user using the Active Directory service.
• E.g. for example.com domain, the LDAP base parameter value should be dc=example,
dc=com.
Note: Granting a user access to certain session requires assigning management priviliges to:
server, account, user and safe objects that were used in the given connection.
13. If created user is going to use the Application to Application Password Manager function-
ality, go to the More tab, and in the AAPM field, add IP address used by the User Portal
(Access Gateway) and the AAPM to communicate with Fudo Enterprise.
14. Optionally, to configure the Fudo Officer app, go to Fudo Officer field and click Add device
button. Download Fudo Officer application in App Store and scan showed QR code to
finish mobile device binding. For more information please refer to the Fudo Officer 1.0
section.
Note: To add mobile device Call Home feature has to be enabled. Please navigate to Settings
> System, and enable it on the General tab, under the Maintenance and supervision section.
15. In the SNMP field, click Enabled option to use SNMP, and provide authentication and
encryption methods from the available drop-down lists.
Note: SNMP configuration is available only for user with the Service role.
16. Go back to the Settings tab, and in the Authentication section select the Authentication
failures option to block the user automatically after exceeding the number of failed login
attempts.
Note: The authentication failures counter is enabled only if the Authenticaiton failures option
is set in Settings > System in the User authentication and sessions section.
17. Select the Enforce password complexity option to force passwords to conform to specified
settings.
Note: Password complexity is defined in Settings > System in the Users authentication and
sessions section.
Note: To enable configuring authentication methods, please save created user first.
19. To add authentication method, select desired type from the Add authentication method
drop-down list. Below you will find description of available authentication methods spec-
ification procedures.
Certificate
• Provide Subject that complies with the RFC 2253 or RFC 4514 requirements.
Note: Additionally, the CA certificate is required to be uploaded in the Settings > System
tab. For more information about authentication with certificate, refer to the Certificate-based
authentication scheme topic.
Static password
• Type password in the Password field.
• Select Required password change on next login to have the user change the password on
next login attempt.
Note: If you select the Required password change on next login option, the user will not be
able to access servers using native protocols clients. The user will have to change the password
using the User Portal (Access Gateway).
External authentication
• Select external authentication source from the Choose method drop-down list.
Note: Refer to Authentication topic for more information on external authentication sources.
SSH key
• Provide public SSH key used for verifying user’s identity in the Public key field.
SMS
• In the First factor field choose Static password or External authentication (AD or LDAP).
• Provide a phone number in the Phone input field.
Note: For more information about SMS authentication configuration, refer to the SMS au-
thentication definition topic.
DUO
• In the First factor field choose Static password or External authentication (AD or LDAP).
• In the Second factor field:
– Provide DUO User.
– Provide DUO User Id.
Note: For more information about DUO authentication configuration, refer to the DUO
authentication definition topic.
OATH
• In the First factor field choose Static password or External authentication (AD or LDAP).
• In the Second factor field:
Note: The API Key cannot be retrieved after saving this authentication method.
20. To define more authentication methods select new type from Add authentication method
drop-down list.
Note:
• When processing user authentication requests, Fudo Enterprise verifies login credentials
against defined authentication methods in order in which those methods have been defined.
• After adding several authentication methods you have the possibility to change their order
by using drag-and-drop functionality.
Copy grants feature allows you to copy permissions from a user with the Admin or Operator role
to the user currently being edited. The copying process involves taking the grants from selected
user and applying all the differences to user being edited.
Note: To copy grants from already created and configured user, you have to save your user
definition first.
3. From the Copy from drop-down list select the user you want to copy grants from.
4. Click Save.
Tematy pokrewne:
• Users synchronization
• Data model
• System initiation
3. Find and click desired user’s name to access its configuration parameters.
Note:
• ID is a read-only, unique object identifier and it is assigned by Fudo Enterprise when object
is created.
Note: To view the blocking reason, place the cursor over the red cross icon on the users list.
Users can also be blocked by accessing the user object configuration form. To do this:
• Edit user definition.
• Select the Blocked option.
• Provide mandatory blocking reason and klick ‘Set reason’.
Note: Deleting a user definition does not result in the removal of associated registered sessions.
Sessions of deleted users are marked with a strikethrough username.
Fudo can keep track of failed login attempts and automatically block users accounts if the counter
reaches a specified value.
1. Select Settings > System.
2. In the Authentication and sessions section, select Authentication failures option.
3. Enter the number of failed login attempts after which the user account will be blocked.
4. Click Save.
5. Select Management > Users.
6. Find and click a user that you want to block automatically after a number of failed login
attempts.
7. In the Authentication section, select Authentication failures.
8. Click Save.
Related topics:
• User authentication methods and modes
6.8 Roles
service
• Accessing SNMP information.
operator
• Logging in to the administration panel.
• Browsing objects: servers, users, safes, accounts, to which the user
has been assigned sufficient access permisions.
• Blocking/unblocking objects: servers, users, safes, listeners, accounts,
to which the user has been assigned sufficient access permisions.
• Generating reports on demand and subscribing to periodic reports.
• Managing email notifications.
• Viewing live and archived sessions involving objects (user, safe, ac-
count, server), to which the user has been assigned sufficient access
permissions.
• Converting sessions and downloading converted content involving ob-
jects (user, safe, account, server), to which the user has been assigned
sufficient access permissions.
• Available dashboard widgets: concurrent sessions, suspicious sessions,
account alerts, active users, cluster status, concurrent sessions chart.
admin
• Logging in to the administration panel.
• Managing objects: servers, users, safes, listeners, accounts, to which
the user has been assigned sufficient access permisions.
• Blocking/unblocking objects: servers, users, safes, listeners, accounts,
to which the user has been assigned sufficient access permisions.
• Generating reports on demand and subscribing to periodic reports.
• Activating/deactivating email notifications.
• Viewing live and archived sessions involving objects (user, safe, ac-
count, server), to which the user has been assigned management priv-
ileges.
• Converting sessions and downloading converted content involving ob-
jects (user, safe, account, server), to which the user has been assigned
sufficient access permissions.
• Managing policies.
• Available dashboard widgets: concurrent sessions, suspicious sessions,
account alerts, active users, cluster status, concurrent sessions chart.
Related topics:
• Users synchronization
• Data model
• System initiation
• Servers
• Accounts
User is one of the fundamental data model entity. Only defined users are allowed to connect
to monitored servers. Fudo Enterprise features automatic users synchronization service which
enables importing users information from Active Directory servers or other servers compatible
with the LDAP protocol.
New users definitions and changes in existing objects are imported from the directory service
periodically every 5 minutes. Deleting a user object from an AD or an LDAP server requires
performing the full synchronization to reflect those changes on Fudo Enterprise. The full syn-
chronization process is triggered automatically once a day at 00:00, or can be triggered manually.
Note:
• Fudo Enterprise supports nested LDAP groups.
• Also, Fudo Enterprise allows synchronizing the user’s data with the LDAP service source.
The Synchronize with LDAP option is responsible for this process. When this option
is checked for the given user, an administrator can’t edit the user’s data manually but
can add or edit their authentication methods. If the Synchronize with LDAP option is
unchecked, the user is no longer synchronized with LDAP source, and can be edited by an
administrator. The administrator can still check the option and reinstate synchronization
with LDAP, but any change made manually will disappear with the next synchronisation
attempt. Only the added authentication methods won’t change.
7. In the Directory service section, select data source type from the Server type drop-down
list.
8. Provide the user authentication information to access user data on given server.
9. Enter domain name, to which imported users are assigned to.
10. Provide base DN parameter for users’ objects (eg. DC=devel,DC=whl).
11. Provide base DN for parameter groups’ objects (eg. DC=tech,DC=whl).
12. Define filter (or leave the default value) for user records, which are subject to synchroniza-
tion.
13. Define filter (or leave the default value) for user groups, which are subject to synchroniza-
tion.
14. Click in the LDAP controllers section to define directory service server.
15. Provide IP address and port number.
Note: In case of TLS-encrypted connection, define LDAP server’s address using its full domain
name (e.g. tech.ldap.com) instead of an IP address, to ensure the certificate is verified properly.
Make sure that the given server name is included in certificate’s Common Name field.
Note: Fields mapping enables importing users information from nonstandard attributes, e.g.
telephone number defined in an attribute named mobile instead of the standard telephoneNum-
ber.
19. Select Block automatically to automatically block local users’ accounts blocked in the
directory.
20. Click in the Groups mapping section to define user groups to safes assignment.
21. Type in user group and select desired entry.
Note: External authentication sources are assigned to users in the exact sequence they are
defined in groups mapping. Thus if the same user is present in more than one group, Fudo
Enterprise will be authenticating him against external authentication sources starting from those
defined in the first group mapping defined.
For example:
A user is assigned to groups A and B. Group B is mapped to Safe RDP and has CERB and Radius
authentication sources assigned. Group A is second in order and it is mapped to Safe SSH and
has AD authentication source assigned.
Authenticating a user, Fudo Enterprise will send requests to external authentication sources in
the following order:
1. CERB.
2. Radius.
3. AD.
24. In the User authentication methods section, select the Add X.509 cerificate option to
retrieve user’s certificate and assign it as one of user’s authentication methods.
25. Select the Add SSH key extracted from X.509 certificate option to retrieve user SSH key
from certificate and assign it as one of user’s authentication methods.
26. Click Save.
Note:
• The Force full synchronization option enables processing changes in directory structures
which cannot be processed during periodical synchronization, eg. deleting a defined group
or deleting a user.
• The full synchronization process is triggered automatically once a day at 00:00, or can be
triggered manually.
• Use diagnostics tools to troubleshoot problems with LDAP configuration.
• Fudo Enterprise supports nested LDAP groups.
Related topics:
• User authentication against external LDAP server
• Users management
• Diagnostics
Servers
Server is a definition of the IT infrastructure resource, which can be accessed over one of the
specified protocols.
• Fudo Enterprise allows configuring a server with one unique address and a server with a
group of addresses to be connected within a specified network.
• Once the server definition is configured and saved, the Fudo Enterprise allows grouping
multiple servers within one Server Pool so all the added servers are managed as one server
within other objects.
Note:
• A server object can be linked to only one anonymous account.
• A server object can be linked to only one forward account.
Warning: HTTP rendering is a CPU intensive process and may have negative impact on
system’s performance. A physical appliance is recommended for monitoring rendered HTTP
connections with the following limitations regarding the maximum number of concurrent
rendered HTTP sessions.
149
Fudo Enterprise 5.4 - System Documentation
7. Select the TLS enabled option to connect to monitored server over TLS.
• Select Legacy ciphers option to allow negotiating older encryption algorithms (DSA(1024),
RSA(1024)) when establishing connections.
8. In the HTTP host field provide the HTTP host header value.
Note: The HTTP host header determines the requested content in case there are many web
sites hosted on the specified server.
9. Enter value of the HTTP timeout parameter, determining the time period of inactivity
(expressed in seconds), after which the user will have to authenticate again.
10. Click the HTTP Authentication option to enable additional verification process and select
one of the available platforms. If None is selected, provide custom login page details:
• Login page URL,
• Username and Password,
• optionally, check the Press the enter key prior to password option.
Note: HTTP authentication is active only when the Render sessions option is enabled in the
HTTP listener settings. To enable Render sessions option, please refer to the Setting up the
HTTP listener topic.
11. From the Bind address drop-down list, select Fudo Enterprise IP address used for commu-
nicating with this server.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
12. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
• If the TLS enabled was checked, in the Server verification section select one of the following
options:Server certificate or CA certificate and provide respective certificate data.
Select None to disable server verification.
• Pools
• Protocols - HTTP
• Data model
• Accounts
• Listeners
• Safes
Note:
• A server object can be linked to only one anonymous account.
• A server object can be linked to only one forward account.
7. From the Bind address drop-down list, select Fudo Enterprise IP address used for commu-
nicating with this server.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
8. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
Note:
• A server object can be linked to only one anonymous account.
• A server object can be linked to only one forward account.
7. From the Bind address drop-down list, select Fudo Enterprise IP address used for commu-
nicating with this server.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
8. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
• Users
• Listeners
• Safes
• Accounts
Warning: Please note that the MySQL server caching_sha2_password plugin isn’t
supported by Fudo Enterprise. Supportable MySQL plugins by Fudo Enterprise are
mysql_native_password and mysql_old_password. Server plugin should be set to
mysql_native_password in /etc/mysql/mysql.conf.d/mysqld.cnf and a User object is
created with mysql_native_password plugin.
Note:
• A server object can be linked to only one anonymous account.
• A server object can be linked to only one forward account.
7. From the Bind address drop-down list, select Fudo Enterprise IP address used for commu-
nicating with this server.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
8. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
Note:
• A server object can be linked to only one anonymous account.
• A server object can be linked to only one forward account.
• Fudo Enterprise allows authenticating against RDP server with Kerberos.
7. Select the TLS enabled option to connect to monitored server over TLS.
• Check the NLA enabled option for additional security.
Note: Security mode must match the security mode setting in the RDP listener
configuration. The NLA enabled option within a server corresponds to the Enhanced
RDP Security (TLS) option within the listener.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
10. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
• If the TLS enabled has been checked, in the Server verification section select one of the
following options:Server certificate or CA certificate and provide respective certifi-
cate data. Select None to disable server verification. To learn more about the RDP server
certificate management, please follow the Managing RPD Server certificates in Windows
Server section.
• Otherwise, provide server key.
Note:
• A server object can be linked to only one anonymous account.
• A server object can be linked to only one forward account.
7. Select Legacy ciphers option to allow negotiating older encryption algorithms (DSA(1024),
RSA(1024)) when establishing connections.
12. From the Bind address drop-down list, select Fudo Enterprise IP address used for commu-
nicating with this server.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
13. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
14. In the Server verification section select Server public key and provide respective certifi-
cate data. Select None to disable server verification.
Note:
• A server object can be linked to only one anonymous account.
• A server object can be linked to only one forward account.
• In case of Telnet connections over forward and regular accounts, users are asked to provide
their login credentials twice. First time to authenticate against Fudo Enterprise and then
to connect to the target host.
7. Select the TLS enabled option to connect to monitored server over TLS.
• Select Legacy ciphers option to allow negotiating older encryption algorithms (DSA(1024),
RSA(1024)) when establishing connections.
8. From the Bind address drop-down list, select Fudo Enterprise IP address used for commu-
nicating with this server.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
9. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
• If the TLS enabled was checked, in the Server verification section select one of the following
options:Server certificate or CA certificate and provide respective certificate data.
Select None to disable server verification.
Note:
• A server object can be linked to only one anonymous account.
• A server object can be linked to only one forward account.
• In case of Telnet connections over forward and regular accounts, users are asked to provide
their login credentials twice. First time to authenticate against Fudo Enterprise and then
to connect to the target host.
6. In the Settings section on the list of available protocols select Telnet 3270 .
7. Select the TLS enabled option to connect to monitored server over TLS.
• Select Legacy ciphers option to allow negotiating older encryption algorithms (DSA(1024),
RSA(1024)) when establishing connections.
8. From the Bind address drop-down list, select Fudo Enterprise IP address used for commu-
nicating with this server.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
9. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
• If the TLS enabled was checked, in the Server verification section select one of the following
options:Server certificate or CA certificate and provide respective certificate data.
Select None to disable server verification.
Note:
• A server object can be linked to only one anonymous account.
• A server object can be linked to only one forward account.
• In case of Telnet connections over forward and regular accounts, users are asked to provide
their login credentials twice. First time to authenticate against Fudo Enterprise and then
to connect to the target host.
6. In the Settings section on the list of available protocols select Telnet 5250 .
7. Select the TLS enabled option to connect to monitored server over TLS.
• Select Legacy ciphers option to allow negotiating older encryption algorithms (DSA(1024),
RSA(1024)) when establishing connections.
8. From the Bind address drop-down list, select Fudo Enterprise IP address used for commu-
nicating with this server.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
9. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
• If the TLS enabled was checked, in the Server verification section select one of the following
options:Server certificate or CA certificate and provide respective certificate data.
Select None to disable server verification.
Note:
• A server object can be linked to only one anonymous account.
• A server object can be linked to only one forward account.
7. From the Bind address drop-down list, select Fudo Enterprise IP address used for commu-
nicating with this server.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
8. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
7. From the Bind address drop-down list, select Fudo Enterprise IP address used for commu-
nicating with this server.
Note:
• The Bind address drop-down list elements are IP address defined in the Network con-
figuration menu (Network interfaces configuration) or labeled IP addresses (Labeled IP
addresses).
• In case of cluster configuration, select a labeled IP address from the Bind address drop-
down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
8. In the Destination section select Host, IPv4 or IPv6. Enter server’s IP address.
Note: Depending on selected option, default values for the Mask and Port fields are filled out
automatically. This way the Fudo Enterprise system detects server as one with unique address.
In order to set up address for entire subnet, provide a dedicated value for the Address and the
Mask fields.
1. Select Management > Servers and then click Import from file.
2. Drag and drop file into the modal window upload area or click Browse for file to upload
it from local directory.
3. Displayed modal window presents a list of servers that will be added to Fudo Enterprise
configuration.
4. Click Send data to upload all listed servers to Fudo Enterprise configuration or Clear Data
to terminate uploading procedure.
Note: If any server specified in the CSV file have incorrect values, it will be skipped during
the upload process. For example, a server with the same name as an existing server in the
configuration will not be uploaded.
name,protocol,address,port,mask,bind_ip
Server1,ssh,243.177.229.0,22,,10.0.144.193
Server2,rdp,243.177.228.0,22,32,fudo:label:labelname
Related topics:
• Data model
• System initiation
• Users
• Listeners
• Safes
• Accounts
Fudo Enterprise allows blocking access to given server for all users.
Warning: Blocking a server will terminate current connections with the given server.
Related topics:
• Data model
• System initiation
• Users
• Listeners
• Safes
• Accounts
Related topics:
• Data model
• System initiation
• Users
• Listeners
• Safes
• Accounts
Alternatively, you can edit a server that needs to be deleted right from the list, click the vertical
three-dot icon and click Remove server.
• System initiation
• Users
• Listeners
• Safes
• Accounts
Pools
Server Pools allow grouping multiple server objects based on the same protocol and manage
within other objects (for example, accounts) as one server.
176
Fudo Enterprise 5.4 - System Documentation
Alternatively, select a pool that needs to be deleted right from the list and click on the vertical
three-dot icon:
Remote applications
Fudo Enterprise enables direct connection over the RDP protocol to a remote application using
Remote Applications feature.
You can configure remote application entries for specific resource for its future connection by a
user via Access Gateway and Remote Desktop Protocol client.
179
Fudo Enterprise 5.4 - System Documentation
• in the Remote applications section click the Add remote application button and select the
predefined remote application.
• click the button Save.
In order to establish a connection, sign in to the Access Gateway and select the respective account
and a listener to be connected using the predefined remote application. Select the Native client
option.
When a session to the specific resource is established by a user, their remote session is connected
within the application only. Therefore, the user has no access to the entire desktop, and closing
the application terminates the session.
2. Select the account that has the predefined remote application configured.
3. In the Remote applications section the Delete option to remove the predefined remote
application.
4. Click the button Save.
Related topics:
• Data model
• System initiation
• Users
• Listeners
• Safes
• Accounts
• Creating an account
Accounts
Account defines the privileged account existing on the monitored server. It specifies the actual
login credentials, user authentication mode: anonymous (without user authentication), regular
(with login credentials substitution) or forward (with login and password forwarding); password
changing policy as well as the password changer itself.
Note: In case of Telnet connections, user has to go through authentication process twice. First
time to authenticate against Fudo Enterprise and then to connect to the target host.
182
Fudo Enterprise 5.4 - System Documentation
Warning: Data model objects: safes, users, servers, accounts and listeners are replicated
within the cluster and object instances must not be added on each node. In case the replica-
tion mechanism fails to copy objects to other nodes, contact technical support department.
• raw - Fudo Enterprise saves session metadata (basic session information) and
records raw network traffic (RAW file). The raw data can be downloaded
but it cannot be played back in graphical form using the built-in session
player (session player only depicts the networks packet exchange between
the client and the target host).
• noraw - Fudo Enterprise records the session data in a non-raw format that
could be played back using the built-in session player.
• none - Fudo Enterprise saves only session metadata (basic session informa-
tion).
6. In the Notes field, enter a message to User Portal (Access Gateway) users. If permissions
are granted, notes can be also edited.
Note: Account notes can be displayed in the User Portal (Access Gateway).
Note: During manual account creation, assigning the category as privileged or non-privileged
is purely informational, yet during the Discovery, it is automatically assigned based on the
account’s parameters in the source system.
Note: Data retention for sessions established using this account will only be active if global
retention is enabled. To change global retention settings see chapter Data Retention.
10. In the Server section, assign account to a specific server or a server pool by selecting it
from the Server drop-down list.
11. Select SSH Agent forwarding option to authenticate the user against the target host using
client’s SSH key.
Note: This option is availble only after selecting an SSH server. Use -A option for connecting
to SSH server.
Note: Account notes can be displayed in the User Portal (Access Gateway).
Note: During manual account creation, assigning the category as privileged or non-privileged
is purely informational, yet during the Discovery, it is automatically assigned based on the
account’s parameters in the source system.
Note: Data retention for sessions established using this account will only be active if global
retention is enabled. To change global retention settings see chapter Data Retention.
Note: The list contains only objects to which you have been given access permissions.
key
• Click the and browse the file system to find the key definition file.
• Click the i icon and select the key type.
• Click the i icon and browse the file system to find the key definition file.
password
• Provide account password.
• Repeat account password.
Also note that 2FA/MFA authentication won’t work here. If you create a user with OATH+AD
authentication the OATH part is bypassed and only the password is used and sent to the server
– Fudo won’t ask for the OATH token in this situation. The same goes for Duo, SMS an any
other 2FA user authentication scheme that can be configured in Fudo. This restriction is specific
only to forward account types.
12. Select Forward domain option to have the domain name included in the string identifying
the user.
Note:
13. For SSH connections, select the SSH Agent forwarding option to authenticate the user
against the target host using client’s SSH key. Use -A option for connecting to SSH server.
14. Click Save.
Related topics:
• Data model
• Deleting an account
• Editing an account
• Unblocking an account
• Blocking an account
Note: Account notes can be displayed in the User Portal (Access Gateway).
7. In the Category field, select privileged or non-privileged to specify the account cate-
gory.
Note: During manual account creation, assigning the category as privileged or non-privileged
is purely informational, yet during the Discovery, it is automatically assigned based on the
account’s parameters in the source system.
Note: Data retention for sessions established using this account will only be active if global
retention is enabled. To change global retention settings see chapter Data Retention.
Note: More about this feature under this link: Account activity in the Access Gateway.
Note: If a domain is entered in the Domain field, Fudo Enterprise will always use it to
authenticate against the server. The domain will be added automatically to the user’s login.
• Click the icon and browse the file system to find the file with a non-
passphrase protected private key.
password from external repository
• Select external repository.
password
• Provide account password.
• Repeat account password.
14. In the Password checkout time limit field, define the time after which the password is
returned automatically.
Note: Defining the password checkout time limit automatically enables the Secret Checkout
feature for the particular Safe.
15. For SSH connections, select the SSH Agent forwarding option to authenticate the user
against the target host using client’s SSH key. Use -A option for connecting to SSH server.
If password option was chosen as an authentication method, provide additional configuration:
• Select Password change policy from the list of the configured password change policies.
• Select Change password after last checkin option to change the password automatically
after it has been returned by the last user.
Note: This options is available only for Secret Checkout feature and it’s enabled after specifying
the Password checkout time limit.
• Select Change password after session option to change the account password remotely after
the session is ended.
Note: This option requires to choose at least one Password changer and a Password change
policy any other than Static, without restrictions.
Refer to the Password changers topic for detailed information on setting up password changers.
• Check the Password recovery option to set a password verifier, to automatically trigger a
password changer if it verifies that the password for an Account was changed and a new
password is not stored in Fudo Enterprise.
Note: Having the Password recovery option enabled, the Password Verifier spawns “Trigger
password changer” action in the account. When it’s disabled, the Password Verifier only sends
event “Unable to verify password for account <account_name>”.
• Click + Add password changer, to have the password to the account changed automatically
according to the password policy.
• In the Password changers section, from the Password changer drop-down list select pass-
word changer specific for given account.
• In the Timeout field, define the script’s execution time limit.
• In the Variables section, assign attributes to variables.
Fudo Enterprise allows changing a password on a different node than the one that set as an
Active cluster node for Password changers.
If the transport_bind_ip variable values indicate different cluster nodes, the configured pass-
word changer/verifier will be running on a node that set as an Active cluster node for Password
changers.
Related topics:
• Data model
• Editing an account
• Blocking an account
• Unblocking an account
• Deleting an account
• Password changers - active cluster node
3. Find and click desired object’s name to open its configuration page.
4. Modify configuration parameters as needed.
5. Click Save.
Related topics:
• Creating an account
• Blocking an account
• Unblocking an account
• Deleting an account
Warning: Blocking an accout definition will terminate all current connections to servers
which use selected account for accessing those servers.
3. Click Block.
Note: To view the blocking reason, place the cursor over the icon on the accounts list.
Related topics:
• Creating an account
• Editing an account
• Unblocking an account
• Deleting an account
3. Click Unblock.
Warning: Deleting an accout definition will terminate all current connections to servers
which use selected account for accessing those servers.
3. Click Delete.
Fudo Enterprise tracks user’s action in User Portal (Access Gateway) and registers every pass-
word viewing. Blocking a user who has seen the current password is a potential security breach.
Fudo Enterprise identifies such events and communicates them to system’s administrators.
Administrator has an option to ignore the alert or trigger a password changer assigned to the
account.
Note: Account edit form contains a list of blocked users who have seen current password.
Note: Account edit form contains a list of blocked users who have seen current password.
Related topics:
• Password changers
• User Portal (Access Gateway)
Listeners
Listener determines server connection mode (proxy, gateway, transparent, bastion) as well as its
specifics.
Warning: Data model objects: safes, users, servers, accounts and listeners are replicated
within the cluster and object instances must not be added on each node. In case the replica-
tion mechanism fails to copy objects to other nodes, contact technical support department.
Note:
• A listener cannot link to an account that is assigned to a server with a different protocol
then the one defined in the listener.
• A proxy type listener can link to only one server.
• A bastion type listener cannot link to an anonymous account.
• A listener cannot link to the same anonymous account through two different safes.
• A listener cannot link to an anonymous and a regular or forward account to the same
server with the same protocol as the listener’s protocol.
202
Fudo Enterprise 5.4 - System Documentation
• A listener cannot link to two regular or forward type accounts to the same server with the
same protocol as the listener’s protocol, to which a single user has access.
• For a given linked RDP listener and RDP server, both have to use either Standard RDP
Security or TLS or NLA.
4. Go to Permissions tab and add users allowed to manage this listener. Use filtering by
name or by role to limit the number of objects displayed on the list.
5. Go back to Settings tab, choose desired protocol button and follow the corresponding
chapter below to complete the listener creation:
• Setting up the SSH listener
• Setting up the RDP listener
• Setting up the VNC listener
• Setting up the HTTP listener
• Setting up the Modbus listener
• Setting up the MySQL listener
• Setting up the TCP listener
• Setting up the MS SQL listener
• Setting up the Telnet listener
• Setting up the Telnet 3270 listener
• Setting up the Telnet 5250 listener
This section describes how to setup SSH listener. To learn first steps of creating listener, please
follow Creating a listener section.
1. Go to Settings tab and press the SSH button in the Protocol field.
2. 2. Select Legacy ciphers option to allow negotiating older encryption algorithms when
establishing connections.
3. Select the Case insensitivity option to disable case sensitivity in the username string when
connecting over this listener.
4. Select ProxyJump option to allow an intermediary system to connect to the target server.
5. Select Announcement option to enable it’s field and type in the notification that will be
presented to the user on the login screen.
6. In the Connection mode section, select desired connection mode.
bastion
Note:
• User connects to the target host by including name along with account lo-
gin on the target server and target server address in the login string, e.g.
john_smith#root#192.168.0.110.
• For details on bastion connection mode, refer to Connection modes topic.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
• Select External address option to enable its field and enter an IP address (or
FQDN name) along with the port number, under which Fudo can be accessed
from outside the local network.
proxy
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
• Select External address option to enable its field and enter an IP address (or
FQDN name) along with the port number, under which Fudo can be accessed
from outside the local network.
gateway
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Fudo Enterprise 5.4 is the last version supporting transparent mode in the listeners
configuration. Listeners using this mode must be reconfigured to use proxy and
bastion modes before upgrading to the next release.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
This section describes how to setup RDP listener. To learn first steps of creating listener, please
follow Creating a listener section.
1. Go to Settings tab and press the RDP button in the Protocol field.
2. Select the TLS enabled option to enable encryption.
3. Check the NLA enabled option for additional security.
Note: Security mode must match the security mode setting in the RDP server configuration.
In case the TLS enabled option is chosen, select Legacy ciphers option to allow negotiating older
encryption algorithms (DSA(1024), RSA(1024)) when establishing RDP connections.
4. Select Announcement option to enable it’s field and type in the notification that will be
presented to the user on the login screen.
5. In the Connection mode section, select desired connection mode.
bastion
Note:
• User connects to the target host by including name along with account lo-
gin on the target server and target server address in the login string, e.g.
john_smith#root#192.168.0.110.
• For details on bastion connection mode, refer to Connection modes topic.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
proxy
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
• Select External address option to enable its field and enter an IP address (or
FQDN name) along with the port number, under which Fudo can be accessed
from outside the local network.
gateway
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
7. Click Save.
Related topics:
• Data model
• Editing a listener
• Deleting a listener
• Blocking a listener
• Unblocking a listener
This section describes how to setup VNC listener. To learn first steps of creating listener, please
follow Creating a listener section.
1. Go to Settings tab and press the VNC button in the Protocol field.
2. Select the Case insensitivity option to disable case sensitivity in the username string when
connecting over this listener.
3. Select Announcement option to enable it’s field and type in the notification that will be
presented to the user on the login screen.
4. In the Connection mode section, select desired connection mode.
bastion
Note:
• User connects to the target host by including name along with account lo-
gin on the target server and target server address in the login string, e.g.
john_smith#root#192.168.0.110.
• For details on bastion connection mode, refer to Connection modes topic.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
proxy
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
• Select External address option to enable its field and enter an IP address (or
FQDN name) along with the port number, under which Fudo can be accessed
from outside the local network.
gateway
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
This section describes how to setup HTTP listener. To learn first steps of creating listener,
please follow Creating a listener section.
1. Go to Settings tab and press the HTTP button in the Protocol field.
2. Select the TLS enabled option to enable encryption.
3.In case the TLS enabled option is chosen, select Legacy ciphers option to allow negotiating
older encryption algorithms (DSA(1024), RSA(1024)) when establishing RDP connections.
4. Select Render sessions to enable graphical session rendering.
Note:
• Graphical HTTP rendering requires a substantial amount of processing power. It is rec-
ommended to limit the number of rendered HTTP sessions to minimum to ensure high
system’s responsiveness.
• During rendered HTTP sessions raw protocol data is not recorded.
• Render sessions option must be enabled to activate authentication in the HTTP servers
(refer to the Creating an HTTP server topic).
Note:
• Bastion mode is supported for rendered mode only.
• User connects to the target host by including its name in the login string, e.g.
john_smith#mail_server.
• For details on bastion connection mode, refer to Connection modes topic.
• Select External address option to enable its field and enter an IP address (or
FQDN name) along with the port number, under which Fudo can be accessed
from outside the local network.
proxy
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
• Select External address option to enable its field and enter an IP address (or
FQDN name) along with the port number, under which Fudo can be accessed
from outside the local network.
gateway
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
7. Click Save.
Related topics:
• Data model
• Editing a listener
• Deleting a listener
• Blocking a listener
• Unblocking a listener
This section describes how to setup RDP listener. To learn first steps of creating listener, please
follow Creating a listener section.
1. Go to Settings tab and press the Show all button to expand supported protocols list.
2. Press Modbus button in the Protocol field.
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
gateway
Fudo Enterprise 5.4 is the last version supporting gateway mode in the listeners
configuration. Listeners using this mode must be reconfigured to use proxy and
bastion modes before upgrading to the next release.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
This section describes how to setup MySQL listener. To learn first steps of creating listener,
please follow Creating a listener section.
1. Go to Settings tab, press the Show all button to expand supported protocols list.
2. Press MySQL button in the Protocol field.
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
gateway
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
This section describes how to setup TCP listener. To learn first steps of creating listener, please
follow Creating a listener section.
1. Go to Settings tab, press the Show all button to expand supported protocols list.
2. Press TCP button in the Protocol field.
Note:
• User connects to the target host by including name along with account lo-
gin on the target server and target server address in the login string, e.g.
john_smith#root#192.168.0.110.
• For details on bastion connection mode, refer to Connection modes topic.
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
gateway
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
This section describes how to setup MS SQL listener. To learn first steps of creating listener,
please follow Creating a listener section.
1. Go to Settings tab, press the Show all button to expand supported protocols list.
2. Press MS SQL(TDS) button in the Protocol field.
Note:
• User connects to the target host by including name along with account lo-
gin on the target server and target server address in the login string, e.g.
john_smith#root#192.168.0.110.
• For details on bastion connection mode, refer to Connection modes topic.
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
gateway
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
• Editing a listener
• Deleting a listener
• Blocking a listener
• Unblocking a listener
This section describes how to setup Telnet listener. To learn first steps of creating listener,
please follow Creating a listener section.
1. Go to Settings tab, press the Show all button to expand supported protocols list.
2. Press Telnet button in the Protocol field.
Note:
• User connects to the target host by including name along with account lo-
gin on the target server and target server address in the login string, e.g.
john_smith#root#192.168.0.110.
• For details on bastion connection mode, refer to Connection modes topic.
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
gateway
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This section describes how to setup Telnet 3270 listener. To learn first steps of creating listener,
please follow Creating a listener section.
1. Go to Settings tab, press the Show all button to expand supported protocols list.
2. Press Telnet 3270 button in the Protocol field.
Note:
• User connects to the target host by including name along with account lo-
gin on the target server and target server address in the login string, e.g.
john_smith#root#192.168.0.110.
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
gateway
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Fudo Enterprise 5.4 is the last version supporting transparent mode in the listeners
configuration. Listeners using this mode must be reconfigured to use proxy and
bastion modes before upgrading to the next release.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
This section describes how to setup Telnet 5250 listener. To learn first steps of creating listener,
please follow Creating a listener section.
1. Go to Settings tab, press the Show all button to expand supported protocols list.
2. Press Telnet 5250 button in the Protocol field.
bastion
Note:
• User connects to the target host by including name along with account lo-
gin on the target server and target server address in the login string, e.g.
john_smith#root#192.168.0.110.
• For details on bastion connection mode, refer to Connection modes topic.
Note: User connects to the target host by providing Fudo Enterprise IP address
and port number which unambiguously identifies target host.
Note:
• The Local address drop-down list elements are IP address defined in the Network
configuration menu (Network interfaces configuration) or labeled IP addresses
(Labeled IP addresses).
• Selecting the Any option will result in Fudo listening on all configured IP ad-
dresses.
• In case of cluster configuration, select a labeled IP address from the Local ad-
dress drop-down list and make sure that other nodes have IP addresses assigned
to this label. For more information refer to the Labeled IP addresses topic.
gateway
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using own IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
Note: User connects to the target host by providing its actual IP address. Fudo
Enterprise moderates the connection with the remote host using user’s IP address.
This option requires deploying Fudo Enterprise in the bridge mode.
3. Find and click on a name of the desired listener to access its configuration parameters.
Warning: Blocking a listener will terminate current connections with server which uses it.
3. Select one or more listeners to block by checking the box next to listener’s name.
4. Click Unblock / Block button to disable access to hosts over selected listeners.
5. Provide descriptive reason for blocking given resource (required) and click Block in dis-
played dialog box.
Note: To view the blocking reason, place the cursor over the red cross icon on the listeners
list.
Related topics:
• Data model
• System initiation
• Servers
3. Select one or more listeners to unblock by checking the box next to listener’s name.
4. Click Unblock / Block button to enable access to hosts over selected listeners.
5. Click Unblock button in displayed dialog box to confirm unblocking selected objects.
Related topics:
• Data model
• System initiation
• Servers
Warning: Deleting a listener will terminate current connections with server which uses it.
3. Select one or more listeners to delete by checking the box next to listener’s name.
4. Click Delete selected.
5. Confirm deleting selected objects by choosing Confirm button in displayed dialog box.
Related topics:
• Data model
• System initiation
• Servers
Safes
Safe directly regulates user access to monitored servers. It specifies available protocols’ features,
policies and other details concerning users and servers relations.
Note:
• The system safe can only contain system account.
• The portal safe can only contain the portal account.
• Operator, admin and superadmin users always have access to the system safe.
• User type users cannot have access to the system safe.
• Anonymous user must have access to safes containing anonymous accounts.
235
Fudo Enterprise 5.4 - System Documentation
Warning: Data model objects: safes, users, servers, accounts and listeners are replicated
within the cluster and object instances must not be added on each node. In case the replica-
tion mechanism fails to copy objects to other nodes, contact technical support department.
5. Select Access request required votes option and provide a number of the voters. This
option enables a so called Just-In-Time feature that allows defining and scheduling the
time when a user is allowed to access specific resources for a set period of time. The user
sends requests via the Access Gateway and the voters accept or reject them on an the
Admin Panel. Read more about the Just-In-Time feature in a Access requests page.
6. Select Require approval option to have the administrator approve each connection to servers
accessed through configured safe. Provide how many minutes the administrator has to
approve or reject a request.
7. Assign security policies in the Policies field.
8. From the Note access drop-down list, select access rights to account related notes:
read-only access or write access.
Notes can be accessed either from the account edit form
Warning: Disabling the OTP in Access Gateway option makes impossible connecting via
the Native Client or Web Client. Access via the Access requests would be possible only.
12. For RDP, VNC and SSH-based safes, select Web Client option to allow connecting to the
session in browser.
Note: The Web Client option can’t be enabled when the OTP in Access Gateway option is
disabled.
Note: With the Suspend option enabled for the RDP sessions, its content will not be available
for viewing when the user minimizes its client application.
With the Client Cut Text option enabled for the VNC sessions, a user is allowed to paste text
into the VNC server computer.
With the Server Cut Text option enabled for the VNC sessions, a user is allowed to copy and
paste text from the VNC server computer into the user’s computer.
15. Select Users tab to assign users allowed to access accounts assigned to this safe.
• Click + Add user.
– Click to fill out the Valid from and Valid to fields with date and time interval
when user will be allowed to access servers through the given safe. When defined
date and time comes, access to the given safe is granted to the user automatically.
– Click to enable and define time intervals during which the user will be allowed to
connect to servers.
– Click to allow user to use Secret Checkout feature and view passwords in the
Access Gateway.
Note: Access time policy options are disabled when the Access request required votes option
is enabled for the safe.
16. Select Granted users tab to assign users allowed to manage this object.
• Click + Add user.
17. Select Accounts tab to add accounts accessible through this safe.
• Click + Add account.
3. Find and click desired object’s name to open its configuration page.
4. Modify configuration parameters as needed.
5. Click Save.
Related topics:
• Data model
• Creating a safe
• Blocking a safe
• Unblocking a safe
Warning: Blocking a safe definition will terminate all current connections that use accounts
assigned to this safe to connect to servers.
3. Click Block.
Note: To view the blocking reason, place the cursor over the icon on the safes list.
Related topics:
• Unblocking a safe
• Data model
• Creating a safe
• Blocking a safe
3. Click Unblock.
Warning: Deleting a safe definition will terminate all current connections that use accounts
assigned to this safe to connect to servers.
3. Click Delete.
Discovery
The Discovery feature is able to search for accounts with different privilege levels on domain
controllers, servers on domain controllers, and local accounts on Windows servers.
Additional nomenclature that comes along with this feature within the Discovery, the Accounts,
and the Servers tab:
• Scanner - the main component that aims to discover accounts or servers on the target
server. The scanner can have a rule that defines an action that follows the discovery. The
scanner can be executed manually or automatically according to the schedule.
• Rule - allows setting criteria for the objects to be discovered and the actions to be per-
formed after their discovery.
• Account Category - is a privilege level of the account.
• Discovered Accounts - accounts that were discovered by the scanner.
• Discovered Servers - servers that were discovered by the scanner.
• Onboarded Accounts - accounts that were unblocked on the target server and optionally
added to the listener and / or safe.
• Onboarded Servers - servers that were unblocked on the target server and optionally added
to the pools.
• Quarantined Accounts / Servers - accounts or servers that were blocked on the target
server.
Note:
• The Discovery feature executes scanning Active Directory by connecting using the LDAP
protocol.
• The WinRM protocol is used to connect to the server and scan for local accounts.
The Discovery function needs two objects to provide the most efficient results:
244
Fudo Enterprise 5.4 - System Documentation
1. A scanner with configuration of the target server and an account to connect, and a schedule
for running the scanner automatically.
2. A rule to specify what the scanner should do in terms of its discovery.
To have the Discovery function fully automatic, it is advised to start its configuration from
creating a rule and next, create a scanner.
Although, if you want to onboard or send to quarantine the discovered accounts or servers
manually, you can complete Creating a scanner step only, as the scanner can work without the
rules being added. Next, discovered accounts or servers can be moved further with the Managing
discovered accounts or Managing discovered servers option, available in the Accounts and Servers
tab.
Note: The active node, which is used for the scanning process, can be checked under the
Discovery section in the Settings > System tab.
Each rule can be enabled or disabled anytime. When a rule is enabled, the system will automat-
ically onboard or send to quarantine matching accounts or servers according to the given rule
actions. The rules apply to just discovered elements but not to the elements that are already
onboarded or sent to quarantine by the rules. In practice, it means that after a particular rule
is changed, its actions will be applied to the accounts or servers that were discovered after the
changes are saved.
8. Click Save.
Related topics:
• Managing rules
• Creating a scanner
8. Click Save.
Note:
• Server with the same name as the one existing in Fudo Enterprise will not be added after
scanning.
• Taking the server on a quarantine will block this server in the domain.
• Onboarding the server unblocks the server in the domain.
• If the server is removed from the domain, it will be removed from Fudo Enterprise after
the next scan step.
Related topics:
• Managing rules
• Creating a scanner
Each rule can be enabled or disabled anytime. When a rule is enabled, the system will automat-
ically onboard or send to quarantine matching accounts or servers according to the given rule
actions. The rules apply to just discovered elements but not to the elements that are already
onboarded or sent to quarantine by the rules. In practice, it means that after a particular rule
is changed, its actions will be applied to the accounts or servers that were discovered after the
changes are saved.
Related topics:
• Creating a scanner
• Managing discovered servers
• Managing discovered accounts
The Discovery feature is able to search domain controllers for accounts with different privilege
levels and add them to the relevant safes and/or listeners. This Onboarding process, which grants
the discovered accounts access to connections, is a basis of the Discovery feature. Alternatively,
the feature can send the accounts to quarantine, which means blocking accounts on the target
server.
Note: Before proceeding with creating a scanner, you need to set up:
• a server that will be scanned for accounts - refer to the Servers section,
Note: If Base DN or Group DN is not specified, the scanner will search the entire
domain.
Note: The Discovery feature identifies privileged accounts within Active Directory
(AD) based on specific group memberships that signify high levels of rights and
permissions. To be recognized as privileged by the Discovery scanner, accounts must
belong to one of four AD’s high-privilege groups:
• Enterprise Admins (EA),
• Domain Admins (DA),
• Built-in Administrators (BA),
• Schema Admins (SA).
7.8. Select the Pools to which the discovered accounts will be assigned.
7.9. Choose previously defined Rules to set the following actions after the scan.
Please note that in case more than one rule is added and their actions
overlap, the order of the rules is taken into account: the first matching
rule will be applied.
8. In Password Changers section select Password change policy, Password changer, and Password
verifier which will be automatically assigned to discovered accounts.
Note:
• Administrator can predefine password changer variable values in Password changers con-
figuration (refer to the Custom password changers section).
• Predefining values is optional. If variable is not defined, it will take value from account
that password changer is assigned to.
• Default password changers don’t have predefined variable values.
8. Click Save.
Related topics:
• Creating a rule
• Managing discovered accounts
The Discovery feature is able to search domain controllers for servers and add them to the
relevant pools during the Onboarding process. Alternatively, the feature can send the servers to
quarantine, which means blocking servers in the domain.
Note: Before proceeding with creating a scanner, you need to set up:
• a server that will be scanned - refer to the Servers section,
• a privileged account on that server - refer to the Accounts section.
Note: If Base DN or Group DN is not specified, the scanner will search the entire
domain.
8. Click Save.
Related topics:
• Creating a rule
• Managing discovered servers
The Discovery feature is able to search Windows servers in a pool for local accounts and add
them to the relevant safes and/or listeners. Alternatively, the feature can send the accounts to
quarantine, which means blocking accounts on the target server.
Note: Before proceeding with creating a scanner, you need to set up:
• a pool of servers that will be scanned for local accounts - refer to the Pools section,
• an administrator’s account with access to all scanned servers - refer to the Accounts section.
Password change policy, password changer, and password verifier can be added later, after saving
the scanner.
7. In Configuration section:
7.1. Select the pool of servers, where scanning will be performed.
7.2. Specify port number in the Port field.
7.3. Provide CA certificate.
7.4. Select Account to be used to connect to the target server.
Note: In order to use one scanner to scan local accounts on multiple Windows
servers, an administrator account with exactly the same authentication method must
exist on every scanned server.
7.5. Choose previously defined Rules to set the following actions after the scan.
Please note that in case more than one rule is added and their actions
overlap, the order of the rules is taken into account: the first matching
rule will be applied.
8. In Password Changers section select Password change policy, Password changer, and Password
verifier which will be automatically assigned to discovered accounts.
Note:
• Administrator can predefine password changer variable values in Password changers con-
figuration (refer to the Custom password changers section).
• Predefining values is optional. If variable is not defined, it will take value from account
that password changer is assigned to.
• Default password changers don’t have predefined variable values.
8. Click Save.
Related topics:
• Creating a rule
• Managing discovered accounts
The scanners with defined schedule can have scheduling enabled or disabled anytime. When a
scanner has scheduling enabled, the system will automatically execute the given scanner con-
figuration. When a scanner’s scheduling is disabled, the system will wait for the decision from
superadmin to start its execution.
Multiple scanners can be started simultaneously or deleted after being selected.
Related topics:
• Creating a rule
• Managing discovered servers
• Managing discovered accounts
Discovered, onboarded and quarantined accounts are available in the main Accounts view.
Note: Usually, discovered accounts are not onboarded automatically due to a lack of automatic
rule in the system. Administrator can manually onboard them by choosing the Manage Accounts
option.
1. Select Management > Accounts and respectful tab: Discovered, Onboarded or Quarantined.
2. Choose the accounts to be onboarded or quarantined by selecting the respective checkboxes
next to their names.
3. Click on the Manage Accounts option on the top of the functional menu - a modal will
pop up.
4. Choose an action:
4.1 Send to quarantine (optionally, you can add a reason) or
4.2 Onboard by adding the discovered accounts to the Safe and/or Listener. Warn-
ing: The listeners with bastion mode are supported only.
5. Click on a Create a rule checkbox if you want to set the defined actions to be executed
automatically by the scanner in the future.
6. Click Save.
Related topics:
• Creating a rule
• Creating a scanner
Discovered, onboarded and quarantined servers are available in the main Servers view.
Discovered, onboarded and quarantined servers are available in the main Servers view.
Note: Usually, discovered servers are not onboarded automatically due to lack of rule config-
uration or assignment in scanner. Administrator can manually onboard them by choosing the
Manage servers option.
1. Select Management > Servers and respectful tab: Discovered, Onboarded or Quarantined.
2. Choose servers to be onboarded or quarantined by selecting the respective checkboxes next
to their names.
3. Click on the Manage servers option on the top of the functional menu - a modal will pop
up.
4. Choose an action:
4.1 Onboard by adding the discovered servers to specified Pool or
4.2 Quarantine and provide a reason (mandatory) to send chosen servers to quar-
antine.
5. Click Apply.
Related topics:
• Creating a rule
• Creating a scanner
Password changers
Fudo Enterprise features password changers, which enable managing credentials to privileged
accounts on monitored servers.
Password changers run on a separate transport layer: SSH, LDAP, Telnet or WinRM, and you
can either use one of the built-in ones or create your own script.
The built-in password changers cover the following scenarios:
• Unix over SSH
• MySQL over SSH
• Cisco over SSH and Telnet
• Cisco Enable Password over SSH and Telnet
• WinRM
• LDAP
Password changer policy defines specifics of how frequently the password should be changed and
password complexity requirements.
257
Fudo Enterprise 5.4 - System Documentation
Parameter Description
Length Provide the number of characters comprising the password.
Small letters Select to include lowercase characters, define their minimal
number.
Capital letters Select to include uppercase characters, define their minimal
number.
Special characters Select to include special characters, define their minimal num-
ber.
Digits Select to include digits, define their minimal number.
Note: The sum of the enforced password requirements cannot be greater than the specified
password length.
7. Click Save.
Custom password changers enable defining a set of commands executed on a remote host in case
the built-in password changers cannot handle a specific use case scenario.
Note: In cluster configuration, the node responsible for changing passwords on monitored
systems is configured in system settings. For more information refer to Password changers -
active cluster node topic.
1. Click + icon in the main menu next to the Password changers tab, or
Select Management > Password changers. Click + Add and then choose New password changer.
Note: Alternatively, you can find and click an existing password changer and click Copy to
create a new password changer based on currently opened definition.
Note: Available commands depend on selected transport layer. For more information on
connection modes, refer to the Connection modes topic.
• INPUT - command executed on target host.
• EXPECTED - output that is expected after executing a command.
• ENTER
• DELAY - delay between commands’ execution.
• DN - directory service DN (Distinguished Name) parameter.
• FILTER - directory service user filter.
Warning: To configure WinRM password changers, you need to provide user credentials
with the authority to change passwords (typically an admin-level account). However, it’s
important to avoid using this account to change its own password, as WinRM will return
an error that Fudo Enterprise cannot process. Make sure that the account_login and
transport_login variables are set to different values.
Note: You can use pre-defined transport layer or user defined variables in commands.
To use or define a variable, enclose it in %% characters (e.g. %%transport_host%%,
%%custom_variable%%).
Note:
• Variables can be initiated with values referenced from other objects or they can be assigned
a constant value.
• Predefine the property values so that the password changer assigned to the account during
the Discovery process will not require any additional configuration.
Note: Example
In this password changer example, the password change is triggered with the passwd command
executed with sudo privileges on a host running FreeBSD operating system.
Commands list
Variables
Connection modes specifies transport layer used in the password change process. The transport
layer determines the list of available commands and default variables.
14.3.1 SSH
SSH connection mode uses SSH protocol to establish connection with remote host.
Commands
Command Description
INPUT Command executed on target host.
EXPECTED Expected result.
ENTER
DELAY Delay between commands’ execution.
Variables
Variable Description
transport_bind_ip Fudo IP address used to establish connection with the remote
host.
transport_host An IP address of the remote host that the password
changer/verifier connects to.
transport_host_public_key Public key of the remote host.
transport_login An account on the target system authorized to change pass-
words.
transport_method Transport layer authentication method: password or sshkey.
transport_password_promptRegular expression describing the password prompt.
14.3.2 LDAP
LDAP transport layer runs an LDAP query to change the password property of an object defined
in the directory service.
Commands
Command Description
DN Directory service DN (Distinguished Name) parameter.
FILTER Directory service user filter.
Note: Password changers based on the LDAP transport layer can have only one command
defined.
Variables
Variable Description
transport_base Base distinguished name.
transport_bind_ip Fudo IP address used to establish connection with the remote
host.
transport_ca_certificate CA certificate of the target system.
transport_domain Domain used to login to the target system.
transport_encoding Text encoding used by the target system.
transport_host An IP address of the remote host that the password
changer/verifier connects to.
transport_login An account on the target system authorized to change pass-
words.
transport_port A port number that the password changer/verifier connects to.
transport_secret Secret used to authorize the account to execute password
change.
transport_server_certificate Certificate of the target server.
account_domain Domain of the user whose password is being changed.
account_new_secret System default variable initiated with the value automatically
generated by Fudo.
14.3.3 Telnet
Telnet connection mode uses Telnet protocol to establish connection with remote host and
continue to communicate with the server in order to change the password.
Commands
Command Description
INPUT Command executed on target host.
EXPECTED Expected result.
ENTER
DELAY Delay between commands’ execution.
Variables
Variable Description
transport_bind_ip Fudo IP address used to establish connection with the remote
host.
transport_host An IP address of the remote host that the password
changer/verifier connects to.
transport_login An account on the target system authorized to change pass-
words.
transport_port A port number that the password changer/verifier connects to.
transport_secret Secret used to authorize the account to execute password
change.
account_login Login of the user whose password is being changed.
account_new_secret System default variable initiated with the value automatically
generated by Fudo.
14.3.4 WinRM
WinRM transport layer uses Windows Remote Management protocol to interface with remote
operating system and facilitate password change. WinRM is compatible with Certificate Revo-
cation List (CRL) so that the used digital certificates are always up to date and valid.
Note: The default settings of WinRM Password Changer and Verifier allow changing and
verifying passwords of local users only. If the domain users should be included too, add them
to the “Allow log on locally” group so that the executing script takes domain users’ passwords
while running, too.
Commands
Command Description
INPUT Command executed on target host.
EXPECTED Expected result.
ENTER
DELAY Delay between commands’ execution.
Variables
Warning: To configure WinRM password changers, you need to provide user credentials
with the authority to change passwords (typically an admin-level account). However, it’s
important to avoid using this account to change its own password, as WinRM will return
an error that Fudo Enterprise cannot process. Make sure that the account_login and
transport_login variables are set to different values.
Variable Description
transport_bind_ip Fudo IP address used to establish connection with the remote
host.
transport_ca_certificate CA certificate of the target system.
transport_encoding Text encoding used by the target system.
transport_host An IP address of the remote host that the password
changer/verifier connects to.
transport_login An account on the target system used to change passwords. It
has to be different from the account on which the password is
being changed (account_login variable).
transport_port A port number that the password changer/verifier connects to.
transport_secret Secret used to access the account to execute password change.
account_login Login of the user whose password is being changed.
account_new_secret System default variable initiated with the value automatically
generated by Fudo.
Related topics:
• Custom password changers
• Password changer policy
Note: Provide a descriptive name so that anyone administrating Fudo Enterprise can tell
what the policy does at a glance. E.g. 10 minutes, 20 characters, special characters,
uppercase.
4. Select the Password change enabled option and define how frequently the password will be
changed.
5. Select the Password verification enabled option and define how frequently the Secret Man-
ager should verify whether the password has not been changed in any other way but the
Secret Manager itself.
6. Provide the number of characters comprising the password.
7. Select desired password complexity options and provide the minimal number of characters
for each.
Variable Value
transport_bind_ip cont_int: Any
transport_host cont_int: 10.0.0.12
transport_host_public_key cont_int: ssh-rsa AAA[...]
transport_login Enter manually: root
transport_method Enter manually: password
transport_password_prompt constant
transport_port cont_int: 22
transport_secret cont_int_mr_jenkins: *****
account_login cont_int_mr_jenkins: mr_jenkins
Note:
• Variables starting with transport_ are the transport layer variables determining connec-
tion parameters with the target host.
• Password changer variables can be assigned values manually or initiated with properties
of other objects.
Variable Value
transport_bind_ip cont_int: Any
transport_host cont_int: 10.0.0.12
transport_host_public_key cont_int: ssh-rsa AAA[...]
transport_login cont_int_mr_jenkins: mr_jenkins
transport_method cont_int_mr_jenkins: password
transport_password_prompt constant
transport_port cont_int: 22
transport_secret cont_int_mr_jenkins: *****
Policies
Policies are patterns definitions facilitating proactive session monitoring. In case a defined
pattern is detected, Fudo Enterprise can automatically take respective actions and notify the
administrator about the current situation.
Fudo Enterprise divides policy definition by its basis: AI module or Regular Expression:
• when the AI module option is chosen as a basis of the policy, Fudo Enterprise reacts on
reaching the specified Threat Probability Threshold,
• when the regular expression option is chosen for the policy’s base, the system analyses
the defined expression’s input or output.
Both types of policies react by taking the following actions:
• sending e-mail message,
• sending SNMP TRAP notification,
• pausing connection,
• terminating connection,
• blocking the user.
269
Fudo Enterprise 5.4 - System Documentation
4. Select the actions that will be performed when the policy is breached:
• send email notification to system administrator,
• pause connection,
• terminate connection,
• block user.
Warning: If SNMP TRAP service is not configured, all notifications on policy violation
will be discarded but other options related to the session management will work.
5. Select the Severity. Severity parameter value is included in the email notification message
and in the Events log with the FSW0284 code.
6. Check the AI module in the Policy type field.
7. Select min, avg (default) or max option for the Threat Probability Threshold field and
provide the value.
Note: Values for the Threat Probability metrics are calculated by the AI models for each
session segment. The segment evaluations are averaged per model (e.g. Mouse Biometric,
Keyboard Biometric) creating a model Threat Probability, thus the AI model delivers one Threat
Probability per model for the whole session. These values are used in the policy and the policy
actions can be applied to the minimum, average or maximum value of model Threat Probabilities.
In practice, if an administrator wants to decrease sensitivity of the policy so that it reacts to
breaching a given threshold by all the models, the Threat Probability Threshold should be set
to minimum. If the situation requires the policy to be more sensitive and react to the threshold
breaching by at least one model, then the Threat Probability Threshold should be set to
maximum.
Default value for the Threat Probability Threshold is average.
In order to avoid an excessive number of emails and unnecessary actions, min. recommended
value is above 75%.
8. Click Save.
AI module-based policy examples
Example 1. Sending SNMP TRAP notifications about suspicious sessions.
To configure the policy to send SNMPv3 TRAP notifications about suspicious sessions, follow
the procedure:
1. Create a user for SNMPv3 service:
• Select Management > Users.
• Create a new one.
• Enter Login.
• Choose the service in the Role field.
• Select Password in the Authentication Type field and provide your password.
• In the SNMP section, define the settings:
– Enable SNMP.
– Select SHA or MD5 in the Authentication Method field.
– Select AES or DES in the Encryption field.
• Click Save.
2. Configure SNMPv3 TRAP:
• Select Settings > System
• Scroll down to the Maintenance and supervision section
• Configure the SNMPv3 TRAP server address and port
• Select the user with service role, created in step 1.
• Click Save.
3. Create policy:
• Select Management > Policies.
• Click Add policy.
• Provide the Name for the policy.
• Select the SNMP TRAP option in the Actions field.
• Select AI module in the Policy type field.
• Select the option of the Threat Probability Threshold (e.g. avg) and add its value
(e.g. 90%).
• Click Save.
4. Assign the policy to a safe that is used to establish connections to servers.
• Click Save.
Note: For harsh actions like pausing or terminating a session or blocking a user it’s advised
to use higher max thresholds to minimize consequences of false positives.
Note:
• Patterns can be defined as regular expressions.
• Fudo Enterprise does not recognize expressions which use backslash character, e.g. \d, \D,
\w, \W.
Note:
• Sending email notifications requires configuring and enabling notification service as well
as Session policy match notification enabled in safe configuration.
15. Select the Match input only option to process input stream only.
Note: In RDP, VNC and MySQL protocols only input data is processed.
Related topics:
• Artificial Intelligence
• AI sessions processing
• Safes
• Terminating connection
• Notifications
• Security
Downloads
The Downloads tab allows for tracking the conversion progress of session recordings and files
transferred during SFTP sessions, previously selected for download.
16.1 Sessions
Fudo Enterprise allows converting stored session data to one of supported formats. The Sessions
tab is designated for managing session recordings that were previously selected for download
in Management > Sessions. For detailed instructions on how to export a session, please refer to
the Exporting sessions section of this manual.
16.2 Files
The Files tab is designated for managing the downloads of large files that originate from recorded
sessions via the SFTP protocol. If the selected file exceeds the 50 MB threshold, it undergoes
an encoding process and subsequently appears in the Files tab, ready for download. Files
smaller than 50 MB are directly downloaded through the browser without encoding.
To download a file transfered during SFTP session, users must initiate the download from the
session player interface. To view a session, proceed as follows:
1. Select Select > Sessions.
277
Fudo Enterprise 5.4 - System Documentation
2. Find desired SFTP session and click the play icon next to it.
3. In the session player window, navigate through the SFTP session history to locate the
desired file for download, then click the File button to initiate the encoding process.
Note: To ensure the download of the entire file, please use the File button.
Related topics:
• Exporting sessions
• Sessions
In order enable the Resource in use option for the RDP connections, follow the instruction:
1. Select Management > Servers.
• Define filters to limit the number of objects displayed on the list, or select an RDP server
that needs to be edited right from the list.
• Check the Inform about existing connection option in the Settings section.
279
Fudo Enterprise 5.4 - System Documentation
• Click Save.
Information about existing connection will be presented to the user in the Access Gateway. Here
is the default message:
280
Fudo Enterprise 5.4 - System Documentation
You can customize that message by including variables (organization, phone, name, full_name,
or email), enclosed in double %% symbols. E.g., %%email%%.
In order to do that:
1. Select Settings > Resources > User portal tab.
2. Provide a new message in the Resource in use message field.
3. Click Save.
Related Topics:
281
Fudo Enterprise 5.4 - System Documentation
282
CHAPTER 18
Access requests
Granting access to the resources via the request is a basis of the Just In Time feature. A user
requests for access via the Access Gateway, and authorized administrators vote for the request’s
approval or rejection on Admin Panel.
In order to set the voting process for access to your resources, follow the procedure:
1. Select Management > Safes tab.
2. Select the safe from the list, or create a new one.
3. Check the Access request required votes option. Provide a number of the voters that will
be deciding about each request to the safe resources.
Note:
• Users with Admin role and users added as the Granted Users to the Safe are allowed to
be the voters.
• A user, who sent an access request isn’t allowed to vote for access on their own request.
Therefore, their own requests aren’t visible for them.
283
Fudo Enterprise 5.4 - System Documentation
• Having more than one voter sets a request to be accepted by more than 1 authorized person.
If one of the voters votes for rejection, the system automatically rejects the request.
4. Go to the Granted users tab and for the particular user select the Access request sent
type of notification.
Note: Notifications are set per node, according to the settings in the Notifications tab. In
case of the Access request sent type, notifications are sent from the node, on which the request
was created. More on this subject is at the Notifications page.
5. Click Save.
All the requests are available in the Management section on the Requests tab.
The Awaiting tab shows a detailed list of the requests that are waiting for a decision of the
currently logged in user. Two types of requests are available for the user who sends an access
request: immediate and scheduled.
Immediate requests can be set from now up to the next 24 hours.
When a user sends an immediate request, its access time starts when the request is accepted.
Then, the user has 24 hours to start their session. When the user starts the session, the system
counts the session time, which the user had requested, and terminates connection when the
requested session time is over. If the user does not use the access and does not connect for 24
hours after access is granted, the access becomes expired.
For the scheduled type of requests, the user chooses a time period in the future, including exact
time and date.
Note: The Response reason field is required to activate the rejecting option.
Note:
• Users who sent the request via the Access Gateway and have their e-mail address configured
on the Admin Panel, receive notifications when their request was accepted or rejected.
• If a user is trying to connect to a server (for example, based on the SSH protocol) via
the native client option, but hasn’t sent an access request, a respective message about
authentication error is recorded into the Event logs: Unable to authenticate user:
safe requires acceptance.
The Active tab shows a list of two types of the requests: 1) requests that were accepted, and
their sessions are currently ongoing, and 2) requests that are waiting for the part of the voters.
The Votes column of the requests list shows a number of voters that the particular request needs
to be processed. Hover on its value to see the details of who had voted.
Given vote for accepted and active requests can be revoked, for example, for preventing a possible
misuse. This option is useful when the user finished their work earlier than expected, but their
request is still valid.
The Votes column of the requests list shows a number of voters that the particular request
needed to be processed. Hover on its value to see the details of who voted.
The Just in Time feature also works when there are Fudo instances connected in the cluster.
Votes and requests are replicated on nodes in the cluster.
Note: If the admin voted on more than one machine in the cluster and his decisions were
contradictory, it will be treated as a single rejecting vote and the accepting vote will be revoked.
Related topics:
• Creating a new safe
Sessions
Fudo Enterprise stores all recorded servers access sessions, allowing to playback, review, delete
and export to the supported video formats.
Sessions management page allows filtering stored user sessions, accessing current users connec-
tions and downloading stored sessions. It also provides status information on each session and
enables access to session sharing options.
Note: Contents of the session list depend on the logged in user’s access rights. Being able to
access a given session requires having management privileges to: server, account, user and safe
objects that were used in the given connection.
288
Fudo Enterprise 5.4 - System Documentation
Icon Description
Start session playback (applicable to sessions with the entire traffic recording op-
tion selected in connection properties).
Icon indicating that session has been timestamped.
Purpose why the user has connected to the server.
Session has been commented.
Session has been processed for full-text search purposes.
Session replication status.
Access session sharing management options.
Download session material in selected file format (applicable to sessions with either
complete or raw traffic recording option selected in connection properties).
User activity monitor (applicable to live sessions).
Username of the user for whom approved pending session.
Approve pending request.
Decline pending request.
Pending request awaiting authorization.
Element aggregating connections established within the same session.
Session excluded from the retention mechanism.
Behavioral analysis status. This is an evaluation version of the AI component.
- session under analysis, initial result - no threat.
- session under analysis, initial result - medium threat level.
- session under analysis, initial result - high threat level.
- session awaiting analysis or being initially processed.
- session not analyzed due to missing a trained model.
- session processed - no risk.
- session processed - medium threat level.
- session processed - high threat level.
- session processed - no result.
Note: Fudo Enterprise stores compressed session material which may result in differences
between the displayed and the actual session size.
289
Fudo Enterprise 5.4 - System Documentation
Sessions filtering allows to find desired sessions easily by limiting the number of displayed sessions
on the sessions management page.
1. Click Add Filters and select desired data type from the drop-down list.
Note: Enter a string of characters to limit the number of the elements on the list. In case of
users, the elements on the list can be limited to those who have a given user role assigned or
belong to the given organization unit.
Note: Only sessions which match all defined filtering parameters will be displayed.
Current filtering settings can be stored as a user defined filtering preset for the convinience of
the system’s administrator.
1. Define filtering options as described in the Filtering sessions section.
2. Click Add filter and select the desired filter definition.
Fudo Enterprise enables searching stored data to limit the number of elements on the sessions
list only to those containing the specified phrase.
Note:
• Use the Sessions search bar to search for sessions containing specific phrases, e.g. “logout”.
• Playing a session containing the specified phrase starts from the moment of its first occur-
rence.
The player allows for skipping between each occurrence of the specified phrase.
Related topics:
• System overview
• Reports
Fudo Enterprise allows viewing recorded sessions as well as current user connections.
To view a session, proceed as follows.
1. Select Management > Sessions.
2. Find desired session and click the play icon next to it.
Note: Playing a session containing the specified phrase starts from the moment of its first
occurrence.
The player enables skipping between each occurrence of the specified phrase.
Note: Click the displayed elapsed time to switch between the connections’s actual and relative
time.
Below, you will find screenshots displaying session views established using various protocols such
as HTTP, SSH, SFTP, MySQL, MSSQL and SCP.
HTTP - rendered
Note: In case of rendered HTTP sessions, raw protocol data is not recorded.
HTTP - raw
SSH
SFTP
MySQL, MSSQL
SCP
Related topics:
• Sensitive features
In case a current user action requires analysis, the connection to the server can be paused.
Note: Pausing connection temporarily suspends data transmission. After resuming connection,
buffered user’s actions are forwarded to the server.
Related topics:
• Replaying session
• Joining session
• Filtering session
In case the administrator notices access rights misuse, Fudo Enterprise allows to terminate the
session and automatically block given user.
Note: Fudo Enterprise can automatically block user account upon detecting a defined pattern.
For more information refer to Policies.
• Filtering sessions
Fudo Enterprise allows joining an ongoing session to work simultaneously with the remote user.
Note:
• Session joining feature is supported in SSH, RDP, VNC and Telnet (excluding 5250 and
3270) connections.
• In case of cluster configurations, joining session is only possible after logging into the
administration panel on the node that handles the given access session.
Related topics:
• Replaying sessions
• Sharing sessions
• Filtering sessions
• Supported protocols
3. Click Share.
4. Provide session availability time frame and click Confirm to generate URL.
Related topics:
• Replaying sessions
• Joining sessions
• Filtering sessions
Note: Click and drag either side of the tag to change the starting/ending time.
6. Add comment.
7. Click Submit.
Editing a comment
1. Select Management > Sessions.
2. Find desired session and click the playback icon to start playback.
3. Click Details.
4. Find and click desired comment.
Replying to a comment
1. Select Management > Sessions.
2. Find desired session and click the playback icon to start playback.
3. Click Details.
4. Find and click desired comment.
5. Click Reply.
6. Enter message and click Submit.
Related topics:
• Sensitive features
Data retention feature automatically deletes sessions after a specified time interval. Fudo allows
for excluding selected sessions from the retention mechanism.
Disabling retention
To disable retention for specified sessions, proceed as follows.
1. Select Management > Sessions.
2. Find and select desired sessions.
3. Click Retention.
4. Select Disable retention.
Note: Retention locked sessions are differentiated with the status icon.
Enabling retention
1. Select Management > Sessions.
2. Find and select desired sessions.
3. Click Retention.
4. Select Enable retention.
Fudo Enterprise allows converting stored session data to one of supported video formats.
To export a session, proceed as follows.
1. Select Management > Sessions.
2. Find desired session and click the session export icon.
Note: The output file format and the resolution determine conversion time and the size of the
output file.
4. Select the video resolution (not applicable to the text log file format).
Note: Autodetect option will export video in the native user’s screen resolution.
6. Find desired session and click the Download icon to download converted session material.
Related topics:
• Filtering sessions
• Sharing sessions
• Viewing sessions
• Joining sessions
Note: As the session’s files and recorded videos are located in the Management > Downloads
tab, when you remove a session, the system deletes also associated files, stored in the Down-
loads > Files. Recorded movies, stored in the Downloads > Sessions tab, remain and can be
downloaded anytime.
Note: Fudo Enterprise can automatically delete sessions after certain time, specified by the
retention parameter. Refer to the Backups and retention topic for more on data retention.
Related topics:
• Filtering sessions
• Sharing sessions
• Viewing sessions
• Exporting sessions
Recorded RDP, VNC and rendered HTTP sessions can be processed and indexed for full-text
search purposes.
Warning: OCR processing is CPU intensive and may have negative impact on system’s
performance. It is recommended to enable it only for those accounts, which require detailed
supervision.
5. Click Save.
Processing selected sessions
To process selected sessions, proceed as follows.
1. Select Management > Sessions.
2. Select desired sessions and click OCR.
Additionally to automated session data replication, Fudo Enterprise enables on-demand repli-
cation to Fudo Enterprise instances to which the given data is not replicated automatically.
1. Select Management > Sessions.
2. Click next to a session that you want to replicate.
3. Click Send session next to a specific cluster node to replicate session to selected Fudo
Enterprise instance
Related topics:
• Cluster configuration
• Sessions
Note: To timestamp sessions, first you have to enable and configure the timestamping feature.
Go to Settings > Timestamping and follow the instructions in the Trusted time-stamping section.
3. Click Confirm.
Note: Once the timestamping option is enabled, an additional column will appear on the
session list. Timestamped sessions are marked with an active clock icon . By clicking on it,
you can view detailed timestamp information and download the signature.
3. Click Confirm.
Related topics:
• Filtering sessions
• Accounts
In order to enable sending user requests, it’s necessary to have the Require approval option
checked in safe configuration.
Note: To receive email notifications about pending sessions, select Session awaiting approval
notification in safe configuration.
Approving user request is possible also via the Fudo Officer 1.0 application. Session await-
ing approval (push) notification should be enabled in order to see notifications about pending
requests.
Related topics:
• User authentication methods and modes
• Declining pending requests
• Sessions
• Fudo Officer 1.0
In order to enable sending user requests, it’s necessary to have the Require approval option
checked in safe configuration.
Note: To receive email notifications about pending sessions, select Session awaiting approval
notification in safe configuration.
Declining user request is possible also via the Fudo Officer 1.0 application. Session await-
ing approval (push) notification should be enabled in order to see notifications about pending
requests.
Note: Rejection reason is displayed on the session list after positioning cursor over the icon.
Note: User blocking reason will be the same as the entered session rejection reason.
5. Click Confirm.
Related topics:
• User authentication methods and modes
• Approving pending user requests
• Terminating connection
• Blocking a user
• Sessions
• Fudo Officer 1.0
Fudo Enterprise is able to detect changes in user behavior and determine if user credentials have
been compromised. It can also alert system administrator if there is an unusually high number
of connections or a particular session is longer than expected.
Content models process and analyze RDP and SSH sessions in order to build behavioral user
profiles. Based on these, Fudo Enterprise can detect even the slightest change in user behavior
and help prevent a security breach.
RDP content model
The RDP model is based on mouse cursor movements.
The following requirements must be met in order to produce an RDP model:
Minimum:
• 5 hours of sessions recordings per predictor,
• 5 unique predictors (e.g. users).
Optimal:
• 30 hours of sessions recordings,
• 10 unique predictors.
Note: RDP model’s quality depends on the consistency of how the user interacts with the
monitored system. If the user has used different operating systems and input devices (e.g.
different mice, a trackpad or a trackball) the resulting model will not be very effective as it will
have a higher tolerance for a variety of behaviors.
Fudo Enterprise analyzes sessions in real-time and produces threat level scores (OK, LOW,
HIGH ) depending on how the user fares against the trained model.
Note: Sessions are processed in chunks containing a specific number of events. Processing is
done in real-time as long as there are workers available. When there are no workers available,
ongoing sessions’ parts are not analyzed.
Models are calibrated individually and session scores are presented on the session list.
Icon Description
Session under analysis, initial result - no threat.
Session under analysis, initial result - medium threat level.
Session under analysis, initial result - high threat level.
Session awaiting analysis or being initially processed.
Session not analyzed due to missing a trained model.
Session processed - no risk.
Session processed - medium threat level.
Session processed - high threat level.
Session processed - no result.
Note: When it comes to building user models, data quality is essential. If users shared login
credentials, the resulting model will be less likely to detect the variance in user behavior.
Threat level popup contains information about individual Threat Probability for each model
that assessed the session. Threat probability is a percentage-wise value that reflects a threat
level of the session. The logic behind the different color icons is the following:
The icon is when Threat Probability is below 50%.
The icon is reflected when Threat Probability is above 50% but the underlying statistics of
a model indicate that it could cause a False Positive Rate over 5%. In such case a higher,
individual for each User and ML Model pair percentage threshold is derived while training to
obtain most optimal results.
The icon is when Threat Probability is above 50% and False Positive Rate would be lower
than 5%. If the False Positive Rate requirement can’t be met a higher threshold is used as
described above which the red circle is eventually used.
The Session threat probability graph displays threat probability scores for specific periods of the
session time (called segments), based on AI models prediction. A segment is a group of user’s
Note: A session should be long enough for running prediction algorithms. Minimum duration
of the session for launching the AI model analysis is 3 segments (around 1 minute).
The graph also contains a link to the specific period of the session (segment) in the player
which allows the administrator to check the session in real time and react accordingly. The
administrator is also able to analyze the results, delivered by the AI training models and take
actions for the future sessions by adjusting settings. For example, by adding a policy to be
notified when a certain threat probability threshold is reached.
Note: The upgrading process to the Fudo Enterprise 5.3 removes session scores that were
calculated for the sessions before the upgrade and introduces a new calculating algorithm. For
the sessions before the upgrade detailed data is not available.
Fudo keeps track of the number of sessions as well as their length. It can alert system adminis-
trator if there’s an unusually high number of connections or a particular session is suspiciously
long.
It does so by learning typical values for each user, account and server and making predictions
for every hour and weekday.
Related topics:
• Artificial Intelligence
• Sessions
• Frequently asked questions
• Policies
Reports
318
Fudo Enterprise 5.4 - System Documentation
Account access re- This report contains accounts and corresponding servers and safes
port which have been accessed in the given time period.
Safe access report This report contains safes and the corresponding servers accessed in
the given time period.
Server access report This report contains servers accessed in the specified time period in
combination with safes and accounts.
Session approvals by This report contains approved 4-Eyes sessions.
user
Session sharing in- This report contains shared sessions.
vites by user
Session summary This report provides information on sessions recorded in the given
time period.
Sessions by server re- This report provides a list of recorded sessions and the server details
port for the given time period.
User access report This report contains users in combination with servers they have ac-
cessed in the specified time period along with safes, listeners and
accounts that were used to access these servers.
User activity report This report shows data about user and his actions in administration
panel - creating, removing and changing data for objects.
User privilege report This report contains users and objects that they are allowed to edit.
User report This report contains users along with their role, status, creation date,
recent login and the entity that has created the given user instance.
Note: Periodic reports, generated upon specific user’s request, include only sessions, to which
given user has sufficient access rights.
319
Fudo Enterprise 5.4 - System Documentation
Note: The list contains system pre-defined options and user defined filtering definitions.
320
Fudo Enterprise 5.4 - System Documentation
3. Click the corresponding button to save the report in selected format - CSV, PDF or HTML.
Deleting reports
1. Select Management > Reports.
2. Find, select desired reports and click Delete.
Related topics:
• Notifications
• Filtering sessions
321
CHAPTER 21
Productivity
Fudo Enterprise features a productivity analysis component which tracks users’ activities and
can provide precise information on activity and idle times.
21.1 Overview
Note: Activity rating is based on the user’s interaction with the monitored system. Fudo
Enterprise divides the time into 60 seconds long time intervals and monitors the activity within
the interval. Lack of any actions in a given time period accounts such as a non-productive time.
322
Fudo Enterprise 5.4 - System Documentation
Related topics:
• Productivity analysis - Sessions analysis
• Productivity analysis - Comparison
• Sessions
Sessions analysis shows in detail users/organizations productivity in the given time period. The
activity threshold parameter allows identifying sessions, users and organisations which do not
exceed the required user activity rating and helps establishing the threshold value attainable for
a given number of users or sessions. Users activity rating
Users activity rating allows identifying sessions which do not exceed the required user activity
level. Further material analysis helps determining the reason for low activity in the given session
and draw relevant conclusions.
Note: The listing does not cover time periods longer than 31 days. In case the defined time
interval is longer than that, only data from the first 31 days is presented.
Related topics:
• Productivity analysis - Overview
• Productivity analysis - Comparison
Administration
22.1 System
System events registered by Fudo Enterprise (sessions, system log events, etc.) are timestamped.
Fudo Enterprise can obtain the time information either from an NTP server or the system clock.
Warning:
• It is strongly advised for the date and time settings to be obtained from a reliable NTP
server. Changing date and time settings manually may result in system malfunction.
• Date and time synchronization with NTP server is required in cluster configurations.
Note: Manual time setting is disabled if there are NTP servers configured.
326
Fudo Enterprise 5.4 - System Documentation
3. Click Save.
Time servers configuration
Note: NTP servers ensure that the system time on all IT infrastructure devices is synchronized.
Using NTP servers guarantees that the timestamp of the recorded session matches the time
settings on the monitored server.
4. Click Save.
5. Select Restart from user menu to reboot Fudo Enterprise and apply new time settings.
Note: After every change or removal of the NTP server definition, run Restart option.
Related topics:
• Timestamping
Note: Fudo requires using unencrypted keys to the certificate. In this case a user is not
obligated to input its password at every restart. Check how to decrypt a password protected
RSA private key.
SSH access option enables remote access to Fudo Enterprise for servicing and maintenance
purposes.
Note: The default port number for service access over SSH protocol is 65522.
Sensitive features is a set of options enabling which requires a consent from two superadmin
users.
Note: Keystrokes are not displayed in the session player by default. Enabling keystrokes
display requires a consent from two superadmin users.
2. Select Show keyboard input in the Sensitive features section to initiate the feature.
3. Select Enable logs data removal option.
• this option is combined with Retention settings, where you can specify when
logs data should be removed.
4. Click Save.
5. Notify another system administrator that the features mentioned above have been initiated
and require a confirmation.
Related topics:
• Viewing sessions
Note:
• The system update process does not influence the system configuration or the session data
stored on Fudo Enterprise.
• The storage usage may temporarily increase during system update.
Warning:
• If the upgrade package requires preparation, it is recommended to wait for the prepa-
ration process to finish. This will minimize the system’s downtime when performing
the actual upgrade.
• Before updating the system it is advised to run a preliminary check to ensure that the
current system configuration can be successfully upgraded to the new version.
• If the storage usage on the system being updated exceeds 85%, contact Fudo Enterprise
technical support before proceeding with upgrading the system.
• During the system update, all current users’ connections will be terminated. Use
the Deny new connections option in the User authentication and sessions section of
the system settings menu to limit the number of active connections before performing
system upgrade.
• After running system update, Fudo Enterprise will restart automatically. Connect the
USB flash drive containing the encryption key to the USB port before proceeding or
have the passphrase ready in case of virtual machine instance. Note that entering
incorrect passphrase will restart the machine in previous revision.
• In case of cluster configuration, upgrade slave node first and after successful upgrade,
move onto upgrading the master node.
• For clients who are upgrading from 4.x Fudo Enterprise versions, a new masterkey will
be generated during the upgrade. Users are encouraged to export and backup the newly
generated key. Refer to the Configuration encryption topic to find out more about the
system masterkey.
Note:
• Click Cancel check to stop the preliminary upgrade check.
• Click Download log to view the upgrade procedure log along with the information on how
long it will take to perform the upgrade.
Note:
• Upgrade preparation minimizes the system’s downtime when running the actual update.
• Click Stop to cancel upgrade preparation. Note that the current preparation stage must
complete, thus cancelling might take a while.
• Click Start to resume upgrade preparation.
Note: In case the upgrade requires preparation, the system upgrade can be performed once the
initial preparation stage is completed. Although it is recommended to wait for the preparation
process to finish. This will reduce the downtime when running the actual system upgrade.
Note: If you enabled the Deny new connections option before upgrading, make sure to disable
it after restarting the system.
In addition to the current system version, Fudo Enterprise stores the previous revision, allowing
for restoring the system to its previous state. In the event of an unsuccessful system update,
Fudo Enterprise detects the problem during system restart and restarts itself using the previous
system revision. It’s also possible to bring the previous version back to the system via the
Restart option from the options menu:
Warning: Rollback process will result in the loss of all sessions recorded on the new
system version and any system configuration changes. All the object configura-
tions that were created, changed or recorded between the current and the previous system
versions will be deleted. This includes the password changers activity. If any passwords
were changed during the newer version’s usage, restarting Fudo will lead to lost access to
corresponding systems.
If the active version is chosen in the modal, the system will be restarted as described at the
Restart page.
Deleting upgrade snapshot will free the storage space occupied by previous system version.
Warning: After deleting the upgrade snapshot it will not be possible to restore the system
to previous version.
22.1.7 License
4. Browse the file system to find the license file and click OK to upload and replace current
license definition.
Related topics:
• System
22.1.8 Hotfix
The Hotfix feature allows the administrator to upload a minor fix through the Fudo Admin
Panel. The fix package is delivered by the Fudo Support Team. No additional support work or
machine upgrade will be required.
The Hotfix package has Fudo Security HotFix extension (.fshf), and can be uploaded by the
administrator from the Hotfix tab:
The hotfixes cannot be removed or deinstalled as they disappear after the next upgrade.
Related topics:
• System update
• System
22.1.9 Diagnostics
System diagnostics module enables executing basic system command, such as ping, netcat or
traceroute.
To run a diagnostic utility, proceed as follows.
1. Select Settings > System.
2. Select the Diagnostics tab.
3. Find desired utility, provide necessary parameters and execute the command.
Command/parameter Description
ldapsearch LDAP search allows querying LDAP server for objects.
Host LDAP server IP address.
Login Login of the user allowed to browse the directory.
Password Password of the user allowed to browse the directory.
Domain Directory domain to query.
Filter Objects filtering parameter.
Attributes LDAP search attributes.
Related topics:
• Troubleshooting
The Master key enables encrypting sensitive configuration parameters, system backups and
external storage volumes. It also allows for recovering internal storage encryption key in case
the pen drives containing encryption key are lost or damaged.
Note:
• The Master key is exported to PEM format and it is encrypted with SMIME using ad-
ministrator’s public key/certificate.
• It is essential to have the Master key exported and stored in a safe location.
• In case the Master key has been compromised, you can invalidate it, which will result in
generating a new one and re-encrypting the data.
3. Click Choose file and browse the file system to find the certificate that will be used to
encrypt the Master key.
Note:
• Generate the keys and the CSR (Certificate Signing Request) using openssl :
openssl req -newkey rsa:4096 -keyout privkey.pem -out req.pem
openssl req -nodes -newkey rsa:4096 -keyout privkey.pem -out req.pem # Do not
prompt for a password.
• Sign the CSR:
openssl x509 -req -in req.pem -signkey privkey.pem -out cert.pem
In case the current Master key has been compromised, you can invalidate it. Invalidating the
current Master key generates a new one and triggers data re-encryption.
1. Select Settings > System.
2. In the Maintenance and supervision click Invalidate current key.
Note: Please remember that the functionality of the Default Domain option is closely related
to the Fudo Domain settings in the user specification.
• In case the default domain is specified and the user does not have a Fudo domain de-
fined, when logging in to Fudo Enterprise, the user can either include the domain (e.g.
john@domain) or leave it out (e.g. john).
• If there are two users with the same login, one of which has the Fudo domain configured
the same as the default domain, and the other does not have the Fudo domain defined,
then:
– If the user provides the domain during login, Fudo Enterprise will match
the user that has the domain explicitly specified.
– In case the user does not provide the domain during login, Fudo Enterprise
will match the user that does not have the domain explicitly specified.
– If the user, which has the Fudo domain configured the same as the default
domain, will try to login without providing the domain, Fudo Enterprise
will report authentication error.
Defining default domain
1. Select Settings > System.
2. In the User authentication and sessions section, provide the default domain.
3. Click Save.
Related topics:
• Creating a user
• Users synchronization
Fudo Enterprise enables the definition of static password complexity, allowing you to enforce
passwords that meet your internal regulations.
Defining password complexity
1. Select Settings > System.
2. In the User authentication and sessions section, select Authentication failures to set a
counter of the login failures.
3. Define the minimum number of characters.
4. Select Small letters and provide the minimal number of small letters in the password.
5. Select Capital letters and provide the minimal number of capital letters in the password.
6. Select Special characters and provide the minimal number of special characters in the
password.
7. Select Digits and provide the minimal number of digits in the password.
8. Select the Different password than current option to enforce a password different from the
current one.
9. Click Save.
Note: To enable static password complexity for a particular user, go to Management > Users,
edit desired user and select the Enforce static password complexity option in the Authentication
section.
Enabling password complexity will trigger password change for users with the Enforce static
password complexity option enabled whose passwords do not comply with the complexity set-
tings. The password will have to be changed upon logging into the Access Gateway.
Related topics:
• Creating a user
• Users synchronization
Single Sign On allows to automatically authenticate the user when logging into the system. Fudo
Enterprise allows to set the Single Sign On functionality for both Admin Panel and User Portal
(Access Gateway).
Warning: Single Sign On in Admin Panel is available to set for a user with superadmin
role only, and can be used by the users with operator, admin and superadmin roles.
In order to define SSO service parameters in system settings, follow the steps:
• Select Settings > System.
• In the Management SSO settings section, provide service identifier that will
match the user account with the service instance.
• Upload the keytab file containing admin’s ID and encryption keys for encrypting
and decrypting Kerberos tickets.
• Click Save.
In order to define SSO service parameters in system settings, follow the steps:
• Select Settings > System.
• In the User portal SSO settings section, provide service identifier that will match
the user account with the service instance.
• Upload the keytab file containing user’s ID and encryption keys for encrypting
and decrypting Kerberos tickets.
• Click Save.
1. Add user account, which will be used by the User Portal or Admin Panel to communicate
with the yourdomain.local domain.
Note: When adding the account, enable the Password does not expire option.
2. On the DNS server add forward and reverse DNS entries for hostname.yourdomain.local.
3. Create a Kerberos ticket for Fudo Enterprise running the following command in the Pow-
ershell or CMD console:
ktpass -princ HTTP/[email protected] -mapuser
sso\username -pass password. - ptype KRB5_NT_PRINCIPAL -out hostname.yourdomain.
local.keytab
Active cluster node option determines the Fudo Enterprise instance responsible for changing
passwords on monitored systems.
1. Select Settings > System.
2. In the Password changers section, select the node delegated to password changing.
3. Click Save.
Note: In case the node responsible for changing passwords fails, the task will not be automat-
ically picked up by another Fudo Enterprise instance. In order to restore automatic password
changing, the system administrator will have to change the active password changing node or
bring back the failed node.
Fudo Enterprise allows changing a password on a different node than the one that set as an Active
cluster node for Password changers. In order to have this configured, the following condition
should be met:
Setting up a Password Changer / Password Verifier for an account, a value for
transport_bind_ip variable should indicate the same cluster node for all password changers as
well as password verifiers.
If the transport_bind_ip variable values indicate different cluster nodes, the configured pass-
word changer/verifier will be running on a node that set as an Active cluster node for Password
changers.
Related topics:
• Password changers
• Custom password changers
• Creating a regular account
Defining IP address
Defined IP addresses are physical interface’s aliases, which are used in server’s configuration
procedures (Local address field in proxy configuration).
Note: If the list of the assigned IP addresses is empty and the is no option to define an IP
address, check if given interface is a member of a bridge.
Note: + will be inactive if the DHCP option is enabled on the given interface.
Enable access to administration panel on given IP address. Note that the management
IP address is also used for replicating data between cluster nodes as well as service
access over SSH protocol .
Note: The default port number for service access over SSH protocol is 65522.
Make the alias a virtual IP address which will be take over by another cluster node
in case of the master node’s failure.
Note: Cluster IP address must be added manually on every cluster node, with the
option enabled.
4. Select the redundancy group that the IP address will be assigned to (applicable to virtual
IP addresses).
Note: Redundancy groups are defined in the Cluster view in the Redundancy groups tab. For
more information refer to the Redundancy groups topic.
5. Click Save.
Warning: Deleting an IP address will disable access to servers which had this IP configured
in the Local address of the proxy server.
3. Click Save.
In case the web administration interface cannot be accessed, IP address can be defined using
console connection.
1. Connect monitor and keyboard to the device.
2. Enter administrator account login and press Enter.
6. Enter the name of the new management interface (Fudo Enterprise web interface is acces-
sible through the management interface).
7. Enter IP address along with the network subnet mask separated with / (e.g. 10.0.0.8/24)
and press Enter.
Note: Setting up a network bridge requires removing all IP addresses directly assigned to
interfaces which are selected as bridge members.
Note: The IP addresses are aliases to the physical interface and are used in servers configura-
tion as proxy server address.
Link aggregation enables combining a number of network interfaces for improved transfer rates
and implementation of failover scenarios in which the services remain available in case of a
network switch failure.
To configure a network link aggregation, proceed as follows.
1. Select Settings > Network configuration.
2. Click Link aggregation.
3. Assign network interfaces.
Note: Setting up a network bridge requires removing all IP addresses directly assigned to
interfaces which are selected as bridge members.
Enable access to administration panel on given IP address. Note that the management
IP address is also used for replicating data between cluster nodes.
Make the alias a virtual IP address which will be take over by another cluster node
in case of the master node’s failure.
6. Click Save.
Related topics:
• Servers management
• Accounts
IP address labels are global configuration parameters. They are replicated throughout cluster’s
nodes, but their assignment is strictly local, applicable to each node separately. Labels enable
ensuring constant access to LDAP authentication services in case of a node failure and allow for
implementing load balancing scenarios.
Defining a labeled IP address
1. Select Settings > Network configuration.
2. Select the IP labels tab.
3. Click .
4. Provide IP address and enter label name.
Note: Label name can comprise small letters, digits, _ and - characters.
5. Click Save.
6. Use labeled IP address in listener, server or external authentication source configuration.
Related topics:
• Network interfaces configuration
• Authentication
• Servers
• Listeners
In default configuration, Fudo Enterprise directs all incoming traffic to defined gate. Static
routing enables defining routes for packets coming from selected networks.
Note: When defining default route, enter default in the Network field.
Adding a route
To add a route, proceed as follows. There are 7 routing tables available for configuration, with
multiple routes.
1. Select Settings > Network configuration.
2. Select Routing tab.
3. Click Add route to define a new route.
4. Enter network address along with the network mask (e.g. 10.0.1.1/32) and gateway
address.
5. Click Save.
Editing a route
To edit a route, proceed as follows.
1. Select Settings > Network configuration.
2. Select Routing tab.
3. Find and edit desired route entry.
4. Click Save.
Deleting a route
To delete a route, proceed as follows.
1. Select Settings > Network configuration.
2. Select Routing tab.
Note: DNS servers enable using mnemonic hosts names instead of IP addresses when config-
uring various network resources.
Note:
• To define more than one value, enter desired values separated by space character. E.g.
tech.whl wheel.com
• Protocol implementation enables defining up to six domain search paths.
4. Click Save.
Adding a DNS server definition
To add a DNS server definition, proceed as follows.
1. Select Settings > Network configuration.
2. Switch to the Name & DNS tab.
3. Click Add new to define new DNS server.
4. Enter DNS server IP address.
5. Click Save.
Editing a DNS server definition
To edit DNS server definition, proceed as follows.
1. Select Settings > Network configuration.
2. Switch to the Name & DNS tab.
3. Find given DNS server and double-click desired field.
4. Change parameter value as needed.
5. Click Save.
Deleting a DNS server definition
To delete a DNS server definition, proceed as follows.
Note: Deleting a DNS server definition may cause interruptions in device operation, if system
configuration uses hosts names instead of IP addresses.
Note: Adding an entry to ARP table can resolve network communication issues.
Note: Deleting an ARP table entry may cause system malfunction due to network communi-
cation issues.
22.3 Notifications
Note:
• Notifications can be received by users with operator, admin or superadmin roles.
• To receive notifications, login to Fudo Enterprise administration panel and select desired
notifications in the Safe’s configuration within Granted users tab. You need to do this
with each granted user that should receive the notification.
Note: Fudo host address is an address to manage notifications from Fudo. Its variable is
required for correct configuration of the Session awaiting approval notifications. The variable is
responsible for creating a link that will be sent to the user via e-mail for accepting the session.
4. Enter configuration parameters for the Primary SMTP server and optionally for the Sec-
ondary SMTP server.
Parameter Description
Host SMTP server address, e.g. smtp.gmail.com.
Port SMTP service port number.
Bind address SMTP server IP address or interface address.
Sender email Email address from which the emails will be
sent.
Recipient The recipient of the test message.
Requires authentication Select if the SMTP server requires authenti-
cation.
User User name for authentication on SMTP
server.
Password User password for authentication on SMTP
server.
Use secure connection Select if the mail server uses TLS protocol.
(TLS ) Additionally, select Use STARTTLS option
to enable a secure connection.
Note: Click Test connection to make sure server parameters are correct.
5. Click to upload a CA certificate. Choose the value to show in SHA1 or MD5 format.
6. Click Save.
The Undelivered messages sub-tab shows a list of the notifications that weren’t delivered to
the receiver. This helps the users to diagnose the issue and fix it for the future events. The
messages here can be deleted.
Related Topics:
• Accounts
Fudo Enterprise allows configuring model trainers and behavioral analysis models with custom
settings so that it precisely analyses your users’ behavior, detects unusual actions and marks
sessions as suspicious so that you can quickly react.
Fudo Enterprise’s AI module is a multicomponent system that needs to be set first to properly
work and deliver the best results. There are 3 things to do to use AI module as effective as
possible:
1. Configure model trainers, as described in the following section.
2. Enable AI models so that they run the behavioral analysis based on selected protocols
(SSH and/or RDP), and deliver individual statistics per model.
3. Set session Policies so that AI module can detect specific user’s behavior during a session,
react automatically, and send messages and SNMP TRAP notifications about the current
situation.
When those steps are done, you can observe:
• amount of suspicious sessions for the given period of time on the Dashboard within the
Suspicious sessions widget. The widget also provides an URL to the filtered Sessions list
with Threat level: High criteria set.
• threat levels and Threat Probability of the ongoing sessions within a graph that can redirect
to the suspicious session segment in the player.
Training models requires processing power. Proper system configuration enables optimal pro-
cessing of archived sessions while preserving overall system responsiveness in handling current
user requests.
To change models trainers configuration, proceed as follows.
1. Select Settings > Artificial Intelligence > General.
2. In the Model trainer section, in the Max number of training instances field, define the
number of processes delegated to constructing user profiles.
Note: Default value is the optimal value based on available hardware resources. The actual
number of processes cannot be higher than the number of available CPU cores.
3. From the Active cluster node dropdown list, select the node responsible for training models.
4. Select weekdays when the training will take place.
5. Set the training start time.
6. Define the timespan of the data which will be processed to create models.
7. In the Quantitive model parameters section, in the Tolerance field, define allowed delta
regarding the number of connections or the length of a single session.
Note: This parameter is used to calculate the threat risk which triggers the alert. Tolerance
value is deducted from the current connections number or the number of minutes of elapsed
session time. E.g. if the expected number of connections is 100, the current connection number
is 109 and the tolerance value is set to 10, alarm will not be triggered as the calculated value
(99) is less than the expected value.
8. In the Report threshold field, define the allowed deviation from the expected results.
Note: Report threshold is defined in % and it determines the threshold value when the alert
gets triggered on the account of too many sessions or a single connection lasting longer than
expected. E.g. with the report threshold set to 1%, the alert will be triggered if the current
number of connections has been observed before in 1% of cases.
9. In the Session analysis section, in the Number of analyzing instances, define the number
of processes delegated to session analysis.
10. Select the threat level from the Score logging drop-down list to define what type of events
will be registered within the system log.
Note: In case the pool of available data processing processes has been exhausted, online
analysis is suspended. After the session is finished the data is picked up by the session analysis
processes.
Configuration parameters enable fine tuning behavioral models to match the specifics of your
IT environment.
Note: As of Fudo Enterprise 5.3 release, the AI module has been modified.
Warning:
• The upgrade script to the Fudo Enterprise 5.3 version or later disables all AI models
and adds new models during the upgrading process. When the process is finished, all
AI models need to be manually enabled in the Settings > Artificial Intelligence tab.
• If you have cluster configuration, it is required to update the active models on the
master node first.
There are 3 AI models that Fudo Enterprise has for the training and prediction process. They
are protocol-based, thus the models are focused on the activities that the protocols provide:
Mouse biometric Model (RDP) - AI prediction model based on mouse movements and
clicks. It works by deriving a set of over 700 distinct features associated with the way a user
operates a pointing device. Those features are used to train the model which is individually
calibrated for each user to obtain the best possible predictive value whilst minimizing the False
Positive Rate.
Keyboard biometric Model (RDP) - AI prediction model based on keyboard typing dynam-
ics. It works by deriving a set of over a 100 unique features associated with the way a user types
on the keyboard. Those features are used to train the model which is individually calibrated for
each user to obtain the best possible predictive value whilst minimizing the False Positive Rate.
Semantic Behavioral Model (SSH) model is based on the keyboard input (commands). It
works by identifying individual preferences of people to achieve the same results in different
ways. For example one person prefers to use wget over curl and vim over emacs, another person
might use a reset command to clear the terminal while someone else might have a preference
for using CTRL+L combination. Those features are not static but learned from the training data.
Additionally a set of over 600 features for different groups of characters is derived. Those features
are combined with preferences and used to train the model which is individually calibrated for
each user to obtain the best possible predictive value whilst minimizing the False Positive Rate.
For each AI model Fudo Enterprise shows training statistics, such as:
Time spent for the last building - duration of the last building.
Amount of session segments used - number of the session segments that were used for the
last building.
Entities covered - how many users were participating in the last training session.
True Positive Rate (TPR), sometimes called Recall - is a percentage of malicious sessions
properly flagged by the model as suspicious (the higher the better).
False Positive Rate (FPR) is the percentage of legitimate sessions inappropriately identified
as malicious (the lower the better).
Area Under ROC curve (AUROC) is a single metric representing model quality (the higher
the better).
Statistics of the TPR, FPR and AUROC values are visualized in the colored bar.
Note: Model statistics appear after the model’s first training and are updated after each of
the performed training.
Related topics:
• Sessions
• AI sessions processing
• Policies
Note: To ensure the generation of a RAW dump, set the Session recording option in Account
settings to all or raw (refer to the Creating a regular account section to see the example).
Note: Fudo Enterprise will time-stamp only sessions that have been completed after the
time-stamping feature was enabled.
Note: You should receive these information from your time-stamping service provider.
5. Click Save.
Related topics:
• Security measures
Fudo Enterprise allows authenticating with certificate, complied with PIV standards.
In order to configure authentication method Certificate, proceed as follows:
1. Select Settings > System
2. In the General tab, under the User CA certificates section upload a file with CA certifi-
cate(s) in PEM format.
Note: Fudo Enterprise supports a multiple-domain configuration. For such configuration, the
administrator has to upload a PEM file that consists of root/intermediate certificates from all
the CAs. The Subject field should be unique for each user.
3. Click Save.
4. Go to Management > Users and edit the user, for whom you want to set authentication
method Certificate, or create a new user by selecting Management > Users and then
clicking + Add user.
5. In the Authentication section select Certificate type from the Add authentication method
drop-down list.
Note: The subject must comply with the RFC 2253 or RFC 4514 requirements.
22.7 Authentication
Fudo Enterprise has a broad spectrum of authentication methods for user’s authentication
against the target server. Those are:
• External authentication:
– CERB ,
– RADIUS ,
– LDAP ,
– Active Directory,
• OATH ,
• SMS ,
• DUO,
• OpenID Connect.
Mentioned authentication methods require defining connections to the external authentication
servers.
To add an external CERB, Radius, Active Directory or LDAP authentication server, proceed as
follows.
1. Select Settings > Authentication.
2. Click + Add an external authentication source.
3. Select authentication service type: CERB, Radius, Active Directory or LDAP.
4. Provide configuration parameters depending on selected external authentication system
type.
5. Click Save.
Parameter Description
CERB
Host Server’s IP address.
Port Port used to establish connections with given server.
Bind address IP address used for sending requests to given host.
Service CERB service used for authenticating Fudo Enterprise users.
Secret Secret used to establish server connection.
Second factor Additional verification step with authentication methods OATH, SMS
or DUO.
RADIUS
Host Server’s IP address.
Port Port used to establish connections with given server.
Bind address IP address used for sending requests to given host.
NAS ID RADIUS server NAS-Identifier parameter.
Secret Secret used to establish server connection.
Repeat secret Repeat secret used to establish server connection.
Second factor Additional verification step with authentication methods OATH, SMS
or DUO.
LDAP
Host Server’s IP address.
Port Port used to establish connections with given server.
Bind address IP address used for sending requests to given host.
Bind DN Template containing a path which will be used to create queries to
LDAP server.
Encrypted connec- This option is required to be checked for the domain users who change
tion their passwords in the Access Gateway.
Server certificate LDAP server certificate.
Second factor Additional verification step with authentication methods OATH, SMS
or DUO.
Active Directory
Host Server’s IP address.
Port Port used to establish connections with given server.
Bind address IP address used for sending requests to given host.
Active Directory do- Domain which will be used for authenticating users in Active Direc-
main tory.
Continued on next page
Warning: When additional authentication method (OATH, SMS or DUO) is selected as a Sec-
ond factor for synchronization with External authentication server (AD / LDAP / CERB
/ RADIUS), it won’t be enough to just select one of the External authentication server
source within the User definition. The additionally selected authentication method should
be configured within the User definition as a primary authentication method. Then users’
authentication methods will be automatically synchronized according to External authenti-
cation server settings.
Note: Please note that when configuring Radius authentication within Fudo Enterprise,
only the Password Authentication Protocol (PAP) is supported. It’s important to ensure
that your Radius server is configured to accept PAP requests to guarantee compatibility and
successful authentication with Fudo Enterprise.
Note:
• The Active Directory external authentication method uses the Kerberos protocol as the
first step.
• This functionality is enabled by default.
• To disable the Kerberos authentication option globally, select Settings > System, go to User
authentication and sessions section and deselect Kerberos authentication enabled option.
• If enabled, Kerberos is used in RDP sessions authentication against the server and the
Active Directory external authentication method.
Note: In case of cluster configuration, select a labeled IP address from the Bind address
drop-down list and make sure that other nodes have IP addresses assigned to this label. For
more information refer to the Labeled IP addresses topic.
Note: The values for Account ID, Product token and API address are given by CM.COM
service. You need to have a registered account there to be able to obtain the required information.
• In the Settings tab, under the Authentication section choose SMS type from the Add au-
thentication method drop-down list.
5. Input from the personal Duo Security profile: API address, Integration key and Secret key.
6. Select the Bind address.
7. Click Save.
Configure DUO authentication method for the User:
8. Go to Management > Users.
9. Find and select the user for whom you want to enable DUO authentication.
• In the Settings tab, under the Authentication section choose DUO type from the Add au-
thentication method drop-down list.
This authentication method is configured globally and is not tied to any particular user. Thus
even if a user has no authentication methods configured, they can authenticate using OpenID
Connect in Access Gateway and Admin Panel.
Follow the steps to configure the OpenID Connect authentication method:
1. Select Settings > Authentication.
2. Choose OpenID Connect authentication tab.
3. Click Add an external authentication source.
4. Check the Enabled option to globally enable OpenID Connect authentication.
5. Provide Name (Azure, Okta or any other Identity Provider).
6. Input Configuration URL.
Note: This URL is specific for every Identity Provider and allows identifying one for correct
configuration. Example of Configuration URL for Google: https://accounts.google.com/.
well-known/openid-configuration.
7. Provide Client ID, Client secret. Those values are available after the registration on se-
lected provider.
8. Add Username mapping and Email mapping. Those fields are useful when user’s name
has different naming convention.
9. Provide Bind address.
Related topics:
• User authentication methods and modes
• OpenID Connect authentication definition with Azure
• System overview
• Integration with CERB server
Fudo Enterprise supports external passwords repositories for managing passwords to monitored
servers.
• Click Save.
Editing a passwords repository
To edit a passwords repository definition, proceed as follows.
1. Select Settings > External passwords repositories.
2. Find the repository definition and change its configuration as desired.
3. Click Save.
Deleting a passwords repository
To delete a passwords repository definition, proceed as follows.
1. Select Settings > External passwords repositories.
2. Find desired repository definition and select the Delete option.
3. Click Save.
Note: You cannot delete password repository definition if it is assigned to any account.
Related topics:
• User authentication methods and modes
• System overview
• Integration with CERB server
Note: The search for a given server/account is performed based on the following attributes
from the CyberArk Credential Provider, which must be set up according to the rules below:
• Address - has to match exactly with Fudo server’s IP address (required),
• UserName - has to match exactly with Fudo account’s Login (required) - please refer to
Creating a regular account topic,
• Safe - has to match exactly with external password repository Safe field (optional).
8. When used client certificate authentication Identity certificate and Identity key fields has
to be defined.
Note: Identity certificate and Identity key fields must be filled using PKCS #8 format. To
learn how to generate Identity certificate and Identity key please follow the next section.
9. If HTTPS URL to the passwords server’s API was used, provide HTTPS server certificate
in SSL certificate field.
Warning: If the HTTPS protocol is used without providing an SSL Certificate, the SSL
connection will not undergo verification and will be accepted.
• From the External passwords repository select one of the previously defined
password repository.
• Click Save.
Generating ‘CyberArk Credential Provider’s‘ client certificate authorization
1. Generate random Serial Number (e.g. 11223344556677) that will be used by CyberArk to
verify the client.
2. Generate client.key and client.crt files using openssl. Example:
openssl req -new -newkey rsa:2048 -days 365 -nodes -x509 -subj "/C=PL/ST=Mazowieckie/
˓→L=Warsaw/OU=MyApp/CN=client" -set_serial "11223344556677" -keyout client.key -out␣
˓→client.crt
Note: You cannot delete password repository definition if it is assigned to any account.
Related topics:
• User authentication methods and modes
• System overview
• Integration with CERB server
Note: Specify HTTPS protocol within the URL so that communication with the server is
encrypted.
• Click Save.
Editing a passwords repository
To edit a passwords repository definition, proceed as follows.
1. Select Settings > External passwords repositories.
2. Find the repository definition and change its configuration as desired.
3. Click Save.
Deleting a passwords repository
To delete a passwords repository definition, proceed as follows.
Note: You cannot delete password repository definition if it is assigned to any account.
Related topics:
• User authentication methods and modes
• System overview
• Integration with CERB server
Note: In order to add LAPS password repository in Fudo Enterprise you have to provide
following AD/LDAP parameters:
• URL to AD/LDAP server, e.g., ldaps://10.10.1.1:636/,
• Base DN to AD/LDAP server, e.g., dc=company,dc=com,
• Login and password to AD/LDAP server, e.g., cn=admin,dc=company,dc=com,
• CA Certificate to validate SSL connection to AD/LDAP server.
Warning: If the LDAPS protocol is used without providing an SSL Certificate, the SSL
connection will not undergo verification and will be accepted.
• Click Save.
Note: The search for a given server/account is performed based on the following attributes
from the LAPS, which must be set up according to the rules below:
• dNSHostName - server name - has to match exactly with Fudo server’s unique name specified
when creating the server (refer to Creating a TCP server section),
• sAMAccountName - login name in that server - has to match exactly with account’s Login
from Credentials section (refer to Creating a regular account section).
Note: You cannot delete password repository definition if it is assigned to any account.
Related topics:
• User authentication methods and modes
• System overview
• Integration with CERB server
Related topics:
• User authentication methods and modes
• System overview
• Integration with CERB server
22.9 Resources
Fudo Enterprise enables customizing RDP, SSH and VNC login screen.
5. Click Save.
SSH login screen customization
1. Select Settings > Resources.
2. Select the Protocols tab.
3. In the SSH section, input Global announcement text as a message to be appeared on login
screen.
4. Click Save.
VNC login screen customization
1. Select Settings > Resources.
2. Select the Protocols tab.
3. In the VNC section, click Choose File button and select desired image.
5. Click Save.
Related topics:
• Quickstart - RDP
Fudo Enterprise enables customizing information displayed on the User portal login screen.
1. Select Settings > Resources.
2. Select the User portal tab.
3. In the User Portal login screen logo section, click Choose file, browse the file system and
select a custom logo for the User portal login screen.
7. Provide information in the Resource in use message field. This information will be dis-
played to the user in the User Portal (Access Gateway) when trying to connect to the
target server, another user will be already connected to that server via the same account.
Note: You can customize this message by including variables (organization, phone, name,
full_name, or email. ), enclosed in double %% symbols. E.g., %%email%%.
Warning: Resource in use feature is available for RDP connections only and can be
configured while Creating an RDP server by checking the Inform about existing connection
option.
8. Click Save.
Related topics:
• User Portal (Access Gateway)
In the case there is a problem with the current system revision, it is possible to restore the
system to its previous version.
Warning: Restoring the system to the previous version will bring back the system’s state
prior the update. Session data and configuration changes in the current system revision
will be lost. This includes the password changers activity. If any passwords were changed
during the newer version’s usage, restarting Fudo will lead to lost access to corresponding
systems.
3. Select the previous system revision to be loaded after restarting the system.
4. Click Confirm to proceed with restarting the system to the selected revision.
Warning: Restrating the system will terminate all current users’ connections.
Related topics:
• System initiation
• System update
Note:
• System restart requires USB flash drive with the encryption key connected to the device.
• Restarting the system will terminate all current users’ connections.
• Use the Deny new connections option in the Sessions section in the system settings menu.
1. Connect one of the USB flash drives containing the encryption key.
2. Select Restart from user options menu.
3. Select the previous system revision to be loaded after restarting the system.
Warning: Restoring the system to the previous version will bring back the system’s state
prior the update. Session data and configuration changes in the current system revision
will be lost. This includes the password changers activity. If any passwords were changed
during the newer version’s usage, restarting Fudo will lead to lost access to corresponding
systems.
4. Click Confirm to proceed with restarting the system to the selected revision.
Related topics:
• System initiation
• System version restore
22.12 SNMP
Note: SNMP configuration is available only for user with the Service role.
Note:
• SNMP user password must be at least eight characters long.
• SNMP service authenticates the service account using the first defined password.
11. Go to the More tab, and in the SNMP field, click Enabled option to use SNMP.
12. Select SHA or MD5 from the Authentication method drop-down list.
13. Select AES or DES from the Encryption method drop-down list.
14. Click Save.
Note: SNMP configuration is available only for user with the Service role.
Note:
• SNMP user password must be at least eight characters long.
• SNMP service authenticates the service account using the first defined password.
7. Go to the More tab, and in the SNMP field, click Enabled option to use SNMP.
8. Select SHA or MD5 from the Authentication method drop-down list.
9. Select AES or DES from the Encryption method drop-down list.
10. Click Save or Save and close.
11. Go to Settings > System
12. Scroll down to the Maintenance and supervision section and select the SNMPv3 TRAP
option.
13. Configure the SNMPv3 TRAP Server address and Port
14. Select previously created user.
15. Click Save.
As Fudo Enterprise uses SNMPv3 for sending TRAPs, the manager software (such as snmptrapd
from Net-SNMP ) has to know the user’s name and password.
Overview
Extensions enable monitoring the number of active sessions, ZFS status, PSU status (if avail-
able), CPU temperature on all cores, S.M.A.R.T status such as temperature, health or reallo-
cated sectors.
MIB specification file
MIB specification files (Fudo Security Common MIB and Fudo Security PAM MIB) are available
for downloading at the Settings > System in the Maintenance and supervision section:
Related topics:
• Security measures
• Troubleshooting
• Policies
Fudo allows configuring multiple backup target destinations, where data can be stored. Each
backup target can have S3, Backblaze, FTP, or SFTP as a destination place.
To enable automated backups service, proceed as follows.
1. Select Settings > Backup and retention.
2. Select Backup enabled option. Please note that in case of the configured cluster, this option
enables backup for the current node only.
3. Click +Add target in order to add your future backup target place.
4. Set a name for your backup target.
5. Select a type: S3, Backblaze, FTP or SFTP.
6. Provide additional data depending on the selected connection type:
• With S3 type chosen, provide additionally: Bucket, Directory, Access key, Secret Access
key, Region and Endpoint.
• Configuring a Backblaze backup target, provide: Bucket, Directory and credentials, such
as Account and Key.
• For FTP type backup target provide: Directory, Server address and credentials, such as
Username and Password.
• For SFTP type backup target provide: Directory, Server address, Username, User private
key, Server public key and Port number.
7. Click Save.
Now, the configured Backup target can be added to the Safe settings to enable automatic storing
the sessions and safe data in the defined target place.
Sessions data that was sent to the backup target place is assigned with the respective icon on
the Sessions list.
If the session has its backup version stored outside of Fudo Enterprise, it can be downloaded
from the backup place to the Fudo Enterprise local instance with the Restore option.
Related topics:
• Exporting/importing system configuration
• Security measures
• Creating a new safe
Fudo Enterprise supports two data retention scenarios depending on the availability of external
storage:
• Two-steps retention: Initially, data is transferred from the internal storage to external
storage connected via a fiber channel interface. After defined time period session data
is automatically deleted.
• One-step retention: If external storage is not used, sessions will be immediately deleted
from Fudo Enterprise.
For more information on configuring the external storage, see the External storage chapter.
Note: Sessions which have been exported and the content is still available for download, will
not be deleted automatically. These sessions must be either deleted manually or you must delete
the exported material in the Downloads section for the retention mechanism to delete those
session.
Warning: The following feature will have impact after enabling logs data removal. Go to
Settings > System to check Enable logs data removal option in the Sensitive features and
system security section.
7. Click Save.
Overwriting the global value of the data retention for accounts
It is possible to overwrite the value of the data retention parameter for the selected account. To
specify the value of the data retention parameter in the account settings, proceed as follows.
1. Select Management > Accounts.
2. Find and click desired object’s name to open its configuration page.
3. In the Data retention section, define automatic data removal settings.
• Select Override global retention settings option to set other than global retention
values for connections established using this account.
• Check the Delete session data option to exclude sessions from retention mechanism.
• Next to the Delete session data field, define the number of days after which the session
data will moved to external storage device. Default value when the option is checked,
is 30 days.
4. Click Save.
Note:
• Defining the retention parameter value in the account settings will not activate data reten-
tion itself. Data retention has to be enabled globally (from the menu Settings > Backup
and retention > Retention).
• Global retention parameter values have lower priority than the values set in the accounts.
• Global retention settings are replicated within the cluster configuration. Please note that
Remove session data after variable is not replicated within the cluster but is set per node.
• Security measures
• Exporting/importing system configuration
• Creating a new safe
Fudo Enterprise enables storing session data on external storage devices connected to Fudo
through a fiber channel interface.
3. In the External storage devices section, select desired WWN object and click the
icon.
Note: Click the icon to refresh the list of available storage devices.
After resizing the WWN object, it must be expanded in Fudo Enterprise in order to take ad-
vantage of the additional storage space.
Warning: The storage device cannot be down-sized after it has been expanded.
Fudo Enterprise enables exporting current system state, defined objects and configuration set-
tings, which later can be used to initiate the system.
Note: Configuration export and import options are available only for the superadmin users.
Warning: Importing a configuration file and initiating system with imported data will
delete all existing session data.
Fudo Enterprise cluster ensures uninterrupted access to servers in case of cluster node failure as
well as enables implementing static load balancing scenarios.
Warning:
• Cluster configuration does not facilitate data backup. If session data is deleted on one
of the cluster nodes, it is also deleted from other nodes.
• Data model objects: safes, users, servers, accounts and listeners are replicated within
the cluster and object instances must not be added on each node. In case the replication
mechanism fails to copy objects to other nodes, contact technical support department.
Data replication between cluster nodes is highly customizable. The administrator can choose
the node that the data will be replicated to as well as which data (data model objects/session
data) is replicated.
In case of a node failure, user access requests will be picked up by another cluster node, deter-
mined by the redundancy group priority.
Current session data is replicated to other nodes while the connection is still ongoing.
If the node that fails was recording sessions, those sessions will be terminated. . .
A part of the session data from the node that malfunctioned, which has synchronized, can be
accessed on the other nodes, but the session will be fully accessible once the node becomes
operational and session data is synchronized between cluster nodes.
Session replication status can be verified by clicking the icon on the sessions list.
Warning: In cluster configuration all cluster nodes must have NTP server configured .
Note: Cluster communication address must have the management option enabled in the
network configuration.
5. Click Submit.
Note: Message concerning cluster key can be ignored when initiating cluster.
Related topics:
• Adding cluster nodes
• Editing cluster nodes
• Deleting cluster nodes
• Redundancy groups
• Cluster configuration
Warning:
• Session and configuration data (servers, users, safes, accounts, listeners, external au-
thentication servers) of the joining node are deleted and initiated with data replicated
from the cluster.
• Data model objects: safes, users, servers, accounts and listeners are replicated within
the cluster and object instances must not be added on each node. In case the replication
mechanism fails to copy objects to other nodes, contact technical support department.
Note: Management option has to be enabled on given network interface. Refer to Network
settings: Network interfaces configuration for details on configuring network interfaces.
10. Select OCR option to delegate OCR processing in case they cannot be processed locally.
Note: Each Fudo Enterprise instance has a defined number of resources dedicated to OCR
processing. If the OCR option is selected, excess of sessions that cannot processed locally at the
moment, is forwarded for processing to selected node.
Note: To view session replication status, go to sessions list and click the icon.
Related topics:
• Editing cluster nodes
• Deleting cluster nodes
• Security: Cluster configuration
Warning:
• Removing a node and re-adding it to a cluster may result in data loss.
• After removing a node, you will no longer be able to delete session data recorded by
this node and replicated to other nodes.
Redundancy groups ensure high system availability. If a master node fails, IP addresses assigned
to the redundancy group will be automatically picked up by another node with the highest prior-
ity assigned to this group. Assigning different priorities to different redundancy groups enables
implementing static load balancing scenario while fully preserving high availability features.
Note: Redundancy groups configuration options are available only after initializing the cluster.
Parameter Description
Name Descriptive name of the redundancy group.
ID Redundancy groups identifier (1-255).
Priority Redundancy group priority (0-254), the lower the number the higher the
priority.
Redundancy group with higher priority assumes the master role and
handles all requests to monitored servers accessed through IP addresses
assigned to this group. In case given cluster node crashes, user requests
are directed to on of the remaining nodes with the highest priority defined
for given redundancy group.
Interlink interface Network interface used for monitoring the state of the given redundancy
group. The master node broadcasts keep-alive packets in the 2nd net-
working layer informing other nodes that it is up and running while other
cluster nodes use the interlink interface to listen for those packets.
Note: By default, once a node takes the master role, it will continue on indefinitely as the
master node.
5. Click Save.
6. Select Settings > Network configuration.
8. Enter IP address and click the icon to mark the entry as a cluster IP address.
9. Assign previously added redundancy group.
10. Click Save.
Note: Demoting redundancy group transfers the master role for given group to another cluster
node. The master role is assumed by one of the remaining nodes, on which the given redundancy
group has the highest priority defined.
Note: If after demoting a redundancy group no other node assumes the master role for the
given group, it will be reassigned to the node which previously had this role.
Note: Enforcing a permanent slave role on a redundancy group ensures that the given node
will not assume master role on given redundancy group despite the state that other nodes are in.
It’s recommended for directing all traffic to other nodes before performing maintenance tasks on
given cluster node. A different use case scenario would be a cluster node in a remote location
with no 2nd network layer communication with other nodes.
System log is an internal registry of users activities which influence system state (login informa-
tion, administrative actions, etc.).
To display system log contents, select Settings > System log.
Note:
• Fudo Enterprise communicates with the syslog server over UDP protocol.
• Messages to the syslog server are send through an interface with the option enabled,
with an IP address that the target host’s network is reachable from or using the default
gateway.
Note:
• Log entries sent to syslog servers are formatted as follows:
3. Type in y and press the Enter key, to proceed with changing encryption passphrase.
4. Enter the new passphrase and press the Enter key.
5. Enter the passphrase once again and press the Enter key.
CERB is complete user authorization solution which supports a number of authorization mech-
anisms (i.e. mobile token, onetime passwords, etc.). The following procedure describes configu-
ration steps required to enable Fudo Enterprise to verify users credentials using CERB server.
CERB server configuration
1. Adding RADIUS client.
• Select RADIUS clients > Add client to add Fudo Enterprise as a RADIUS client.
• Provide Fudo Enterprise IP address, client’s name and password and click Save.
Note: Password will be required to define external authorization server in Fudo Enterprise
administration panel.
3. Adding user.
• Select Users > Add user to open new user definition window.
• Provide user name, description and select desired authorization module (refer to CERB
server documentation form more information on authorization modules).
4. Configuring service.
• Select Services > Add service to open new service definition window.
Note: Secret must match the RADIUS client password on CERB server. Service name must
match the service name on CERB
• Click Save.
2. Adding user.
• Select Management > Users.
• Click Add.
• Provide basic user information.
Note: Username must match the user name defined on CERB server.
• Click Save.
Related topics:
• Users
• Authentication
• User authentication methods and modes
Encryption keys stored on USB flash drives are necessary to initialize the file system, which
stores session data. If the USB flash drive is lost or damaged, it will be impossible to boot the
system and access session data.
Microsoft Windows
Warning: After connecting the flash drive to your computer, do not initiate or format it.
Ignore the system message about it not being able to read data and proceed with the backup
procedure.
4. Click FILE twice, select the target image file and click Continue.
5. Click START to proceed with copying data.
7. Connect another USB drive and start HDD Raw Copy Tool.
8. On the source drive selection screen select FILE and browse the file system to find the
encryption keys image file.
9. Select the newly connected USB flash drive as a target device and click Continue.
12. The copying will end once the following message occurs:
Operation terminated at offset....
Monitoring system condition allows preventing system failures and overloads, ensuring Fudo
Enterprise Fudo Enterprise remains operational.
Monitoring active sessions
1. Login to Fudo Enterprise administration panel.
2. Select Management > Dashboard.
3. Check the number of currently running user sessions.
Note: Fudo Enterprise features 1Gbps network interface cards. In case the current network
bandwidth usage exceeds 500Mbps, users may notice a decrease in system communication per-
formance.
Monitoring storage
Warning: Fudo Enterprise will not allow new connections when storage usage reaches 90%.
3. Check the storage usage percentage, review and delete archived sessions to free up space
if need be.
Related topics:
• System log
• Frequently asked questions
Fudo Enterprise regularly checks its “health” status. There are multiple tests that check the
status of both hardware and software components. These tests are called “health checks”.
The results of the health checks can be accessed by an administrator in two ways:
1. Using SNMP , which provides all health check results.
2. Using the API health check endpoint, which provides a summary of all health checks.
The Health Check API option is available under the Maintenance and supervision section of the
Settings > System tab.
Enabled the API endpoint providing quick information about Fudo Enterprise’s health status.
It may be used by external devices to periodically check Fudo Enterprise’s health status.
The information is available as a JSON object:
{
"status": "${value}"
}
Note: The health check status is designed to be simple and easy to interpret, therefore it
doesn’t contain detailed information about the problems that caused the error status. The
detailed information about health check results can be obtained using SNMP .
api/healthcheck
Warning: The API endpoint is accessible without authentication. It means that anyone
having TCP access to Fudo Enterprise will be able to get information about its health status.
Call Home is an opt-in service that allows Fudo Support Team to connect remotely to the client’s
system and perform required operations for the client.
In order to configure the Call Home service, proceed as follows:
1. Go to Settings > System, and then to the Maintenance and supervision section.
2. Check the Call Home option.
3. Choose the IP address of your Fudo Enterprise instance or Any address.
4. Additionally, check the Send diagnostics option to share diagnostic results with Fudo
Support Team.
Note:
• The Call Home functionality requires an account created on Fudo Security servers. To
create an account, contact your partner and provide your machine Fudo Unique Identifier
(FUID). Check at the Footer Information page where you can see your FUID.
• Fudo appliance will establish an outgoing SSH connection to home.fudosecurity.com.
In default configuration, Fudo Enterprise’s storage array comprises 12 hard drives in RAIDZ2
configuration running ZFS file system allowing the system to remain fully operational in case of
a failure of two hard drives.
Replacing a hard drive
1. Move the front bezel release latch to the left and take the front bezel off.
2. Push the hard drive tray lever release button and pull the lever to take out the tray from
the chassis.
3. Unscrew the screws securing the hard drive and take out the hard drive from the tray.
4. Install replacement hard drive in the tray and secure it with the screws.
5. Install the hard drive tray back in the server.
Note: Fudo Enterprise will automatically detect the change in the storage array state and will
start rebuilding the data structure. The duration of the array rebuilding process depends on the
volume of data stored on the server.
Related topics:
• Hardware overview
• Frequently asked questions
Warning: Configuration reset procedure is irreversible and it results in deleting all recorded
sessions, system settings and defined objects. The device needs 2 pendrives plugged in to be
properly executed.
Note: In case you are returning a demonstration unit, remember to also erase the USB flash
drive containing the encryption key.
Related topics:
• Network interfaces configuration
• System maintenance
Reference information
Connections broker enables users to reconnect to their existing sessions on a specific server within
a pool of load-balanced resources.
If the broker identifies an existing user session on another server, the connection will be redirected
to it and the user will be prompted to login again.
Note: To successfuly redirect a connection, the server identified by the broker must be defined
on Fudo Enterprise, it must listen on default RDP port (3389) and user must be allowed to
connect to given server.
434
Fudo Enterprise 5.4 - System Documentation
Related topics:
• Data model
• RDP
• Servers
• Accounts
Note: Message code contains information on the type of the log message and the component
that logged the information.
The footer on the left menu displays 4 elements describing current Fudo Enterprise instance:
1. Uptime - when the system was activated last time.
2. Serial Number - ID of the cluster node. It’s unique for a single cluster.
3. FUID (Fudo Unique Identifier) - Unique ID of the current Fudo Enterprise instance.
4. System Version - Current software version.
Fudo Officer 1.0 is a mobile app that allows Fudo Enterprise administrators to manage the
users’ requests to the target servers. The requests are accepted or rejected by the administrators
via the Fudo Officer app, or on Admin Panel in the Management > Sessions tab.
Note: Refer to the Approving pending user requests and Declining pending requests topics for
more information about maintaining the users’ requests on the Admin Panel.
English, Polish, Russian, and Ukrainian languages are available as an application language.
Application language is set according to the phone settings.
Warning: Fudo Officer app requires enabling the Call Home service at the Maintenance
and supervision section of the Settings > System tab.
Additionally, there must be selected the Require approval option within the Safe and enabled
an option for push notifications Session awaiting approval (push) for the user. An associated
device can be configured for the currently logged user only.
24.1 Configuration
Warning: An associated device can be configured for the currently logged user only.
450
Fudo Enterprise 5.4 - System Documentation
Note: A profile is unique for one user within one Fudo Enterprise instance.
The requests which are waiting for the response, are located under the Pending tab. Click on a
request item to accept or reject the request.
Alternatively, swipe right on a request item to accept the request or swipe left to reject the
request.
The processed requests (accepted and rejected) can be found under the Archived tab. These
requests can be sorted by Date, Server name or User.
24.3 Settings
Edit profile
1. Choose a cog icon in the upper right corner.
3. Click on the pencil icon to edit the profile name, or Click the red button if you want to
delete the profile.
Add profile
1. Open Fudo Enterprise Admin panel. Go to Management > Users. Choose a user to create
a profile for.
2. Edit user and go to the More tab. In the Fudo Officer field click the Add device button.
The showed QR code has to be scanned with the app.
3. Go back to the app and click the Add your profile button. Next, click the Scan QR code
button.
4. Scan showed QR code with your phone. Set a profile name and click the Create profile
button. The profile name is editable.
5. Go back to the Fudo Enterprise Admin panel and click OK in the QR code window. The
Fudo Officer section now has the Platform field filled with the binding device name and
the Push ID with the respective string.
6. Click the Save button.
Change PIN code
1. Choose a cog icon in the upper right corner.
2. Click Change PIN code.
3. Enter your current PIN code. You will have 5 attempts.
4. Create a new 4-6 digits PIN code.
The result of this procedure is fudopv application with Python interpreter included.
Note: For information on deploying fudopv without compiling sources files, refer to the De-
ploying fudopv without compiling source files topic.
457
Fudo Enterprise 5.4 - System Documentation
25.1.1 Python
Windows
Download and install Python 3.x environment:
https://www.python.org/downloads/
Note: Make sure to select the option to add python.exe to the execution path.
Linux
Install Python environment according to the guide provided by the manufacturer.
Exemplary configuration:
./configure \
--prefix=/opt/python-3.6 \
--with-ensurepip=install \
--disable-optimizations \
--enable-shared
Note:
• --disable-optimizations - optimizations may result in build failures,
• --with-ensurepip=install - installs tools for managing Python’s packages,
• --enable-shared - one of the fudopv's dependencies requires the Python interpreter .so
library.
LD_LIBRARY_PATH=/opt/python-3.6/lib
/opt/python-3.6/bin/pip install virtualenv requests
/opt/python-3.6/bin/virtualenv -p /opt/python-3.6/bin/python deps
In active virtual environment run the pip install -r requirements.txt to install fudopv
dependencies. Dependencies are installed in the deps/
Note: If the ImportError: No module named _markerlib problem occurs, execute pip
install --upgrade distribute and install dependencies once again.
Windows
Download and install pywin32 : https://sourceforge.net/projects/pywin32/files/
After activating the virtualenv environment, execute the following command with the path to
the pywin32 :
easy_install path\to\pywin32
Linux
Linux operating system does not require taking any additional actions.
Execute the python setup.py command, which will create package in the fudopv folder.
Note: The PyInstaller does not support package creation on a privileged account. If the
ERROR: You are running PyInstaller as user root. This is not supported. error oc-
curs, you can change the check_not_running_as_root() function in the ./deps/lib/python3.
6/site-packages/PyInstaller/utils/misc.py so that it return the result without checking
anything.
Related topics:
• Using fudopv
• Deploying fudopv without compiling source files
• Authentication methods
Execution parameters
When working with fudopv, the following command format is used:
The following table lists the available options for the fudopv command.
Command/option/parameter Description
Commands
getcert Fetch User Portal SSL certificate.
getpass <type> <account_name> Fetch password to selected account.
type:
• direct - direct, unmonitored connection;
• fudo - connection monitored by the PSM mod-
ule
1. Upload fudopv script to the server and change its access rights to allow execution.
Note:
• Select Management > Users.
• Click +Add user.
• Enter user’s name.
• Define account’s validity period.
• Select User from the Role drop-down list.
• Assign safe and click the object to open its properties.
• Select the Reveal password option.
• In the Authentication section, select Password from the Add authentication method drop-
down list.
• Type in the password in the Password field.
• If you want to limit the IP addresses allowed to access Fudo Enterprise over the API
interface, go to the More tab, and in the AAPM field enter the IP address of the server,
which will be requesting passwords using fudopv script.
• Click Save.
Note: fudopv configuration files are stored in the .fudopv folder in user’s home folder.
Section Description
[FUDO]
address User Portal’s IP address.
cert_path Path to the User Portal’s SSL certificate files.
[CONN]
bind_ip IP address of the server, running the fudopv script. The IP address must be
the same as the IP address defined in the API section in user configuration.
This parameter is optional.
[AUTH]
username User login as defined in step 3.
secret Path to the secret.txt file containing user’s static password.
Note:
• In the [FUDO] section, in the address line, enter the User Portal IP address.
• Leave the cert_path line as is, it will be updated automatically after successfully running
the fudopv getcert command.
• If you specified the IP address allowed to access Fudo Enterprise over API, in the [CONN]
section, uncomment the bind_ip line and provide the IP address of the server running the
fudopv script.
• In the [AUTH] section, in the username line, provide the login of the user object defined
in step 3.
For example:
[FUDO]
address=10.0.0.8.61
cert_path=<CERT_PATH>
#[CONN]
bind_ip=10.0.0.8.11
[AUTH]
username=fudopv
secret=/Users/zmroczkowski/.fudopv/secret.txt
Note: After running the script successfully, the path to the certificate in the configuration file
Warning: Correct operation of the fudopv script requires disabling the Login reason
prompt option in the safe’s properties.
Related topics:
• Compiling fudopv tool
• Deploying fudopv without compiling source files
• Authentication methods
• Data model
• System overview
• Setting up password changing on a Unix system
Ticketing systems
467
CHAPTER 27
Client applications
27.1 PuTTY
3. In the Port number field, enter port number defined in the listener.
468
Fudo Enterprise 5.4 - System Documentation
5. Click Open.
6. Enter username.
7. Enter password.
Related topics:
• SSH
• Creating an SSH server
• Setting up the SSH listener
3. Enter user login and password and press the [Enter] keyboard key.
Note: Fudo Enterprise enables using custom login, no access and session termination screens
for RDP and VNC connections. For more information on user defined images for graphical
Related topics:
• RDP
• Creating an RDP server
• Setting up the RDP listener
Related topics:
• MS SQL
• Creating a MS SQL server
• Setting up the MS SQL listener
Troubleshooting
28.1 Booting up
475
Fudo Enterprise 5.4 - System Documentation
Solution:
• Verify that user definition exists in Fudo Enterprise
database.
• Make the login credentials are correct.
• Make sure that the client software does not have outdated
credentials stored.
• Check if the user has a domain defined and make sure it
is provided when attempting to log in.
• If there are two users with the same login, one of which has
the domain configured the same as the default domain,
and the other does not have the domain defined, Fudo
Enterprise will report authentication problem as it cannot
determine which user is trying to connect.
Symptoms:
• Client software message: Connection closed by remote
host.
• Events log entry: Failed to authenticate against the server
as user root using password.
Symptoms:
• RDP client message: Connection refused.
• SSH client message: ssh: connect to host 10.0.1.111 port
10011: Connection refused
Solution:
Download new target host certificate in the Target host section.
Symptoms:
• After entering username and password the connection is
terminated.
• Events log entry: RDP connection error.
User has to provide login Symptoms: user connecting over RDP protocol enters login
credentials twice credentials and immediately afterwards is asked again for the
same login information.
Cause: server is a part of an infrastructure managed by con-
nections broker which has detected an active user’s session on
another server.
Symptoms:
• Events log entry: User user0 has no access to host
192.168.0.1:3389
Administrator user does Symptoms: session list does not contain expected entries.
not see sessions
Cause: insufficient access rights.
Solution: grant access rights to specific user, server and con-
nection objects.
Cannot playback session in Symptoms: message: Could not find session data.
session player
Cause: recording has been disabled in connection properties
when given session transpired.
Solution: enable session recording to be able to playback ses-
sion material in future.
Symptoms:
• System log entry: Unable to timestamp session.
• No session timestamp icon on sessions list.
Support mode enables remote access to Fudo Enterprise in case it cannot boot up properly.
Enabling support mode
1. Access the system terminal.
2. During the boot up, enter 1 and press the Enter key to confirm.
Note: In support mode, network interfaces are named res* instead of net*.
Note: The IP address is used for establishing remote SSH connection, thus it must be reachable
by the technical support specialist. If possible, the IP address should be the same as before the
system’s malfunction.
5. Enter the gateway’s IP address and press enter to enable connection to your Fudo Enter-
prise.
Note:
• Fingerprint allows for verifying that the connection has been established with the correct
remote host.
6. Once the work is done and the connection is no longer needed, press [Ctrl] + C keys to
close it and reset the network settings.
Related topics:
• Network interfaces configuration
• System maintenance
Use Cases
When logging in, OATH authentication can be performed either in Challenge-Response mode
or by concatenating the dynamic code generated by Google Authenticator to the end of the
static password defined in the authentication method, such as password481418. Please note
that not all protocols support this authentication method.
486
Fudo Enterprise 5.4 - System Documentation
In order to configure default settings for the OATH authentication method, follow the instruc-
tion:
1. Select Settings > Authentication > OATH authentication.
2. Fill out the Issuer field.
3. From the Token type field select TOTP (time-base) or HOTP (counter-base).
4. Fill out the Token length field.
5. Input Time step if selected Token type was TOTP (time-base).
6. Click Save.
In order to configure OATH as an active authentication method for a user, follow the steps:
1. Select Management > Users.
2. Find and click the user for whom you want to add the OATH authentication method.
3. Scroll down to the Authentication section.
4. Choose OATH type from the Add authentication method drop-down list.
5. Choose the Static password or External authentication as a first factor.
If Password is chosen:
• Enter password’s static part.
• Fields Token type, Token length and Time step will be filled out automatically as default
settings claim. Their value is editable.
• Enter a secret that will be used by Google Authenticator. Note, that the secret must be
a Base32 encoded value. Alternatively, click Generate to generate it automatically or
QRCode to show the QR code.
If External authentication is chosen:
• Select External authentication source.
• Fields Token type, Token length and Time step will be filled out automatically as default
settings claim. Their value is editable.
• Enter a secret that will be used by Google Authenticator. Note, that the secret must be
a Base32 encoded value. Alternatively, click Generate to generate it automatically or
QRCode to show the QR code.
Note: The Initialized option serves for the user’s initialization via the QR code. When their
static password as a First factor setting is filled or External authentication source if configured,
the QR code is displayed during their first connection. After successful first authentication the
Initialized option becomes checked and takes uneditable state.
6. Click Save.
7. Launch Google Authenticator.
• Select ADD.
8. When logging in, the password string consists of a static password defined in the au-
thentication method and dynamic part generated by the Google Authenticator, e.g.
password481418.
Related topics:
• User authentication methods and modes
To configure the OpenID Connect authentication method with Azure, please follow below steps.
Note: Please note that this is a general guide, and specific details may vary depending on your
Azure setup. Refer to Azure documentation for precise configuration steps.
4. Click the + New user button to create a new user. Select Create new user from
the drop-down list.
5. In the User principal name field, enter the username of the user account. For
example, [email protected].
6. In the Display name field, provide the name of the user of the account.
7. Provide the password phrase in the Password field or click the Auto-generate
password option to generate the password.
8. Select the Account enabled option.
9. In the Properties tab, under the Contact Information, in the Email field provide
the email address. For example, [email protected].
10. Enter the details required for the user under the Properties and Assignments
tabs.
11. Click Create.
Register Fudo in Microsoft Entra ID (Azure Active Directory)
1. Go back to the Microsoft Entra ID menu and under the Manage section, click
on Enterprise applications.
6. In the next page, under the Supported account types select the Accounts in this
organizational directory only (This Directory only - Single tenant) option.
7. Under the Redirect URI section select Web from the Select a platform drop-
down list and provide the address of the Fudo Enterprise Access Gateway with
the /oidc suffix. For example, https://10.0.58.239/oidc or https://fudo.
example.com/oidc.
Note: You can find the Access Gateway address under the Settings > Network
configuration menu in the Fudo Enterprise. For more information, please follow the
Network settings section.
5. In the Implicit grant and hybrid flows section, check ID tokens and Access tokens
options.
6. In the App instance property lock section, click Configure and uncheck the
Enable property lock option in the right-hand dialog box. Click Save to close
the dialog box.
7. Click Save to save your authentication settings.
Generate Client Secret
Warning: Note down the generated Secret ID and Value as you will need it
for Fudo Enterprise configuration. Once saved, the secret value will no longer be
visible.
10. Add Username mapping and Email mapping. Those fields are useful when user’s
name has different naming convention.
11. Provide Bind address.
12. Click Save.
Create new user in Fudo
1. Select Management > Users and then click + Add user.
5. Click Save.
Note: This address is utilized to associate Fudo Enterprise users with their cor-
responding accounts created in Azure. Ensure that there is no duplication of email
addresses among users.
Testing
You can now test the OpenID Connect authentication by attempting to log in to
Fudo Enterprise. Log in using the Azure authentication method:
Related topics:
• User authentication methods and modes
• Authentication
• Integration with CERB server
Note: Please note that this is a general guide, and specific details may vary depending on your
Windows Server setup. Refer to the Windows Server documentation for precise configuration
steps.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 499
Fudo Enterprise 5.4 - System Documentation
Add Servers:
1. Log in to the server on which you want to setup the Remote Desktop Services.
2. Open the Server Manager application.
3. Click Manage button on the upper right corner of the window to expand the
menu list and select Add Servers.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 500
Fudo Enterprise 5.4 - System Documentation
3. On the Installation Type tab, select Remote Desktop Services installation, and
click Next to proceed.
4. On the Deployment Type tab, select Standard Deployment to access more de-
tailed instructions for installing Remote Desktop Services. Click Next to pro-
ceed.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 501
Fudo Enterprise 5.4 - System Documentation
6. On the Role Services tab, review the services that will be installed. Click Next
to proceed.
7. On the RD Connection Broker tab, select the appropriate server on which to
install the RD Connection Broker role service. In this example RDB server was
selected. Click Next to proceed.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 502
Fudo Enterprise 5.4 - System Documentation
8. On the RD Web Access tab, select the appropriate server on which to install the
RD Web Access role service. In this example, the RDB server was also selected.
Click Next to proceed.
9. On the RD Session Host tab, select the appropriate servers on which to install
the RD Session Host role service. In this example, the HOST1 and HOST2 servers
were selected. Click Next to proceed.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 503
Fudo Enterprise 5.4 - System Documentation
10. On the Confirmation tab, select Restart the destination server automatically if
required, and then click Deploy.
11. Wait for the deployment to complete successfully and click Close.
Add the RD Gateway server and certificate name:
1. Select the Remote Desktop Services section from the left-hand menu and go to
Overview tab.
2. Click the + RD Gateway button and in the Add RD Gateway Servers wizard,
select the virtual machine where you want to install the RD Gateway server.
In this example RDB server was selected.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 504
Fudo Enterprise 5.4 - System Documentation
3. Click Next.
4. Enter the SSL certificate name for the RD Gateway server using the external
fully qualified DNS Name (FQDN) of the RD Gateway server. Example, cert.
mk.local.
5. Click Next, and then click Add.
6. Wait until the role service is deployed and click Close.
Configure the RD Gateway and RD Licensing deployment properties:
1. Go back to the Overview tab, click Tasks and select Edit Deployment Properties
from the drop down list.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 505
Fudo Enterprise 5.4 - System Documentation
3. Expand the RD Licensing tab and select Per Device. Click Apply.
4. Expand the ‘RD Web Access’ tab, to check the RD Web Access IIS application
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 506
Fudo Enterprise 5.4 - System Documentation
5. Click on the displayed URL to verify the RD Web Access login using the ad-
ministrator account.
Note: While login, please use the domain in the user name field. For example,
[email protected].
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 507
Fudo Enterprise 5.4 - System Documentation
2. Select the virtual machine where the RD license server will be installed. In this
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 508
Fudo Enterprise 5.4 - System Documentation
example RDB server was selected. Click Next, and then click Add.
3. Wait until the role service is deployed and click Close.
Create a session collection:
1. Go to the Collections tab of the Remote Desktop Services section, click Tasks
and select Create Session Collection from the drop down list.
Note: This name will be displayed under its icon in the Web Access interface.
4. On the RD Session Host tab, select the RD Session Host Servers to add to this
collection. In this example, the HOST1 and HOST2 servers were selected.
5. On the User Groups tab, define user groups. You can either accept the default
user groups or add one or more groups of users permitted to connect using RDP
to the Session Host server(s).
6. On the User Profile Disks tab, select Enable User Profile Disks option and
specify the settings if needed. You can also leave this option disabled.
7. On the Confirmation tab, please review all the information and then click ‘Cre-
ate’.
8. Wait until the collection is created. Click Close.
Test the connection:
1. Open the RD Web Access URL saved in previous steps (e.g., https://rdb.mk.
local/RDWeb/).
2. Enter a valid username and password and click Sign in. You can use the domain
admin account to login, for example, [email protected].
3. After logging in, the full collection of created desktop sessions is presented.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 509
Fudo Enterprise 5.4 - System Documentation
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 510
Fudo Enterprise 5.4 - System Documentation
Note: In this part of the manual, a general process for configuring Remote Desk-
top Services has been presented. To utilize Fudo Enterprise’s functionality during
connections, please follow the steps outlined in the subsequent part of the instruction.
Note: This use case describes how to configure Fudo Enterprise using the Active Di-
rectory external authentication method. Please keep in mind that you can customize
user authentication using any other method supported by Fudo Enterprise to align
with your specific requirements, the methods typically used in your environment,
and your work scenarios.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 511
Fudo Enterprise 5.4 - System Documentation
9. In the Login, Secret, and Repeat secret fields provide the privileged account’s
login credentials used to access the Domain Controller.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 512
Fudo Enterprise 5.4 - System Documentation
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 513
Fudo Enterprise 5.4 - System Documentation
3. Go to Permissions tab and add users allowed to manage this listener (e.g.,
user1).
4. Go to Settings tab and press the RDP button in the Protocol field.
5. Select the TLS enabled option to enable encryption.
6. Check the NLA enabled option for additional security.
7. In the Connection mode section, select bastion.
8. Set the local address to 10.0.58.238 or Any, and port 3389.
9. In the CA certificate field, click Generate certificate to generate TLS certificate,
or click Upload to upload server certificate file with private key pasted at the
end of the file.
10. Click Save and close.
Establish a connection through the Access Gateway:
1. Log in to the Fudo Enterprise Access Gateway using user1 as the username
and password corresponding to the one configured in the Active Directory.
Note: You can find the Access Gateway address in the Settings > Network config-
uration menu tab.
2. Hover the cursor over the user1 account name, select Native client and click
the Connect button to download the .rdp configuration file.
3. Open the downloaded file to establish a connection.
4. Enter the password for the user1 account to log in to the server.
Redirect the connection through Fudo using RDP native client:
1. In order to redirect the connection through Fudo Enterprise, we need to use the
Fudo Access Gateway address in the RDP client configuration.
2. Choose your favorite remote desktop client, such as Microsoft Remote Desktop,
and follow its workflow to add a new PC for connection.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 514
Fudo Enterprise 5.4 - System Documentation
3. Following the example of Microsoft Remote Desktop, click the plus icon in the
upper part of the window and select Add PC.
4. In the PC Name field, enter the address of the Fudo Enterprise Access Gateway
followed by the port number and click Add.
Note: You can find the Access Gateway address in the Settings > Network config-
uration menu tab.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 515
Fudo Enterprise 5.4 - System Documentation
Note:
• Please use the following pattern for the bastion login string: user name # ac-
count login on the target server # target server address (e.g., user1#user1#10.
0.136.4).
• You can skip the account login if it’s the same as the user name, e.g, user1##10.
0.136.4
6. Remote Desktop client will establish connection with one of the servers from
the RDS collection.
View the established session in the Fudo Enterprise Admin Panel:
1. Login into your Fudo Enterprise Admin Panel.
2. Select Management > Sessions and run the session preview.
3. Find desired session and click the play icon next to it.
29.3. Remote Desktop Services configuration on Windows Server for Fudo Enterprise 516
Fudo Enterprise 5.4 - System Documentation
Related topics:
• RDP in bastion mode
• Authentication
• Integration with CERB server
While creating RDP Server in Fudo Enterprise, you can specify the server verification method
by getting the server certificate or importing the CA certificate. You can follow below manual
to manage mentioned certificates in the Windows Server environment.
Please follow one of below scenarios to localize the certificate retrieved by Fudo Enterprise from
the Widnows Server during the RDP server creation.
Locating the Server Certificate in Certificate Manager Tool:
You can localize the certificate retrieved by Fudo Enterprise from the Widnows Server
in the Certificate Manager tool. To view the certificate, please follow below steps:
1. Select Run from the Start menu in Widnows Server, and then enter certlm.msc.
2. The Certificate Manager tool for the local device appears.
3. To view your certificate, expand the Remote Desktop > Certificates directory
under the Certificates - Local Computer in the left pane of the Certificate Man-
ager tool window.
Example:
2. In the response you will receive the certificate that you can use to extract the
certificate serial number by typing below command and providing the obtained
certificate content:
-----BEGIN CERTIFICATE-----
MIIChbdygdu656sdf65ac55mpn1PmpBK/
˓→70WFeh+xjANBgkqhkiG9w0BAQsFADAZ
MRcwFQYDVQQDEw5IT1NUMS5tay5sb2NhbDAeFw0yMzA5MTMxNzA2NTRaFw0yNDAz
MTQxNzA2NTRaMBkxFzAVcas7c6c6sh83uydtLm1rLmxvY2FsMIIBIjANBgkqhkiG
9w0BAQEFAAOCAQ8AMIIBCgKCAQEA2ngYkoMa4dgLgGl1+G+m2UEAIH/
˓→6ttyQep5u
tUYkxKeuqpn9AWnYP8To1fornJN387ddhcy76d7jchc8Q093RWVb2cMKKjgOAW9w
qLFW+WrLEUPY8hYvsCFYgFH3H0HhKLEoWBN5qHH7vjIiW3Rb0Y7xeGb9x0FWItQX
mbF6sucGdlH+OsjepxMLPVh3Qpb2WQ18kSQGyS1ocbJxOWST9sH4MQkRVFL3rkxN
(continues on next page)
xyXjeYdX8/U9EdgrXOLGX9U74rfGQTrQxZyjuYlGxxqop/
˓→y2V3n+3NnNzY+ehW1G
ggEBAGNXzwNC4DhOxyaVhVTPePsa97aeWJtpl64cE4/ZdAfGBEIfHlBEh/
˓→Tnrrn2
ZUvdUnqtdH+0DdAWBo4P1dv0nL8=
-----END CERTIFICATE-----
3. This will result in extracting the certificate’s serial number that you can use to
search the exact certificate in the Certificate Manager tool.
serial=41EB33A67D4F9A884AFFBD1615E11EDD
7. Provide copied serial number in the Contains field and select Serial Number
from the Look in Field drop down list.
Note:
• This is a conceptual guide that outlines the fundamental setup of a CA for the RDP
protocol. The necessary steps may vary depending on the initial settings of the environment
in which you are working.
• To prepare CA certificate to be used in Fudo Enterprise it is needed to deploy internal
Certificate Authority on the network with an RDP certificate template to issue RDP
certificates.
Note: For the procedure outlined in the manual below, the Enterprise CA option was selected.
3. Find the Computer template, right click on it and choose Duplicate Template.
4. In the General tab, enter the name for new template and specify the validity
and renewal period according to your needs.
5. In the Compatibility tab, choose Windows Server 2003 from the Certification
Authority drop-down list and Windows XP/ Server 2003 from the Certificate
recipient drop-down list.
6. In the Request Handling tab, set the Purpose to the Signature and encryption
and check the Allow private key to be exported.
10. In the ‘Security’ tab, add the computers and groups you want to be able to
enroll for this template. Check if group or user you are using has the Read,
15. Click three times OK to return to the Properties of New Template window.
16. In the Subject Name tab, select Build from this Active Directory information
option and next the DNS name.
18. Click OK to save created template. Close the Certificate Templates Console.
19. Go back to the Certification Authority window. Right click on the Certificate
Template and choose New > Certificate Template to Issue.
Link it here. . .
4. Provide a name for new GPO (e.g., rdp) and click OK.
8. Select Enabled option and enter the name of the template created in the previous
steps into the Certificate Template Name field.
9. Click OK.
10. Double click on the Require use of specific security layer for remote (RDP)
connections to edit this setting.
11. Select Enabled option and choose SSL from the Security Layer drop-down menu.
3. Right-click on your Root Certification Authority certificate and select All Tasks
> Export. . . .
4. Click Next.
5. Select Base-64 encoded X. 509 (.CER) format and click Next.
6. Specify the name and localisation for the exported certificate.
7. Click Next and Finish to save the file.
Create User in Fudo:
1. Select Management > Users and then click + Add user.
2. Enter the user name (e.g., ‘User1’).
3. In the Settings tab, under the Safes section, select portal.
4. Click Save.
5. Go to the Authentication section and from the Add authentication method drop
down list select Static password.
6. In the Destination section select IPv4 and enter IP address of the server for
which you wish to set up an RDP connection.
7. In the Server verification section select CA certificate and upload exported CA
certificate file.
• Click + Add user, and then click the button next to User1, which was
created in previous steps, to enable server access over monitored safe.
• Click ok to close the modal window.
5. Select Accounts tab to add accounts accessible through this safe.
• Click + Add account, and then click the next to CA-account, which
was created in previous steps.
• Click ok to close the modal window.
• Click to assign listener to accounts.
6. Click Save.
Establish a session:
1. Log in to the Fudo Enterprise Access Gateway using User1 as the username
and password provided during the creation of this user.
2. Hover the cursor over the CA_account name and select Web client to start the
session.
Related topics:
• Creating an RDP server
• Creating a user
536
Fudo Enterprise 5.4 - System Documentation
19. How will the system determine that it wasn’t me if we all use the same commands?
20. Sessions are not analyzed, why is that?
1. How many user sessions can be stored at once?
Fudo Enterprise F1000 series is delivered with 24 TB of RAW hard drive space (15.9 TB usable)
while the F3000 series appliances come with 96 TB of RAW storage space (59.9 TB usable)
dedicated for storing users sessions.
Size of the stored session is determined by user’s activity. An hour of recorded connection takes
on average:
RDP 218 MB active user session (no activity generates almost no data). Definite session
size depends on the screen resolution, color depth and actual user activity.
SSH 41.5 MB active session.
RDP SSH
F1000 28.6 years 150.2 years
F3000 112.8 years 592.5 years
Note:
• Disk usage figures include space taken up by the filesystem’s redundancy mechanism. The
filesystem reserves a portion of available storage, which results in some of the storage space
being reported as used on a newly initiated system.
• Fudo Enterprise allows specifying how long sessions data should be stored, and will au-
tomatically delete session data after a certain time, determined by retention parameter ,
elapses.
537
Fudo Enterprise 5.4 - System Documentation
538
Fudo Enterprise 5.4 - System Documentation
14. We have 20 accounts and 20 users in our company - how long will it take to see
differences?
This solely depends on the availability of session data. If there is enough session information
available to build models, you can expect model to be trained the next day after first predictor
session is recorded.
• For SSH model the minimum are 65 sessions (with at least 25 different commands) and
5 unique predictors (e.g. users). Optimal results require 300 sessions per predictor (e.g.
user) and 10 unique predictors (e.g. users).
• For RDP model, the minimum are 5 hours of session recordings per predictor (e.g. user).
Optimal results require 30 hours of session recordings and 10 unique predictors (e.g. users).
15. If I connect to different servers, does Fudo create a separate model for each of
them?
Fudo creates and maintains one RDP and one SSH model for a single user.
16. If I give my login credentials to another person, will the AI detect that someone
else has logged in and terminate the session?
Fudo Enterprise will detect that someone else has logged in and will set the session risk status
to high, but it will not terminate the session.
17. Session status icon is yellow all the time - what does it mean?
Yellow color indicates that the model could not determine whether the session poses a threat or
not. Under normal circumstances, these sessions should be considered as non-threatening. But
if you suspect there has been a security incident, these sessions should be reviewed.
18. Five users use the same account to establish connections - will the system be
able to determine who and when has logged in onto the server?
Users must have individual accounts created on Fudo Enterprise so it can correctly determine if
an account security has been breached.
19. How will the system determine that it wasn’t me if we all use the same com-
mands?
Every user runs the same commands differently. E.g. one user will execute ls -la and another
will run ls -al. Combination of such subtle differences allows for determining a if the currently
logged in user matches the profile.
20. Sessions are not analyzed, why is that?
In order for a session to be analyzed, there must be a matching model available. Also, session
has to meet volumetric requirements - it must be long enough and carry enough information.
Refer to AI sessions processing for more information.
539
CHAPTER 31
Glossary
AAPM AAPM (Application to Application Password Manager) module enables secure pass-
word exchange between applications.
account
accounts Account defines the privileged account existing on the monitored server. It specifies
the actual login credentials, user authentication mode: anonymous (without user authen-
tication), regular (with login credentials substitution) or forward (with login and password
forwarding); password changing policy as well as the password changer itself.
Active Directory Users authorization and authentication in Windows domain.
AD Active Directory - users authorization and authentication in Windows domain.
Azure Microsoft Azure is a cloud computing service operated by Microsoft for application
management via Microsoft-managed data centers.
anonymous safe An anonymous safe has at least one anonymous account assigned to it and
it can only have that type of accounts assigned. You cannot assign users to anonymous
safes.
AUROC Area Under ROC curve (AUROC) is a single metric representing model quality (the
higher the better).
ARP Address Resolution Protocol - protocol used for mapping Internet layer addresses (IP
addresses) to the physical - link layer addresses (MAC addresses).
CERB Complete user authentication and authorization solution, supporting different authen-
tication methods i.e., mobile token (mobile phone application), static password, SMS one-
time passwords, etc.
CIDR Short notation of network addressing, in which the IP address is written according to
the IPv4 standard, and the subnet mask is provided as a number of 1 in the subnet mask
in binary system (192.168.1.1 - 255.255.255.0; 192.168.1.1/24).
data retention Data retention mechanism automatically deletes session data after define time
period transpires.
540
Fudo Enterprise 5.4 - System Documentation
541
Fudo Enterprise 5.4 - System Documentation
RADIUS Remote Authentication Dial In User Service - networking protocol used to control
access to different services within IT infrastructure.
RDP Remote Desktop Protocol - remote access protocol to computer systems running Microsoft
operating system.
RDP connections broker Remote sessions management mechanism for server farms.
redundancy group Defined group of IP addresses, which in case of a system failure, will be
seamlessly carried over to another cluster node to maintain the availability of the services.
safe Safe directly regulates user access to monitored servers. It specifies available protocols’
features, policies and other details concerning users and servers relations.
server
servers Server is a definition of the IT infrastructure resource, which can be accessed over one
of the specified protocols.
shared session User session which was joined by another user.
SMS is a text messaging service component of most telephone, and mobile device systems.
SSH Secure Shell - networking protocol for secure communication with remote systems.
SSH access Service access to Fudo Enterprise over SSH protocol.
Static password Basic user authorization method which uses login and password combination
to determine users’s identity.
Syslog Events logging standard in computer systems. Syslog server collects and stores log data
from networked devices, which can be later used for analysis and reporting.
Threat Probability Threat probability is a percentage-wise value that reflects a threat level
of the session.
time policy Time policy mechanism enables defining time periods during which users are al-
lowed to connect to monitored hosts.
timestamp Session data hash value, which enables verifying that the data has not been modi-
fied.
True Positive Rate True Positive Rate (TPR), sometimes called Recall - is a percentage of
malicious sessions properly flagged by the model as suspicious (the higher the better).
user User defines a subject entitled to connect to servers within monitored IT infrastructure.
Detailed object definition (i.e. unique login and domain combination, full name, email
address etc.) enables precise accountability of user actions when login and password are
substituted with a shared account login credentials.
VLAN Virtual networks mechanism, enabling separation of broadcast domains.
VNC Remote access protocol to graphical user interfaces.
WWN World Wide Name - unique object identifier in external storage solutions.
542
Index
A DNS, 541
AAPM, 540 DUO, 541
account, 540
accounts, 540
E
Active Directory, 540 editing
AD, 540 servers, 171, 176
administration Efficiency Analyzer/Productivity
configuration export/import, 399 Analyzer, 541
anonymous safe, 540 external authentication server, 541
API
users, 129
F
ARP, 540 False Positive Rate, 541
AUROC, 540 Fingerprint, 541
Azure, 540 fudopv, 541
C H
CERB, 540 heartbeat, 541
CIDR, 540 hot-swap, 541
configuration HTTP
AI, 362 protocol, 8
Network configuration, 346, 355 protocols, 8
notifications, 359 servers, 149
users synchronization, 144
I
connection mode
bastion, 22 import
gateway, 22 servers, 170
proxy, 22 L
transparent, 21
LDAP, 541
creating
listener, 541
servers, 149
D M
Modbus
data retention, 540
protocol, 9
deleting
protocols, 9
servers, 174
servers, 152
deployment scenario
MS SQL
bridge, 20
servers, 153
forced routing, 20
MS SQL (TDS )
DHCP, 541
543
Fudo Enterprise 5.4 - System Documentation
Index 544
Fudo Enterprise 5.4 - System Documentation
Syslog, 542
T
TCP
protocol, 19
protocols, 19
servers, 168
Telnet
protocol, 17
protocols, 17
servers, 161
Telnet 3270
protocol, 16
protocols, 16
servers, 163
Telnet 5250
protocol, 17
protocols, 17
servers, 165
Threat Probability, 542
time policy, 542
timestamp, 542
True Positive Rate, 542
U
user, 542
users
access rights, 129
API, 129
roles, 129
users synchronization, 144
configuration, 144
V
VLAN, 542
VNC, 542
VNC
protocol, 18
protocols, 18
servers, 167
W
WWN, 542
X
X11
protocol, 19
protocols, 19
Index 545