Am Admin Guide en 4.0.7.1
Am Admin Guide en 4.0.7.1
Reference: https://doc.wallix.com/en/am/4.0.7.1/am-admin-guide
Copyright © 2015-2023 Wallix
WALLIX Access Manager 4.0.7.1 – Administration Guide
Table of Contents
1. Introduction ............................................................................................................................ 4
1.1. Preamble ..................................................................................................................... 4
1.2. Copyright, licenses ...................................................................................................... 4
1.3. Legend ........................................................................................................................ 4
1.4. About this document ................................................................................................... 4
2. Compatibility & limits ............................................................................................................. 5
3. Overview ................................................................................................................................ 6
4. Licenses ................................................................................................................................. 7
4.1. Managing licenses from the command line ................................................................. 7
5. SNMP .................................................................................................................................... 9
6. Metric measurement tool ..................................................................................................... 12
7. User preferences ................................................................................................................. 13
8. Multi-tenancy and organizations ........................................................................................... 16
8.1. The global organization ............................................................................................ 17
8.2. The default organization ........................................................................................... 17
8.3. Password policies ..................................................................................................... 17
8.4. Themes ..................................................................................................................... 18
9. Authentication domains ........................................................................................................ 20
9.1. Local domains ........................................................................................................... 20
9.2. LDAP domains .......................................................................................................... 21
9.2.1. Configuration of the LDAP domain ................................................................. 21
9.2.2. Configuration of the LDAP server .................................................................. 22
9.2.3. Query customization ....................................................................................... 24
9.2.4. X509 authentication ....................................................................................... 24
9.3. SAML domains .......................................................................................................... 25
9.3.1. Configuration of the SAML domain ................................................................ 25
9.3.2. Configuration of the SAML identity provider (IdP) ........................................... 26
9.4. Bastion domains ....................................................................................................... 28
9.4.1. Configuration of the bastion domain ............................................................... 28
9.4.2. Configuration of the bastion ........................................................................... 30
10. RADIUS authentication ...................................................................................................... 31
11. Users ................................................................................................................................. 33
11.1. Profiles .................................................................................................................... 33
11.2. Local users ............................................................................................................. 33
11.3. Non-local users ....................................................................................................... 35
12. Bastions ............................................................................................................................. 36
13. User authorizations ............................................................................................................ 38
13.1. Authorizations and folders ....................................................................................... 38
13.2. User authorizations on sessions ............................................................................. 39
13.3. User authorizations on passwords .......................................................................... 41
13.4. Management of approval requests by the user ....................................................... 41
13.4.1. Approval request for access to sessions ...................................................... 41
13.4.2. Approval request for access to passwords ................................................... 42
13.4.3. Viewing the status of an approval request .................................................... 42
13.5. Management of approval requests by the approver ................................................ 43
13.5.1. Answer to the approval request ................................................................... 43
13.5.2. Viewing the approval history ........................................................................ 45
14. Application settings ............................................................................................................ 46
14.1. Settings ................................................................................................................... 46
14.1.1. Specific application settings ......................................................................... 46
14.2. Web server certificates ........................................................................................... 49
2
WALLIX Access Manager 4.0.7.1 – Administration Guide
3
WALLIX Access Manager 4.0.7.1 – Administration Guide
Chapter 1. Introduction
1.1. Preamble
Thank you for choosing WALLIX Access Manager, also called Access Manager.
This product is packaged as an installer which can be executed in order to install the software on
a server.
This product has been engineered with the greatest care by our teams at Wallix and we trust that
it will deliver complete satisfaction.
All the product or company names mentioned herein are the registered trademarks of their respec-
tive owners.
WALLIX Access Manager is subject to the WALLIX software license contract.
WALLIX Access Manager is based on open-source software. The related list is available
from WALLIX. Please send your request on Internet by creating a new case at https://
support.wallix.com or in writing to:
WALLIX
Service Support
250 bis, Rue du Faubourg Saint-Honoré
75008 PARIS
FRANCE
1.3. Legend
prompt $ command to input <parameter to replace>
command output
on one or more lines
prompt $
4
WALLIX Access Manager 4.0.7.1 – Administration Guide
5
WALLIX Access Manager 4.0.7.1 – Administration Guide
Chapter 3. Overview
The WALLIX Access Manager (Access Manager) provides connection services between web
browsers and targets on which users are authorized to log on. Target accesses are performed
through Wallix Bastion appliances. The connections are done using HTML5 clients; no browser
plug-in is required. Access Manager enables also users with the proper rights to display target
passwords in the browser and/or to copy them directly to the clipboard.
In order to store the configuration, Access Manager requires an access to an external database.
The database settings are configured as explained by Chapter 16, Database settings.
The configuration of the Wallix Bastion deployed by the organisation is described in Chapter 12,
Bastions.
6
WALLIX Access Manager 4.0.7.1 – Administration Guide
Chapter 4. Licenses
Access Manager is controlled by a license key provided by WALLIX which contains the elements
included in the sales contract.
Licenses are managed from the “Access Manager License” deployable area in the “About ...” page,
accessible by clicking on the “i” icon located on the right part of the top menu bar.
Important:
Only an administrator of the global organization can access the “Access Manager Li-
cense” deployable area, and manage the licenses.
During the initial installation, Access Manager creates a 31-day evaluation license which
allows up to 5 concurrent users.
To obtain or upgrade a license, a context file must be created and sent to WALLIX Support (https://
support.wallix.com/). To do so, click on the “Download Context File” button to generate and down-
load a context file and send it to the WALLIX Support Team which will provide you with a license file.
Once you have received the license file, drag-and-drop it in the “Access Manager License” section
and click on the “Upload License” button.
For each license installed on Access Manager, the following information is provided:
Note:
Connections of the administrator of the global organization are not counted.
Note:
When several licenses overlap, then the entitlements of these licenses add up. As an
example: if two licenses are installed and allow 100 concurrent users and 50 concurrent
users, then the number of concurrent users allowed is 150.
All standard licenses installed on Access Manager can be revoked by clicking on the Revoke Li-
censes button. After confirming the revocation, 15-day provisional licenses including the entitle-
ments of each revoked license are created. At the end of those 15 days, Access Manager will no
longer work.
7
WALLIX Access Manager 4.0.7.1 – Administration Guide
/opt/wallix/wabam/bin/wabam-license-list
For example:
/opt/wallix/wabam/bin/wabam-context-file-download -c /tmp/licenses/
wabam_context_file.json
The [--configfile -f] option helps you to define the path to the configuration file and its name.
If the option is not defined, the default configuration file path and name are automatically used.
For example:
/opt/wallix/wabam/bin/license-import -l /root/wallix_license.json
/opt/wallix/wabam/bin/license-revoke
Warning:
After confirming the revocation, 15-day provisional licenses including the entitlements of
each revoked license are created. At the end of those 15 days, Access Manager will no
longer work.
8
WALLIX Access Manager 4.0.7.1 – Administration Guide
Chapter 5. SNMP
Access Manager Appliance includes an embedded SNMP agent with the following properties:
Note:
Port 161 should be opened to allow communication to Access Manager for read/write
access to OIDs.
Port 162 should be opened to allow communication from Access Manager for trap noti-
fications.
A default minimum value set to 20 concurrent connections is required for each port.
From the “SNMP” page on the “System” menu of WALLIX Appliance, you can configure this agent
by defining the related settings:
• “Sysname”: The name of the system, e.g., “WALLIX Access Manager 4.0.7.1”
• “Syscontact”: The email address of the system administrator, in format “[email protected]”
• “Syslocation”: The system location
• “Sysdescr”: A description, if needed. This field is empty by default.
• “Status”: Dropdown list to enable or disable the SNMP agent. The agent is disabled by default.
• “Enable trap notifications”: Check box to enable SNMP trap notifications. Trap notifications are
disabled by default.
• “Trap sink”: The address of the receiver. This field is displayed and required when trap notifica-
tions are enabled.
• “Authentication passphrase”: The authentication passphrase. This field must be longer than 8
characters. The authentication passphrase must be set at the same time as the encryption
passphrase.
• “Encryption passphrase”: The secret key for encryption. This field must be longer than 8 charac-
ters. The encryption passphrase must be set at the same time as the authentication passphrase.
9
WALLIX Access Manager 4.0.7.1 – Administration Guide
• “Trap receiver configuration”: This sub-section is displayed when trap notifications have been
enabled and the SNMP protocol version 2c has been disabled. It consists of the following fields:
– “Trap user”: The user name used to authenticate on the trap receiver. This field is empty by
default.
– “Security level”: Button to select the appropriate security level and specify the related fields
depending on the selection.
If “Authentication only” is selected, enter and confirm the authentication passphrase and select
the authentication ciphering scheme (SHA or MD5).
If “Authentication and encryption” is selected, enter and confirm both the authentication and
encryption passphrases and select the related ciphering schemes (SHA or MD5 for authenti-
cation and AES or DES for encryption).
• “Disk consumption”: The percentage value related to the disk consumption. Notifications are sent
when the disk consumption exceeds this value.
• “Average CPU load”: The percentage values related to the average CPU load for 1-minute, 5-
minute and 15-minute time slices. Notifications are sent when these values are exceeded.
The values entered in this section can be reset by clicking on the “Reset default threshold values”
button on the botton-left of the section.
Warning:
By default, the SNMP agent is disabled and can only be enabled via the Web interface.
By default, trap notifications are disabled and they can only be enabled via the Web
interface. When enabled, only acknowledged traps (i.e. INFORM traps) are sent.
By default, the SNMP protocol version 2c is disabled on a fresh Access Manager and
can only be enabled via the Web interface.
The SNMP protocol version 3 is always enabled. However, both authentication and en-
cryption passphrases must be set at the same time for proper operation.
When Access Managers are configured in HA mode, the SNMP agent monitors all the
nodes via the virtual IP address.
10
WALLIX Access Manager 4.0.7.1 – Administration Guide
Warning:
The system OIDs are defined in the MIB “SNMPv2-MIB”. Please make sure this MIB is
installed on your client environment.
11
WALLIX Access Manager 4.0.7.1 – Administration Guide
The [--help -h] option displays the help message listing the arguments that can be used.
The [--after -a /(\d{2}|\d{4})-\d{2}-\d{2}/] option allows you to get information
posterior to the date specified. The format is as follows: YYYY-MM-DD or YY-MM-DD.
The option [--type -t value] allows to specify the information to be returned. The returned
information corresponds to one of the following values:
• NB_USERS: number of distinct users who have connected to Access Manager over a period of
time
• NB_TARGET: number of distinct connections to targets over a period of time
• NB_CONCURRENT_USERS: maximum number of users who have connected simultaneously to
Access Manager over a period of time (only for a MySQL database)
• NB_RDP_SESSION_OPENED: number of RDP sessions opened over a period of time
• NB_VNC_SESSION_OPENED: number of VNC sessions opened over a period of time
• NB_SSH_SESSION_OPENED: number of SSH sessions opened over a period of time
• NB_SFTP_SESSION_OPENED: number of SFTP sessions opened over a period of time
• NB_SCP_UP_DOWN: number of uploads and downloads via SCP
• NB_REMOTE_COMMAND: number of remote commands executed
• ALL: all data listed above
12
WALLIX Access Manager 4.0.7.1 – Administration Guide
• Language: The interface display language chosen by the logged-in user. Another language can
be selected from the list.
• Approval Time Zone: The time zone of the user. This attribute allows for optimal synchroniza-
tion of the steps of the approval workflow when WALLIX Access Manager and WALLIX Bastion
are running in different time zones. If this parameter is not defined, then the default time zone set
in the wabam.properties file is used during approval workflows.
This default time zone can be changed by editing the parameter approval.time.zone para-
meter in the wabam.properties file which is available in the configuration directory: /etc/
opt/wallix/wabam on Linux and C:\ProgramData\Wallix\wabam\conf on Windows.
Warning:
The parameter approval.time.zone must be configured with the time zone
of the server to ensure proper synchronization of approvals. If the parameter
approval.time.zone does not exist in the wabam.properties file or if no default
time zone is entered for this parameter, then WALLIX Access Manager uses the time
zone of the server on which it runs.
The Access Manager service must be restarted after changing the parameters in the
wabam.properties file.
13
WALLIX Access Manager 4.0.7.1 – Administration Guide
• Hierarchy of Tag Tree Structure for Passwords: The hierarchy of the folders in the
tree structure, on the “Tag Explorer” tab, defined by the logged-in user. This hierarchy is defined
by the tag key names separated by the “/” character. The key names are case sensitive. If this
attribute is not defined, then the hierarchy of the folders in the tree structure will be the default
one or will be the hierarchy defined by the administrator of the organization.
• Tab Displayed by Default for Authorizations: The tab displayed by default on the
“Sessions” and “Passwords” pages of the “Authorizations” menu.
• Target Password Saved for Account Mapping with SAML: The password used to
automatically log in to the target in the case of an account mapping-base authentication with
SAML. Note that the password is not stored in Access Manager and is only available for the
duration of the user's session. If the field is not specified, the password will be requested when
connecting to the target.
Once the password is saved, it can be changed by setting the “Update Target Password Saved
for Account Mapping with SAML” button to “Yes” and then entering the new password.
• Short Title in Session Tabs: The format of the title displayed in the browser tab for
the RDP, SSH and SFTP sessions. By enabling this attribute, the format of the title will be
“login@target name” instead of the full authorization name. If this field is not selected, the format
of the title will be the one defined by the administrator of the organization.
• Keyboard Layout for Application Sessions, RDP and VNC Sessions: The keyboard
language for the application sessions and the RDP and VNC sessions, selected by the logged-
in user before connecting to the target. If this field is not selected, the language of the keyboard
is the last value selected or, if no value was previously selected, the American keyboard. At the
opening of a session:
– the keyboard layout of the RDP target will correspond to the keyboard layout selected in the
user preferences
– the keyboard layout of the application session and VNC target will correspond to the keyboard
layout selected in the user preferences, and must also correspond to the keyboard layout of
the system.
The keyboard language can be changed in the RDP session via the dedicated option in the
header bar. After changing the language, the keyboard layout of the RDP target must correspond
to the keyboard layout selected in the user preferences and to the target language.
Note:
The keyboard language cannot be changed in a current application session and VNC
session. To change the language, it is necessary to disconnect from the session.
• Shell Theme for SSH Session: The SSH session theme chosen by the logged-in user.
Three themes are available: “Dark” (default theme), “Light” and “Black and white”. The theme can
also be selected in the SSH session via the dedicated option located in the header bar.
• Show Scrollbar in RLOGIN, SSH and TELNET Session: Toggle button to display a
vertical scrollbar in the RLOGIN, SSH and TELNET sessions.
• Copy/Paste of Text via PuTTY Mode for SSH Session: The PuTTY mode to copy-
paste text in the SSH session using the mouse. This mode is, however, not supported in Mozilla
Firefox. To use this mode:
1. Select the text by holding down the left mouse button.
2. Release the mouse button to copy the text to the clipboard.
14
WALLIX Access Manager 4.0.7.1 – Administration Guide
3. Move the cursor to the desired location and right-click to paste the copied text.
15
WALLIX Access Manager 4.0.7.1 – Administration Guide
Organizations can be added from the “Organizations” page accessible from the “Configuration”
menu.
• Name: The name of the organization as it will be displayed in the application. This is a string of
length between 1 and 128 characters.
• Identifier: A mandatory string of length between 1 and 64 characters. The authorized char-
acters are uppercase and lowercase Latin alphabetical characters (A to Z). The identifier is used
either as a path element of the URL just after the context path or as the first element of the fully
qualified domain name (FQDN) of the host. Access Manager searches first in the path and then
in the FQDN to identify the organization to use for the connection.
Examples:
– https://mycompany.tld/wabam/myorg: In this example, the context path is wabam. The
URL refers to myorg as organization. The FQDN mycompany.tld is used for all organiza-
tions.
– https://myorg.mycompany.tld/wabam: In this example, the FQDN
myorg.mycompany.tld refers to myorg as organization.
If no identifier is mentioned in the URL, then Access Manager will apply the following rule:
– if there is only the global organization, Access Manager automatically redirects the user to the
latter
– if there is a single local organization, Access Manager automatically redirects the user to the
latter
– if there are several local organizations, Access Manager then prompts the user to enter the
relevant organization in the URL.
• Default Domain: The domain to use if no domain is provided in the URL as explained in
Chapter 9, Authentication domains.
• Local Domain Name: The name to use for referencing the local domain, mainly for the local
parameter of the URL as explained in Chapter 9, Authentication domains.
• Password Policy: The password policy to use for the organization. For further information,
refer to Section 8.3, “Password policies”.
• Theme: The theme to use for the organization. For further information, refer to Section 8.4,
“Themes”.
• CA Certificate : The certificate issued from the Certificate Authority used for the organization
to check the signature of the client certificate.
16
WALLIX Access Manager 4.0.7.1 – Administration Guide
When editing the organization, the expandable area Authenticators Associated with Lo-
cal Domain is displayed at the bottom of the page. This area allows the local domain to be asso-
ciated with the available authenticators when configuring a single-factor or a multi-factor authenti-
cation. These authenticators are the LDAP, RADIUS and BASTION servers configured for the or-
ganization in Access Manager. For further information, refer to Section 9.2.2, “Configuration of the
LDAP server”, Chapter 10, RADIUS authentication and Chapter 12, Bastions.
The field Login type indicates the format of the login used for the authentication.
The field Factor defines the order in which the authenticators are queried during the authentication.
Each authenticator used for the authentication must return a positive response in the order which
has been defined. The authentication succeeds when all the authenticators are validated. If an
authenticator fails, then the authentication fails.
The field Priority defines the order in which the authenticators with the same factor are used for
High-availability (HA). If the first server does not return a response, then the next one is queried
until a response is returned. If no server responds, the authentication fails.
From the list displayed on the “Organizations” page, it is possible to:
• duplicate an existing organization by clicking on the Duplicate icon at the beginning of the
concerned row or right-clicking on the row to display a contextual menu with the Duplicate
option. The organization creation window is then displayed and the form is pre-filled with the
parameters of the chosen one. The required field(s) must be specified for the new organization.
• delete an existing organization by right-clicking on the concerned row: a contextual menu is dis-
played and the Delete option must be selected. Access Manager displays a dialogue box re-
questing a confirmation before permanently deleting the row.
17
WALLIX Access Manager 4.0.7.1 – Administration Guide
Password policies can be added from the “Password Policies” page accessible from the “Configu-
ration” menu.
A password policy is defined by the following attributes:
From the list displayed on the “Password Policies” page, it is possible to:
• duplicate an existing password policy by clicking on the Duplicate icon at the beginning of the
concerned row or right-clicking on the row to display a contextual menu with the Duplicate
option. The password policy creation window is then displayed and the form is pre-filled with the
parameters of the chosen one. The required field(s) must be specified for the new password
policy.
• delete an existing password policy by right-clicking on the concerned row: a contextual menu is
displayed and the Delete option must be selected. Access Manager displays a dialogue box
requesting a confirmation before permanently deleting the row.
8.4. Themes
Access Manager offers the possibility to set a custom theme by organization. Multiple themes can
be defined by organizations, however only a single one can be active.
The active theme is defined in the Theme field of the organization selected from the “Organizations”
page accessible from the “Configuration” menu.
A theme is defined by the following attributes on the Logos, the Colors and the Tag Colors tabs:
18
WALLIX Access Manager 4.0.7.1 – Administration Guide
The “menu” icon on the bottom-left provides several actions for helping theme creation:
• Try It: Use the theme temporarily. To revert to the previous theme, just click on the drawbar
eye icon on the header of the page.
This action is only available during the modification of an existing theme.
• Fill the form with built-in theme parameters: This action can be used to fill the
form with the parameters of the Access Manager default theme.
• Export as XML: This action can be used to download the parameters of the theme as an XML
format file.
• Import from XML: This action can be used to upload from an XML format file the parameters
to be used during the creation of a theme or the modification of an existing one.
• duplicate an existing theme by clicking on the Duplicate icon at the beginning of the concerned
row or right-clicking on the row to display a contextual menu with the Duplicate option. The
theme creation window is then displayed and the form is pre-filled with the theme parameters for
the current session. The required field(s) must be specified for the new theme.
• delete an existing theme by right-clicking on the concerned row: a contextual menu is displayed
and the Delete option must be selected. Access Manager displays a dialogue box requesting
a confirmation before permanently deleting the row.
19
WALLIX Access Manager 4.0.7.1 – Administration Guide
When connecting to Access Manager, the domain is provided in the URLas a parameter.
It is possible to choose a default domain for an organization by editing the Default Domain field
of the organization selected on the “Organizations” page accessible from the “Configuration” menu.
Local domains can be edited from the “Domains” page accessible from the “Configuration” menu.
From the list displayed on this page, it is necessary to click on the desired local domain to display
the modification window.
• Name: The name of the local domain in the system. This is a string of length between 1 and 64
characters. The name of this domain can be changed by editing the Local Domain Name field of
the organization selected on the “Organizations” page accessible from the “Configuration” menu.
• Default Profile: The default profile set if there is no matching with an Access Manager profile
in the directory. Access Manager searches for the user's groups and associates this user with
the profiles which have the same names as his or her groups. On Active Directory, groups are
searched recursively.
• Associated Authenticators: This expandable area allows the local domain to be associ-
ated with the available authenticators when configuring a single-factor or a multi-factor authenti-
cation. These authenticators are the LDAP, RADIUS and BASTION servers configured for the
organization in Access Manager. For further information, refer to Section 9.2.2, “Configuration of
the LDAP server”, Chapter 10, RADIUS authentication and Chapter 12, Bastions.
The field Login type indicates the format of the login used for the authentication.
The field Factor defines the order in which the authenticators are queried during the authentica-
tion. Each authenticator used for the authentication must return a positive response in the order
which has been defined. The authentication succeeds when all the authenticators are validated.
If an authenticator fails, then the authentication fails.
20
WALLIX Access Manager 4.0.7.1 – Administration Guide
The field Priority defines the order in which the authenticators with the same factor are used
for High-availability (HA). If the first server does not return a response, then the next one is queried
until a response is returned. If no server responds, the authentication fails.
The field Factor Used for Account Mapping defines the authentication factor which will
be used during an account mapping authentication in a multi-factor authentication.
Note:
When authenticating on a local domain, the user can associate the login and the domain
name in the Login field with the following syntax: “local\admin” or “admin@local”.
• Name: The name of the LDAP domain in the system. This is a string of length between 1 and
64 characters.
If this authentication mode is used in Access Manager together with an authentication through
an LDAP domain in WALLIX Bastion, then domain names defined in both products must match.
• Schema Type: The type of schema of the LDAP domain, either Active Directory, NIS or X500.
Default schema attributes can be overwritten by clicking on the Pencil icon.
• Allow X509 Cert. Authentication: Toggle button to tell Access Manager to allow X509
certificate authentication for the LDAP user on the login screen when connecting on the LDAP
domain. This button is only available when Active Directory is selected as the Schema
Type. For further information, refer to Section 9.2.4, “X509 authentication”.
• Default Profile: The default profile set if there is no matching with an Access Manager profile
in the directory. Access Manager searches for the user's groups and associates this user with
the profiles which have the same names as his or her groups. On Active Directory, groups are
searched recursively.
• Default Language: The default language to set if no language is found in the directory.
• Associated Authenticators: This expandable area allows the LDAP domain to be associ-
ated with the available authenticators when configuring a single-factor or a multi-factor authenti-
cation. These authenticators are the LDAP, RADIUS and BASTION servers configured for the
organization in Access Manager. For further information, refer to Section 9.2.2, “Configuration of
the LDAP server”, Chapter 10, RADIUS authentication and Chapter 12, Bastions.
21
WALLIX Access Manager 4.0.7.1 – Administration Guide
The field Login type indicates the format of the login used for the authentication.
The field Factor defines the order in which the authenticators are queried during the authentica-
tion. Each authenticator used for the authentication must return a positive response in the order
which has been defined. The authentication succeeds when all the authenticators are validated.
If an authenticator fails, then the authentication fails.
The field Priority defines the order in which the authenticators with the same factor are used
for High-availability (HA). If the first server does not return a response, then the next one is queried
until a response is returned. If no server responds, the authentication fails.
The field Factor Used for Account Mapping defines the authentication factor which will
be used during an account mapping authentication in a multi-factor authentication.
• Associated Identifiers: This expandable area allows the local domain to be associated
with the available identifiers when configuring a multi-factor authentication.
The field Login type indicates the format of the login used for the authentication.
The field Priority defines the order in which the identifiers are queried for High-availability
(HA). For load-balancing, the same priority can be set to several identifiers. In that case, for each
identification, the order in which the servers are queried is random. If the first server does not
return a response, then the next one is queried until a response is received. If no server responds,
the identification and thus the user connection fail.
• duplicate an existing LDAP domain by clicking on the Duplicate icon at the beginning of the
concerned row or right-clicking on the row to display a contextual menu with the Duplicate op-
tion. The domain creation window is then displayed and the form is pre-filled with the parameters
of the chosen one. The required field(s) must be specified for the new domain.
• delete an existing LDAP domain by right-clicking on the concerned row: a contextual menu is
displayed and the Delete option must be selected. Access Manager displays a dialogue box
requesting a confirmation before permanently deleting the row.
Note:
When authenticating on an LDAP domain, the user can associate the login and
the domain name in the Login field with the following syntax: “local\admin” or
“admin@local”.
• Name: The name of the server in the system. This is a string of length between 1 and 64 char-
acters.
22
WALLIX Access Manager 4.0.7.1 – Administration Guide
• Encryption Method: There are three different methods: No Encryption, SSL, StartTLS.
• Authentication Method: There are two different methods: No Authentication for anony-
mous binding and Simple Authentication. For the latter, two other attributes are required to
define the binding identity: Bind DN (string of length between 1 and 228 characters) and Bind
Password (string of length between 1 and 228 characters).
• Base DN: Used to restrict the queries to a sub-tree of the directory.
• Connection Timeout (s): Number of seconds to wait for an answer from the LDAP server.
• Allow LDAP user to change password: Toggle button to tell Access Manager to allow
the password change for the LDAP user on the login screen when required by the LDAP server
(this requires the bind user to be granted the reset password permission and the LDAP server to
be reachable via an SSL connection on port 636).
• Verify LDAP Server Certificate: Toggle button to tell Access Manager to verify that
the LDAP server certificate is valid and issued by the Certificate Authority, whose certificate has
been loaded in the CA Certificate field of the “Organizations” page, accessible from the
“Configuration” menu.
Note:
We recommend to load only one certificate in the CA Certificate field in the “Or-
ganizations” page. For further information, refer to Chapter 8, Multi-tenancy and orga-
nizations.
• Login Type: The format of the login used for the authentication. The three login types are the
following: simple login, domain or email address.
Note:
When authenticating with an email address, the Email Attribute field (accessible
in the “LDAP Domain” page after clicking on the Pencil icon) must be specified with
the email address which will be used to authenticate to the LDAP server.
If this authentication mode is used in Access Manager together with an authentication through
an LDAP domain in WALLIX Bastion, then domain names defined in both products must match.
The Test Connection button allows to test the connection to the LDAP server.
Once the LDAP server added and configured, it is necessary to go to the “Domains” page in order
to associate the LDAP server with the available authenticators and identifiers. These are the other
LDAP servers and RADIUS servers configured for the organization in Access Manager. For further
information, refer to Section 9.2.1, “Configuration of the LDAP domain”.
From the list displayed on the “LDAP Servers” page, it is possible to:
• duplicate an existing LDAP server by clicking on the Duplicate icon at the beginning of the
concerned row or right-clicking on the row to display a contextual menu with the Duplicate
option. The LDAP server creation window is then displayed and the form is pre-filled with the
parameters of the chosen one. The required field(s) must be specified for the new LDAP server.
• delete an existing LDAP server by right-clicking on the concerned row: a contextual menu is
displayed and the Delete option must be selected. Access Manager displays a dialogue box
requesting a confirmation before permanently deleting the row.
23
WALLIX Access Manager 4.0.7.1 – Administration Guide
The user attributes which can be retrieved from the directory are listed in Table 9.2, “Default user
attributes per schema type”.
The second query retrieves the user groups. Its custom part describes how to check for user mem-
bership. A specific syntax is available to define by which attribute a user is identified in a group. The
attribute name should be enclosed between ${ and }. The table lists the Group Filter value
per schema type.
LDAP usernames containing the special characters " + < > # are not supported by
Access Manager.
X509 authentication can be provided to the LDAP domain user together with the login/password
authentication on the login screen of Access Manager when the following configuration is imple-
mented:
• first, the following settings must be performed in the file wabam.properties available in the
configuration directory which is, by default, /etc/opt/wallix/wabam on Linux and C:\Pro-
gramData\Wallix\wabam\conf on Windows.
24
WALLIX Access Manager 4.0.7.1 – Administration Guide
Data of the client certificate is then checked against data of the Active Directory during authentica-
tion to retrieve the user data (language, profiles, etc.).
Security Assertion Markup Language (SAML) is an XML-based data format for exchanging au-
thentication and authorization data between parties, in particular, between an Identity Provider and
a Service Provider. Access Manager supports SAML 2.0 standard authentication mode but not
the SAML Artifacts-based mode. Access Manager implements the authentication bindings through
browser redirection and POST-based communication.
Access Manager acts as a Service Provider (SP). An SAML domain supports a set of SAML Iden-
tity Providers (IdP). Within a domain, each server is considered equivalent to any other server,
therefore Access Manager uses indifferently any server from the domain to provide high-availability
capabilities.
Access Manager supports both IdP-initiated and SP-initiated connection modes.
25
WALLIX Access Manager 4.0.7.1 – Administration Guide
• Name: The name of the SAML domain in the system. This is a string of length between 1 and
64 characters.
• Attributes: Mapped IdP-sent SAML Response attributes can be edited by clicking on the
Pencil icon. A mapping is available for the following user attributes:
– Login
– Display Name Attribute
– Email Attribute
– Language Attribute: 2-letter country code (e.g.: “en”, “fr”)
– Profile Attribute
• Default Profile: Default profile set if no matching Access Manager profile can be retrieved
from the IdP-sent SAML Response. Access Manager matches profiles by searching among the
organization's profile names. Access Manager associates a profile with the user when the Access
Manager profile name matches the value contained in the Profile Attribute field.
• Default Language: Default language to set if no supported language is found in the IdP-sent
SAML Response.
• duplicate an existing SAML domain by clicking on the Duplicate icon at the beginning of the
concerned row or right-clicking on the row to display a contextual menu with the Duplicate op-
tion. The domain creation window is then displayed and the form is pre-filled with the parameters
of the chosen one. The required field(s) must be specified for the new domain.
• delete an existing SAML domain by right-clicking on the concerned row: a contextual menu is
displayed and the Delete option must be selected. Access Manager displays a dialogue box
requesting a confirmation before permanently deleting the row.
• Name: Name of the IdP in the system. This is a string of length between 1 and 128 characters.
The Service Provider (i.e. Access Manager) is defined by the following attributes which are
displayed in the related tab:
• WALLIX-AM Entity Id: Name used to refer to Access Manager during exchanges with the IdP.
It corresponds to the entityId field in the Service Provider metadata file (sp-metadata.xml).
• Sign Messages: Toggle button to tell Access Manager to sign the requests sent to the IdP.
• Signing Key & Certificate: Signing key pair configuration status and generation button.
The Pencil icon opens a panel to edit the following attributes:
– Signing Key: Private key used to sign the authentication request sent to the IdP. It can be set
either by using the user interface field or by clicking on the Generate button. The generated
private key cannot be displayed by the user interface. If a specific private key has to be used
instead of a generated one, it is possible to paste it here. It should be in PEM format, without
the headers nor the footers.
26
WALLIX Access Manager 4.0.7.1 – Administration Guide
Warning:
By disabling the attributes Signed Response and Signed Assertion, any user will
be able to connect to Access Manager as an administrator.
A SP metadata file can be downloaded by clicking on the Download button below the Metadata
File field once the SAML Identity Provider entity has been saved. Microsoft ADFS and Shibboleth
directly support this file to define Access Manager as a relying party. This button is only displayed
when editing a SAML Identity Provider.
The Identity Provider is described by the following attributes which are displayed in the related
tab:
An IdP metadata file can be imported to fill in the form directly by clicking on the “Import” icon on
the right upper part of the tab.
• Identity Provider Entity Identifier: Identifier of the IdP during the SAML process. It
corresponds to the entityId attribute of the EntityDescriptor element in the IdP metadata
file (idp-metadata.xml).
• SSO Binding Type: List to select the authentication method.
• Redirect Binding Uri: Uri to which Access Manager redirects the user for authentica-
tion. It corresponds to the Location attribute of the SingleSignOnService element for
the urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect binding. This field is dis-
played when Redirect has been selected from the list in SSO Binding Type.
• Redirect Logout Uri: Uri to which Access Manager sends logout requests to the IdP. This
field is displayed when Redirect has been selected from the list in SSO Binding Type.
27
WALLIX Access Manager 4.0.7.1 – Administration Guide
• POST Binding Uri: Uri to which Access Manager redirects the user when using POST method.
This field is displayed when POST has been selected from the list in SSO Binding Type.
• POST Logout Uri: Uri to which Access Manager sends logout requests to the IdP when using
POST method. This field is displayed when POST has been selected from the list in SSO Binding
Type.
• Identity Provider Validation Certificate: Certificate used to validate signed data
received from the IdP. It corresponds to the certificate located in the KeyDescriptor section
with the use="signing" attribute in the IDPSSODescriptor element in the IdP metadata file
(idp-metadata.xml). The Pencil icon opens a panel to paste a certificate. It should be in
PEM format, without the headers nor the footers.
The related domain and its attributes are defined as follows in the Domain tab:
• Domain Name: Domain to which the Service Provider belongs. This is a string of length between 1
and 64 characters. If SAML domains have already been created for the organization, it is possible
to select one of them by clicking on the Pencil icon.
• Attributes: Mapped IdP-sent SAML Response attributes can be edited by clicking on the
Pencil icon. A mapping is available for the following user attributes:
– Login
– Display Name Attribute
– Email Attribute
– Language Attribute: 2-letter country code (e.g.: “en”, “fr”)
– Profile Attribute
• Default Profile: Default profile set if no matching Access Manager profile can be retrieved
from the IdP-sent SAML Response. Access Manager matches profiles by searching among the
organization's profile names. Access Manager associates a profile with the user when the Access
Manager profile name matches the value contained in the Profile Attribute field.
• Default Language: Default language to set if no supported language is found in the IdP-sent
SAML Response.
From the list displayed on the “SAML Identity Providers” page, it is possible to:
• duplicate an existing SAML IdP by clicking on the Duplicate icon at the beginning of the con-
cerned row or right-clicking on the row to display a contextual menu with the Duplicate option.
The SAML IdP creation window is then displayed and the form is pre-filled with the parameters
of the chosen one. The required field(s) must be specified for the new SAML IdP.
• delete an existing SAML IdP by right-clicking on the concerned row: a contextual menu is dis-
played and the Delete option must be selected. Access Manager displays a dialogue box re-
questing a confirmation before permanently deleting the row.
28
WALLIX Access Manager 4.0.7.1 – Administration Guide
• Name: The name of the bastion domain in the system. This is a string of length between 1 and
64 characters.
• Profile Attribute: The mapped attributes between Access Manager and the bastion. The
administrator must ensure that the profile names defined in Access Manager and the profile and
group names defined in the bastion are the same. A mapping can be defined for the following
user attributes:
– Profile: mapping on the user profile defined in the bastion.
– Group: mapping on the user groups defined in the bastion.
• Default Profile: The default profile set if there is no matching between an Access Manager
profile and a bastion profile or bastion groups.
• Default Language: The default language to set if no language is retrieved from the bastion.
• Associated Authenticators: This expandable area allows the bastion domain to be asso-
ciated with the available authenticators when configuring a single-factor or a multi-factor authen-
tication. These authenticators are the LDAP, RADIUS and BASTION servers configured for the
organization in Access Manager. For further information, refer to Section 9.2.2, “Configuration of
the LDAP server”, Chapter 10, RADIUS authentication and Chapter 12, Bastions.
The field Login type indicates the format of the login used for the authentication. Only the
“Simple login” type is allowed for a bastion domain.
The field Factor defines the order in which the authenticators are queried during the authentica-
tion. Each authenticator used for the authentication must return a positive response in the order
which has been defined. The authentication succeeds when all the authenticators are validated.
If an authenticator fails, then the authentication fails.
The field Priority defines the order in which the authenticators with the same factor are used
for High-availability (HA). If the first server does not return a response, then the next one is queried
until a response is returned. If no server responds, the authentication fails.
The field Factor Used for Account Mapping defines the authentication factor which will
be used during an account mapping authentication in a multi-factor authentication.
• Associated Identifiers: This expandable area allows the bastion domain to be associated
with the available identifiers when configuring a multi-factor authentication.
The field Login type indicates the format of the login used for the authentication. Only the
“Simple login” type is allowed for a bastion domain.
The field Priority defines the order in which the identifiers are queried for High-availability
(HA). For load-balancing, the same priority can be set to several identifiers. In that case, for each
identification, the order in which the servers are queried is random. If the first server does not
return a response, then the next one is queried until a response is received. If no server responds,
the identification and thus the user connection fail.
• duplicate an existing bastion domain by clicking on the Duplicate icon at the beginning of the
concerned row or right-clicking on the row to display a contextual menu with the Duplicate op-
tion. The domain creation window is then displayed and the form is pre-filled with the parameters
of the chosen one. The required field(s) must be specified for the new domain.
• delete an existing bastion domain by right-clicking on the concerned row: a contextual menu is
displayed and the Delete option must be selected. Access Manager displays a dialogue box
requesting a confirmation before permanently deleting the row.
29
WALLIX Access Manager 4.0.7.1 – Administration Guide
Note:
When authenticating on a bastion domain, the user can associate the login and
the domain name in the Login field with the following syntax: “local\admin” or
“admin@local”.
The attributes to be defined to declare a bastion as an authenticator and identifier are the following:
30
WALLIX Access Manager 4.0.7.1 – Administration Guide
RADIUS servers can be defined for an organization in Access Manager to provide users with
RADIUS authentication. This authentication is based on PAP or CHAP protocols.
RADIUS authentication servers can be added from the “RADIUS Servers” page accessible from
the “Configuration” menu.
• Name: The name of the server in the system. This is a string of length between 1 and 128 char-
acters.
• Authentication Port: The port of the RADIUS server for authentication; 1812 by default.
• Connection Timeout (s): Number of seconds to wait for an answer from the RADIUS server.
• Login type: The format of the login used for the authentication. The three login types are the
following: simple login, domain or email address.
• Change Shared Secret: Toggle button to change the secret used to cypher transactions
between the RADIUS client and the RADIUS server. Enter the new secret in the dedicated field
which will be displayed when switching on this button. This field is only displayed during the
modification of a RADIUS server.
• Shared Secret: The secret to cypher transactions between the RADIUS client and the RADIUS
server. This field is only displayed during the creation of a RADIUS server.
• NAS Identifier: The Network Access Server (NAS) identifier to identify the RADIUS authen-
tication requests on the RADIUS server.
The Test Connection button allows to test the connection to the RADIUS authentication server.
When editing the RADIUS authentication server, the expandable area Domains using this
server as authenticator is displayed at the bottom of the page. This area lists the names of
the local or LDAP domains configured in Access Manager using this server in their authentication
process. For further information, refer to Chapter 9, Authentication domains.
From the list displayed on the “RADIUS Authentication Servers” page, it is possible to:
• duplicate an existing RADIUS authentication server by clicking on the Duplicate icon at the
beginning of the concerned row or right-clicking on the row to display a contextual menu with
the Duplicate option. The RADIUS authentication server creation window is then displayed
and the form is pre-filled with the parameters of the chosen one. The required field(s) must be
specified for the new RADIUS server.
31
WALLIX Access Manager 4.0.7.1 – Administration Guide
• delete an existing RADIUS authentication server by right-clicking on the concerned row: a con-
textual menu is displayed and the Delete option must be selected. Access Manager displays a
dialogue box requesting a confirmation before permanently deleting the row.
32
WALLIX Access Manager 4.0.7.1 – Administration Guide
11.1. Profiles
A user can have one or several profiles. A profile is a set of rights. Rights control the ability for a
user to perform actions such as the user creation for example, with the right Create User. In
order to be able to open a session on a target, the user profile must be associated with the Target
Access right.
Profiles can be added from the “Profiles” page which can be accessed from the “Configuration”
menu.
The profile Global Administrator is linked by default to the global organization. This profile
provides all the permissions.
The Administrator, Approver, Auditor and Userprofiles are linked by default to a non-global
organization (such as the default organization). They provide specific rights.
• duplicate an existing profile by clicking on the Duplicate icon at the beginning of the concerned
row or right-clicking on the row to display a contextual menu with the Duplicate option. The
profile creation window is then displayed and the form is pre-filled with the parameters of the
chosen one. The required field(s) must be specified for the new profile.
• delete an existing profile by right-clicking on the concerned row: a contextual menu is displayed
and the Delete option must be selected. Access Manager displays a dialogue box requesting
a confirmation before permanently deleting the row.
Local users can be added from the “Users” page which can be accessed from the “Configuration”
menu.
The user identity is defined in the Identity tab by the following attributes:
• Organization: The organization the user belongs to. Only users in the global organization can
create users outside their own organizations.
• Login: The value that the user provides to identify himself or herself. This is a string of length
between 1 and 128 characters. It should not contain either the @ or the \ characters, which are
reserved as domain separators. This login should match the WALLIX Bastion user login in order
to properly retrieve user's authorizations.
• Name: The value displayed to the screen. This is a string of length between 1 and 128 characters.
33
WALLIX Access Manager 4.0.7.1 – Administration Guide
• Email: The email address of the user. This address must respect the format
[email protected].
• Language: The language in which the interface and the messages are displayed to the user.
• Approval Time Zone: The time zone selected by the user in his/her profile. It enables the
optimal synchronization of the steps of the approval workflow when WALLIX Access Manager
and WALLIX Bastion are running in different time zones. If this parameter is not defined, then the
default time zone set in the file wabam.properties is used during approval workflows.
This default time zone can be changed by editing the parameter approval.time.zone in
the file wabam.properties which is available in the configuration directory: /etc/opt/wal-
lix/wabam on Linux and C:\ProgramData\Wallix\wabam\conf on Windows.
Warning:
The parameter approval.time.zone must be configured with the time zone of the
server in order to ensure proper synchronization of the approvals. If the parameter
approval.time.zone does not exist in the file wabam.properties or if no default
time zone is entered for this parameter, then WALLIX Access Manager uses the time
zone of the server on which it is running.
The service Access Manager must be restarted after changing the parameters in the
wabam.properties file.
• Change Password: A toggle button to change the password used to authenticate the user. Enter
and confirm the new password in the dedicated fields. It must comply with the password policy
requirements defined for the organization. For further information, refer to Section 8.3, “Password
policies”.
• Force Password Change: A toggle button to force the password change. At next logon, a
warning message will be displayed to the user and he or she will be forced to change his or her
password.
• Unlock User: A button to release the lock of the user account as the number of login failures
allowed has been exceeded. This number is set in the password policy for the organization. For
further information, refer to Section 8.3, “Password policies”.
• Description: Optional character string (up to 1024 characters) for providing a user description.
The user rights are defined in the Rights tab by the following attributes:
• Profiles: A list of profiles defining the user rights. For further information, refer to Section 11.1,
“Profiles”.
• Restricted Source IPs: A list of IP addresses or subnets using the CIDR notation (<network
address>/<number of mask bits>), from which the user or the administrator from the global orga-
nization is authorized to connect. An empty list means that the user or the administrator from the
global organization can connect from any host.
Important:
Access Manager supports IPv4 and IPv6 address formats.
• duplicate an existing user by clicking on the Duplicate icon at the beginning of the concerned
row or right-clicking on the row to display a contextual menu with the Duplicate option. The user
34
WALLIX Access Manager 4.0.7.1 – Administration Guide
creation window is then displayed and the form is pre-filled with the parameters of the chosen
one. The required field(s) must be specified for the new user.
• delete an existing user by right-clicking on the concerned row: a contextual menu is displayed
and the Delete option must be selected. Access Manager displays a dialogue box requesting
a confirmation before permanently deleting the row.
From the list displayed on the “Users” page, which can be accessed from the “Configuration” menu,
it is possible to:
• identify non-local users: a dedicated icon is displayed in the Login field for users defined from
an SAML Identity Provider or from an LDAP or Active Directory server.
• delete an existing non-local user by right-clicking on the concerned row: a contextual menu is
displayed and the Delete option must be selected. Access Manager displays a dialogue box
requesting a confirmation before permanently deleting the row.
35
WALLIX Access Manager 4.0.7.1 – Administration Guide
• Name: Name of the bastion in Access Manager. This is a string of length between 1 and 128
characters.
• Host: Hostname or IP address of the bastion. It must be the IP address used for the user ser-
vice of WALLIX Bastion. In the case of a multi-interface deployment, WALLIX Bastion can have
different interfaces and IP addresses for the user and the administration services. This is a string
of length between 1 and 228 characters.
• API Key: A WALLIX Bastion REST API key generated from the Web interface of WALLIX Bastion
(from the “Configuration” menu). This field is only displayed during the creation of a bastion.
• Change API Key: Toggle button to provide a new API key. Enter the data in the API Key
field which appears below.
• Reset Bastion Certificate: Toggle button to reset the bastion certificate. It will be replaced
by the next connection to the bastion. This action is required when the certificate is updated on
the bastion.
• Reset SSH Fingerprint: Toggle button to reset the bastion SSH fingerprint. It will be set
by the next SSH session.
• Reset RDP Fingerprint: Toggle button to reset the bastion RDP fingerprint. It will be set
by the next RDP session.
• Cluster: Add the bastion to a cluster. Clusters are used for load-balancing the sessions among
multiple bastions using the same configuration. The administrator should ensure that the config-
uration of the authorizations with the same names must match within all the cluster's bastions.
The load-balancing is performed by selecting the bastion hosting the lowest number of opened
sessions within the Access Manager farm. For further information, refer to Chapter 19, Scalability
and High-availability. When a bastion is part of a cluster, its authorizations are no longer listed
under its name, but under the cluster name. Clusters are not compatible with the feature allowing
the display of the target passwords. However it can be used with an external vault.
A + button is provided to add a new cluster and a Pencil icon is provided to rename an existing
cluster.
• Strip Domain: Toggle button to strip the domain part (i.e. @domain) from the user login for
non-local Access Manager users to be authenticated on the bastion. Thus local WALLIX Bastion
users declared in external authentication mode can be mapped with external Access Manager
users to retrieve their corresponding authorizations.
• Approval Time Zone: List to select the time zone of the bastion. It enables the optimal syn-
chronization of the steps of the approval workflow when WALLIX Access Manager and WALLIX
Bastion are running in different time zones. If the version of the Bastion is 8.1 or higher, the time
zone is automatically updated with the bastion's time zone when the connection is tested via
36
WALLIX Access Manager 4.0.7.1 – Administration Guide
the Test Connection button or when saving this configuration. If the version of the Bastion
is earlier than 8.1 and no default time zone is selected then the default time zone set in the file
wabam.properties is used during approval workflows.
The default time zone can be changed by editing the parameter approval.time.zone in
the file wabam.properties which is available in the configuration directory: /etc/opt/wal-
lix/wabam on Linux and C:\ProgramData\Wallix\wabam\conf on Windows.
Warning:
The parameter approval.time.zone must be configured with the time zone of the
server in order to ensure proper synchronization of the approvals. If the parameter
approval.time.zone does not exist in the file wabam.properties or if no default
time zone is entered for this parameter, then WALLIX Access Manager uses the time
zone of the server on which it is running.
The service Access Manager must be restarted after changing the parameters in the
wabam.properties file.
• API Version: Access Manager automatically detects the API version compatible with this bas-
tion. This detection may be done when the connection is tested via the Test Connection but-
ton.
• Allow Session Search: Toggle button to enable session audit data retrieval on the “Session
Audit” page accessible from the “Audit” menu. For further information, refer to Chapter 18, Session
audit data.
• Search Start Date: This field is displayed when the session audit data retrieval is enabled
via the Allow Session Search field. The start date from which the sessions can be retrieved
must be entered. A calendar is available by clicking into the frame.
• Login: This field is displayed when the session audit data retrieval is enabled via the Allow
Session Search field. The login of the bastion's user allowed to retrieve session audit data
must be entered. This user is linked to the Auditor profile.
• Use as an authenticator/identifier: Toggle button to tell Access Manager to use the
bastion as an authenticator and identifier. For further information, refer to Section 9.4, “Bastion
domains ”.
• Name: List to select the name of the bastion domain created on the “Domain” page. This field is
displayed when the attribute Use as an authenticator/identifier is enabled.
• Login Type: List to select the login type used for the authentication on the bastion domain. Only
the “Simple login” type is allowed for a bastion domain. This field is displayed when the attribute
Use as an authenticator/identifier is enabled.
The Test Connection button allows to test the connection to the bastion for the current user
or another user.
• duplicate an existing bastion by clicking on the Duplicate icon at the beginning of the concerned
row or right-clicking on the row to display a contextual menu with the Duplicate option. The
bastion creation window is then displayed and the form is pre-filled with the parameters of the
chosen one. The required field(s) must be specified for the new bastion.
• delete an existing bastion by right-clicking on the concerned row: a contextual menu is displayed
and the Delete option must be selected. Access Manager displays a dialogue box requesting
a confirmation before permanently deleting the row.
37
WALLIX Access Manager 4.0.7.1 – Administration Guide
Note:
In case of synchronization failure of the bastion or incorrect configuration of Access Man-
ager, the previously synchronized authorizations are not deleted to ensure minimum ser-
vice.
• When a given folder is selected on the tree structure, the user can filter the corresponding autho-
rizations displayed in the table by entering data in the upper area so as to restrict the display to
the relevant rows. When searching for authorizations via tags, the user must use the following
syntax: “tag:key:value”. Note that the syntax is case sensitive.
• The user can manage filing for his or her authorizations by using the dedicated icons to create,
edit or delete folders into which authorizations can be filed. The folders displayed on the tree
structure are private to a user. An empty folder is characterized by a transparent folder icon. Note
that the same folder related to a given target group may contain authorizations for sessions but
may be empty for password authorizations and vice versa.
• The user can move the authorizations from the table to any folder on the tree structure by per-
forming a drag-and-drop operation with the cursor at the beginning of the concerned row. In order
to restore the authorizations to their initial location, the user can click on the Return Autho-
rizations to Default Folder icon.
• The Synchronize icon allows to refresh and retrieve up-to-date authorizations without modifying
the customized folder layout.
• The user can retrieve the relevant authorizations regarding sessions or passwords by entering
data in the dedicated area. When searching for authorizations via tags, the user must use the
following syntax: “tag:key:value”. Note that the syntax is case sensitive. A simple direct click
on the Search button without entering the search area retrieves all the existing authorizations.
• The user can manage filing for the retrieved authorizations. To do so, he or she must select the
relevant rows and click on Move to a folder. On the window displayed, the user can then
select on the tree structure the folder into which the authorizations can be filed. The icons on the
38
WALLIX Access Manager 4.0.7.1 – Administration Guide
window can be clicked to create, edit or delete folders. The folders displayed on the tree structure
are private to a user. An empty folder is characterized by a transparent folder icon. Note that the
same folder related to a given target group may contain authorizations for sessions but may be
empty for password authorizations and vice versa.
• The user can filter the authorizations displayed in the table by entering data in the upper area
so as to restrict the display to the relevant rows. When searching for authorizations via tags, the
user must use the following syntax: “tag:key:value”. Note that the syntax is case sensitive.
• The user can sort in ascending or descending order the tags in the “Information” column of the
table in order to display the relevant information more efficiently. To do so, he or she must click
on the desired tag to define the sort order, symbolized by an arrow.
• The Expand All and Collapse All icons allow the user to expand or collapse all the folders
of the tree structure.
• The Synchronize icon allows the user to refresh and retrieve up-to-date authorizations without
modifying the customized folder layout.
Authorizations on sessions can be accessed from the “Sessions” page and are only available to
users whose profile is associated with the Target Access right.
From the “Sessions” page, the user can connect to the target using the SSH, RDP or RAWTCP/IP
client tools bundle in the application. To do so, he or she must select the appropriate authorization
folder from the tree structure on the Explorer or Tag Explorer tabs, then click on the icon at
the beginning of the desired authorization row.
When the authorization concerns a RAWTCP/IP service, it is necessary to download the AM Uni-
versal Tunneling client, displayed at the top of the page. The Windows version of the AM Universal
Tunneling client is a package containing the executable files of the AM Universal Tunneling client
and IPloop. In order to execute the AM Universal Tunneling client, it is necessary to unzip the exe-
cutable files and place them in the same directory.
Warning:
The AM Universal Tunneling client connects to the Access Manager server using TLS
and checks the validity of the server certificate to allow the connection to the target. To
do this, some prerequisites are required:
• The Certificate Authority which issued the server certificate must be saved in the trust
store of the workstation operating system.
• The HTTPS certificate used by the Access Manager server must have at least one
Subject Alternative Name field specified with the DNS used to connect to the
Access Manager server.
39
WALLIX Access Manager 4.0.7.1 – Administration Guide
Once the AM Universal Tunneling client has been downloaded, the user must click on the icon of
the desired authorization to specify a popup window and then to download the Universal Tunneling
configuration file. This Universal Tunneling configuration file contains the target connection infor-
mation and an OTP, which will be used to open a session on the target.
From the popup window, it is possible to:
• change the port that will be opened locally on the user's workstation for the redirection via Univer-
sal Tunneling. This field is automatically entered with the target port for WALLIX Bastion version
10.0 or higher. Otherwise, the field is entered with a random port.
• select the IP address format (IPv4 or IPv6)
• accept connections to the local port from other stations. If disabled, the local port is opened only
on the loopback address (127.0.0.1 or [::1]). If activated, the port is open for all network interfaces
of the user's station (0.0.0.0 or [::]). When this parameter is activated, running the AM Universal
Tunneling client may require higher privileges.
• activate the debug mode, in order to launch the AM Universal Tunneling client in debug mode.
The logs are stored in a file with the same name as the downloaded configuration file, followed
by the .log extension.
• use the IP address of the target as the loopback address on the user's station. When this para-
meter is activated, running the AM Universal Tunneling client may require higher privileges.
Note:
AM Universal Tunneling supports TIA Portal with Bastion version 10.0 or higher. To con-
nect to a TIA Portal target, the parameters of the Universal Tunneling configuration file
must be configured as follows:
• Port used for redirection via Universal Tunneling must be port 102
• Local ports accept connections from other posts must be set to No
• Map target IP to loopback address must be set to Yes
Note:
The user can open an RDP session or an application as an administrator if the
rdp.option.admin.enabled parameter has been enabled in the RDP expandable
section on the “Settings” page. In this case, he or she must click on the small orange icon
appearing on the corner of the icon at the beginning of the authorization row.
The user can copy-paste text and files between multiple RDP sessions. They can also
drag and drop files between their workstation and the target. These actions are possible
if the rdp.shared.clipboard parameter has been enabled in the RDP expandable
section on the “Settings” page. When this parameter is enabled, the Clipboard menu
is not displayed in the session. Please note that Mozilla Firefox does not allow text to be
copied and pasted directly from the user's workstation to the RDP session.
It is only possible to copy-paste and to drag-and-drop one set of files at a time via the
clipboard.
If an approval workflow has been defined in WALLIX Bastion to be allowed to connect to the target,
the user must send an approval request on the Approval Request window and notify approvers to
be granted access. For further information, refer to Section 13.4, “Management of approval requests
by the user”.
40
WALLIX Access Manager 4.0.7.1 – Administration Guide
From the “Passwords” page, the user can view the account's credentials (login, password and SSH
key) on a dedicated window. To do so, he or she must select the appropriate authorization file from
the tree structure on the Explorer or Tag Explorer tabs, then click on the padlock icon at the
beginning of the desired authorization row.
• The user can click on the red eye icon on the right of the Password field (if displayed) and choose
a duration to display the password. The password becomes unreadable when the duration has
elapsed.
• The user can copy the account credentials into the clipboard by clicking on the Copy icon in front
of each field.
• If the lock has been enabled at the level of the checkout policy associated with this target ac-
count in WALLIX Bastion, the user must click on the Check-in button on the window to release
the account before the end of checkout duration. Nonetheless, the account will be automatically
checked-in at the end of the checkout duration. The checkout duration has been defined at the
level of the checkout policy in WALLIX Bastion.
• The user can download the file containing the private key (if any defined) for SSH connection. A
toggle button allows the selection of the OpenSSH or Putty format before clicking on the Down-
load icon on the right of the SSH Private Key field.
If an approval workflow has been defined in WALLIX Bastion to be allowed to access the target's
password, the user must send an approval request on the Approval Request window and notify
approvers to be able to view the password. For further information, refer to Section 13.4, “Manage-
ment of approval requests by the user”.
Only users whose profile is associated with the View Approval Request, Create Approval
Request and Update Approval Request rights can make approval requests from their autho-
rizations and view the status of the requests on the “Approval Requests” page accessible from the
“Approval” menu.
When a user connects to an RDP, SSH or RAWTCPIP target from an authorization on the “Ses-
sions” page, Access Manager displays the Approval Request window to send the request. This
approval request includes the following attributes:
41
WALLIX Access Manager 4.0.7.1 – Administration Guide
• Start Date: Start date and time from which access is requested. By default, this is the current
date and time. A calendar is available to modify this data by clicking inside the frame.
• Hours | Minutes: Duration for which access is requested. The default duration is one hour.
• Ticket Reference: Ticket reference for the approval request. This field can be displayed or
hidden, and its entry can be mandatory or optional depending on the authorization configuration
in WALLIX Bastion.
• Comment: Reason for the approval request. This field can be displayed or hidden, and its entry
can be mandatory or optional depending on the authorization configuration in WALLIX Bastion.
Once the approval request is sent, Access Manager displays a confirmation message. The user
can refresh the page and send a new request by clicking Re-open a session.
The user can then view the status of the approval request on the “Approval Requests” page, acces-
sible from the “Approval” menu. For more information, refer to Section 13.4.3, “Viewing the status
of an approval request”.
Once the request is approved, access to the target is authorized for the duration specified in the
request and for as long as the request remains valid.
• Start Date: Start date and time from which access is requested. By default, this is the current
date and time. A calendar is available to modify this data by clicking inside the frame.
• Hours | Minutes: Duration for which access is requested. The default duration is one hour.
• Ticket Reference: Ticket reference for the approval request. This field can be displayed or
hidden, and its entry can be mandatory or optional depending on the authorization configuration
in WALLIX Bastion.
• Comment: Reason for the approval request. This field can be displayed or hidden, and its entry
can be mandatory or optional depending on the authorization configuration in WALLIX Bastion.
The user can then view the status of the approval request on the “Approval Requests” page, acces-
sible from the “Approval” menu. For more information, refer to Section 13.4.3, “Viewing the status
of an approval request”.
Once a request is approved, the user can view the target password for the duration specified in the
request and for as long as the request remains valid.
42
WALLIX Access Manager 4.0.7.1 – Administration Guide
In the search area at the top of the page, the user can enter criteria or keywords to filter the corre-
sponding approval requests. The data is displayed in chronological order by clicking the Search
button.
The user can only view valid requests, i.e. requests whose validity period has not yet expired. These
requests can have one of the following statuses:
• “Pending”: the quorum representing the minimum number of positive answers required for ap-
proval is not yet reached.
• “Accepted”: the quorum is reached. The user is then notified by e-mail and can connect to the
target or consult the password from the authorization, as long as the validity period of the request
has not expired.
• “Rejected”: the approval request has been rejected and is invalidated. The user receives an e-
mail explaining the reason for rejection.
• “Cancelled”: the approved request has been cancelled by the approver before it expires. Access
to the target is no longer possible.
By clicking the information icon at the beginning of the line, the user can view the details of the
answers to the request in the Approval details window. If the request is in “Pending” status,
the user can click the Cancel Approval button to cancel the request.
43
WALLIX Access Manager 4.0.7.1 – Administration Guide
Access Manager updates the data upon login, when an approval is accepted or rejected by an
approver, or when a request is cancelled. However, if the approval is accepted or rejected via the
Bastion, a manual synchronization is necessary to update the current approval requests. The cur-
rent approval requests can be refreshed by using the “Synchronize” button in the upper right corner
of the page, by logging out and logging back in, or when another approval request is submitted.
In the search area at the top of the page, the approver can enter criteria or keywords to filter the cor-
responding approval requests. The data is displayed in chronological order by clicking the Search
button.
The approver can only view valid requests, i.e. requests whose validity period has not yet expired.
These requests can have one of the following statuses:
• “Pending”: the quorum representing the minimum number of positive answers required for ap-
proval is not yet reached.
Note:
When the first approver approves the request and the start date and time have expired:
– the start date and time of the request are set to the date and time of this approval,
– the end date and time of the request are then extended by the duration of the ap-
proval, starting from this validation.
• “Accepted”: the quorum is reached. The user is then authorized to connect to the target, or to
view the password from the authorization, as long as the duration of the request has not expired.
However, the approver can cancel the accepted approval request before it expires, to prevent
the user from accessing the target again.
By clicking the information icon at the beginning of the line, the approver can access the answers
of other approvers in the Approval details window. From this window, the approver can also
accept, reject or cancel the approval request using the appropriate buttons. If the request is in
“Pending” status, the approver can reply by clicking on its status to open the Answer to an
approval request window described below. The approver can:
• enter a mandatory comment to indicate the reason for approving, rejecting or cancelling the re-
quest
• if necessary, reduce the duration of the request by changing the value in the fields
44
WALLIX Access Manager 4.0.7.1 – Administration Guide
• if necessary, reduce the timeout set for the connection by changing the value in the field. If the
user has not connected to the target and this timeout is reached, the “Accepted” request is au-
tomatically “Closed”.
• click the Cancel button to cancel the “Accepted” request before it expires, preventing the user
from accessing the target again
• click the Accept button to approve the “Pending” request and authorize access to the user once
a quorum is reached
• click the Reject button to reject the “Pending” request and deny the user access to the target
By clicking the information icon at the beginning of the line, the approver can view the details of the
answers to the request in the Approval details window.
45
WALLIX Access Manager 4.0.7.1 – Administration Guide
14.1. Settings
From the “Application” tab on the “Settings” page, it is possible to view and edit the application
parameters. These parameters may have a different value depending on the organization.
The display of a parameter depends on the organization type: for example, the expandable section
Bastion is not displayed on the global organization.
The “Baseline Organization” contains all the parameters for the application and can be used as a
reference value.
An administrator from the global organization can edit the parameters of another organization as
well as those of the baseline organization. A list of values is available in the upper part of the page
to select the desired organization. The user can filter the parameters of a given organization by
entering data in the area above the table so as to restrict the display to the relevant rows.
A user from the global organization can view and edit the parameters of any organization and those
of the baseline organization. A list of values is available in the upper part of the page to select the
desired organization. The user can filter the parameters of a given organization by entering data in
the area above the table so as to restrict the display to the relevant rows.
A user from a non-global organization (such as the default organization) has only access to the
parameters of his or her organization. The user can filter the parameters of the organization by
entering data in the area above the table so as to restrict the display to the relevant rows.
A toggle button at the level of each parameter in the expandable sections allows the user to edit
the corresponding value.
All the parameters within a given organization can be reset to the baseline organization values by
clicking on the button Restore baseline organization values at the bottom of the page.
All the parameters of the baseline organization can be reset to their default values by clicking on
the button Restore built-in values at the bottom of the page.
Each modification of a parameter from the application settings can be viewed in the audit logs.
46
WALLIX Access Manager 4.0.7.1 – Administration Guide
The rdp.clipboard.size parameter allows the administrator to specify the maximum number
of characters in the clipboard buffer when copying and pasting from a local computer to an RDP
session.
Note:
The total number of characters that can be shared at once from a local computer to an
RDP session via the clipboard corresponds to the parameter rdp.clipboard.size
multiplied by 10. If the number of characters in the text to be copied is greater than this
value, then the text will be truncated.
Note:
Mozilla Firefox does not allow text to be copied and pasted directly from the user's work-
station to the RDP session.
Warning:
The Access Manager service must be restarted after changing the value of the parameter
session.keepAlive.
Enabling the KeepAlive function has no impact on the parameter
session.maxInactiveInterval.
Note:
Mozilla Firefox does not allow text to be copied and pasted directly from the user's work-
station to the RDP session.
47
WALLIX Access Manager 4.0.7.1 – Administration Guide
The session.short.title.mode parameter allows the administrator to shorten the title of the
browser tab for the RDP, SSH and SFTP sessions. By enabling this parameter, the format of the
title will be “login@target name” instead of the full name of the authorization.
The ut.otp.lifetime parameter allows the administrator to define the lifetime (in seconds) of
the OTP.
The ut.otp.purge.period parameter allows the administrator to define a period (in minutes)
for performing purges of expired and unused OTPs.
The ut.port.range parameter applies to the connection between the Access Manager and the
Bastion. It allows the administrator to define a range of ports available on the Access Manager
server for port forwarding when establishing a RAWTCP session.
The ut.sshtunnel.buffer.size parameter allows the administrator to define the buffer size
used for SSH port forwarding. This parameter should ONLY be changed upon instructions from
WALLIX Support Team.
The ut.websocket.buffer.size parameter allows the administrator to define the buffer size
used for WebSocket port forwarding. This parameter should ONLY be changed upon instructions
from WALLIX Support Team.
This parameter allows to specify the list of cipher suites which are allowed and/or forbidden by the
server, using the syntax of the OpenSSL "ciphers" command.
48
WALLIX Access Manager 4.0.7.1 – Administration Guide
Only an administrator from the global organization can access and edit the “Server Certificate” tab
in “Settings” > “Application Settings”.
Note:
Access Manager restarts automatically after adding a new certificate.
wabam-certificate-update
The --help or -h option lists the arguments that can be used to configure the server certificate:
wabam-certificate-update -h
Note:
Access Manager restarts automatically after adding a new certificate.
49
WALLIX Access Manager 4.0.7.1 – Administration Guide
WALLIXApplianceCertificat certificat.p12
14.3. Logs
Only an administrator from the global organization can access and edit the “Logs” tab on the “Set-
tings” page.
From this tab, it is possible to customize the various log levels for specific events triggered in relation
to the application, configuration, target access or third-party clients. This tab should be used under
the guidance of the product Support Team as it may be useful for troubleshooting.
The user can filter the log levels by entering data in the area above the table so as to restrict the
display to the relevant rows.
• individually for each module: a toggle button is provided to enable the configuration at the end
of each row.
When configuring the log levels individually, an orange warning icon (“Verbose Module”) is dis-
played on the rows for which an important data volume is generated.
• globally: the Default frame in the upper part of the page allows the selection of a log level which
will be applied to all the modules within the page. In this case, it remains possible to switch the
toggle button on a given row to select a different log level value. However, the toggle button must
not be switched again before saving the selection as the default value would be automatically
set back.
The access log file (i.e. “access.log”) gathering connections from external clients to the Access
Manager server and the technical log files (i.e. “error.log” and “tech.log”) can be downloaded as
archive by clicking on Download Logs Archive (ZIP) at the bottom of the page.
The access log file (i.e. “access.log”) is also available in the following directory: /var/log/
wallix/wabam on Linux and C:\ProgramData\Wallix\wabam\log on Windows. This log
is similar to the access log of the Apache server. For further information, refer to https://
httpd.apache.org/docs/2.4/logs.html#accesslog. The generation of this log file can be
set in section Access log configuration within the file wabam.properties. This file is under
the configuration directory. The default configuration directory is /etc/opt/wallix/wabam on
Linux and C:\ProgramData\Wallix\wabam\conf on Windows.
Warning:
The service Access Manager must be restarted after changing the parameters in the
wabam.properties file.
50
WALLIX Access Manager 4.0.7.1 – Administration Guide
Note:
The size of a backup file cannot exceed 10 megabytes. If the size of the file exceeds
10 megabytes, we recommend to perform the backup and restore from the command
line tool. For further information, please refer to Section 14.4.2, “Database backup and
restore from the command line tool”.
• click on the red eye icon on the right to display the data entered
• click on the Copy icon on the left to copy the password or the key entered into the clipboard
• the administrator from the global organization can select the desired organization from the list
of values. The administrator can then choose to back up the whole database by selecting All
Organizations or a single database by selecting the desired organization from this list.
This list is not available for the user from a non-global organization (such as the default orga-
nization): the name of his or her organization is directly displayed.
• once the appropriate data has been selected from the list of values, it is possible to click on the
Export button on the right to download the back up of the database as a ZIP archive.
Note:
The database restore operation can only be performed on an Access Manager instance
whose database schema version is the same.
To restore the database, the password or the key entered on the Encryption Key area for the
database backup must be provided again. It is possible to click on the red eye icon on the right to
display the data entered.
On the Restore Database section:
51
WALLIX Access Manager 4.0.7.1 – Administration Guide
• the parameters related to the database must be dropped or uploaded as a ZIP archive on the
dedicated area.
Caution:
Access Manager performs an integrity check on the files during the database restore.
Therefore, the restore operation fails if any of the files have been modified.
• once the ZIP archive has been uploaded, the administrator from the global organization can then
choose to restore a new database including new organizations by clicking on the Create button
or restore an existing database by clicking on the Reset button.
Caution:
Only an administrator from the global organization can view the Create button. When
the administrator restores a database with new organizations, all existing data will be
overwritten.
Where:
Note:
The generated backup file is a .zip file, which can be opened with any zip tool that supports
256-bits AES encryption (e.g.: 7zip).
The option -h shows the help message listing the arguments which can be used to perform this
action:
wabam-backup -h
52
WALLIX Access Manager 4.0.7.1 – Administration Guide
Warning:
The commands used when installing WALLIX Access Manager As Appliance are only
supported for MySQL Community Server and MariaDB Server databases. Therefore, it
is not possible to run these commands if an Oracle Database Server is declared as the
database type in the file wabam.properties.
14.4.2.3. Database restore on WALLIX Access Manager from the command line
Warning:
Before performing the restore, make sure that the service WALLIX Access Manager is
not running.
A backup can be restored from the command line tool, using the following command:
Where:
The option -h shows the help message listing the arguments which can be used to perform this
action:
wabam-restore -h
53
WALLIX Access Manager 4.0.7.1 – Administration Guide
Warning:
The commands used when installing WALLIX Access Manager As Appliance are only
supported for MySQL Community Server and MariaDB Server databases. Therefore, it
is not possible to run these commands if an Oracle Database Server is declared as the
database type in the file wabam.properties.
Warning:
Before performing the restore, make sure that the service WALLIX Access Manager is
not running.
The restore command can be launched from the appliance using a dedicated script:
54
WALLIX Access Manager 4.0.7.1 – Administration Guide
Access Manager embeds an audit session repository. The session audit data can be displayed
on the “Session Audit” page accessible from the “Audit” menu. For further information, refer to
Chapter 18, Session audit data.
The settings to retrieve session audit data can be managed from the “Settings” menu. Only an
administrator from the global organization can access the “Session Audit Settings” submenu.
Data on this page is displayed as read-only for the global administrator but it can be edited by
clicking on the “Edit” button.
These settings are defined by the following attributes:
• Session Repository Access Mode: The connection mode used to access the session audit
repository
– Localhost only: When this mode is selected, then the session audit repository is accessed
locally on the current Access Manager instance. In this case, the Web browser and the Access
Manager instance must be both running on the same workstation.
– IP and localhost: When this mode is selected, then the session audit repository can be
accessed and receives queries from an external Web browser (in particular when assistance
is required from the Support Team).
– Clustered: When this mode is selected, then several Access Manager instances can interact
with each other and share the access to their own session audit repository between them. In
this case, there is a master instance and there are slave ones.
• HTTPS Login, HTTPS Password: The login and the password to provide for querying the
session audit repository. These fields should be defined to ensure secure access to the repository.
For the Clustered mode, the values entered or edited on an Access Manager instance will
apply to all the other cluster members.
• Repository Hostname: The IP address or the DNS name of the local Access Manager instance
to be defined for the IP and localhost or Clustered connection mode.
• Other Cluster Member IPs: The IP address(es) of the other Access Manager instance(s)
when the Clustered mode is selected as the connection mode. To add a node, first enter the
IP in this field then click on the + icon.
Note:
Information retrieval is more robust between three Access Manager instances at least.
• Repository Port: The access port configured for the local Access Manager instance
• Cluster Name: The name of the local Access Manager instance. When the Clustered mode
is selected as the connection mode, the name entered in this field must be the same for all the
configured Access Manager instances.
• Cluster Master: Toggle button to specify whether the instance is the master or the slave node,
when the Clustered mode is selected as the connection mode.
• SSL Certificate Management: This area can be expanded and allows to define certificates
to secure access to the audit session repositories.
55
WALLIX Access Manager 4.0.7.1 – Administration Guide
On the left part, it is possible to drop or upload the SSL certificate of the Web server by providing a
PKCS#12 file. If needed, a password can also be provided for the certificate on the Certificate
Password field. By default, a self-signed certificate is generated during the installation.
On the right part, it is possible add the certificates related to the other cluster members (i.e. Access
Manager instances), when the Clustered mode is selected as the connection mode. To do so,
it is necessary to click on the Add button to display the New Trusted Certificate window
and enter the relevant data. It will then be displayed below the Trusted Certificates area.
Warning:
Each Access Manager instance must add the trusted certificate related to the other
instances to allow communication between all the session audit repositories. At this
stage, the master node and the slave ones must be specified via the Cluster Master
toggle button.
The button Show Repository Certificate allows to display the certificate for the current
Access Manager instance.
The Test Configuration button allows to test the connection for the current instance configu-
ration.
Important:
The following parameters are available for configuration in the expandable section Ses-
sion Audit from the “Application” tab on the “Settings” page (accessible from the menu
“Settings” > “Application Settings”):
56
WALLIX Access Manager 4.0.7.1 – Administration Guide
During the initial installation, Access Manager will create a fresh database (i.e. a schema) and a
database user for connecting to it. This database is created in a server instance which must be
provided by the Access Manager administrator.
Note:
The configuration of the database settings can be done using the wabam-con-
fig-database command.
The database settings can be displayed on the “Database Settings” page accessible from the “Set-
tings” menu.
These settings are displayed as read-only data for the global administrator and are defined by the
following attributes:
• Database Type, Host, Port: These fields define the server instance. For an Oracle database,
the SID field is also provided.
• Database Name: The name of the database, except for an Oracle database. For the latter, the
database is created implicitly with the user and has the same name.
• Database User, Database User Password: The database user is created with the minimal
rights. Access Manager will use this user during normal operations. The name and the password
to be used for this user are specified in these fields.
• Privileged User, Privileged User Password: In order to create the database, a privi-
leged database user should be provided. These fields define this privileged user. For an Oracle
database, this account should be able to log as sysdba. When installing newer versions of the
software, the Access Manager administrator will have to provide again the privileged database
user if the database schema has to be modified for the upgrade.
• Pool Size: The minimum and maximum values for the database connection pool size.
• Secure: Toggle button enabled by default to secure the connection to the MySQL database. This
attribute is required for any version of MySQL using the caching_sha2_password authentication
plugin as an SSL connection is required to connect to the database.
• Azure Database: Toggle button that allows Access Manager to determine the connection
method to use when the database is hosted on Azure Cloud platform.
The Test Connection button allows to test the connection to the database.
During the initial installation, if the name specified on the Database User field already exists on the
database, a warning message is displayed when saving the database parameters. It is then required
to choose an action regarding this user among the suggestions by clicking on the dedicated button.
57
WALLIX Access Manager 4.0.7.1 – Administration Guide
Only users whose profile is associated with the View Audit right can browse the actions related
to their organization on the “Log” page accessible from the “Audit” menu.
A record contains the action (e.g.: "Login"), the organization concerned, the type of the object af-
fected by the operation, the name of the object, the name of the user performing the action, the
timestamp and the status of the action. Moreover, by clicking on the icon at the beginning of the
row, details related to the action are displayed.
58
WALLIX Access Manager 4.0.7.1 – Administration Guide
Note:
A delay necessary for the display of the audit data on the page may occur while a session
is running.
On the search area in the upper part of the page, the user can enter keywords to retrieve the relevant
sessions. This search may concern current or closed sessions. It is possible to refine the search
using the wildcard symbol “*”: a click on the information icon will provide the possible syntaxes.
Data is displayed on the lower part of the page by pressing the Enter key or by clicking on the
magnifier icon on the right of the area.
On the advanced search form, the user can specify criteria to retrieve the corresponding sessions
then click on the Search Sessions button to display the data on the lower part of the page.
The sessions corresponding to the search are listed by date in the lower part of the page. The
following information is provided for each line:
• the date, start/end time and duration for the closed session or
• the date and start time for the current session
• the name of the bastion
• the user name
• the target protocol
• the name of the target device
• the name of the target account
• the status of the session
• click on one of these elements' attribute to restrict the search to the related criterion
• display detailed information by clicking on View session detail. The information can then
be viewed on the Session Detail window.
• view the current session in a popup window or in a dedicated web browser tab by clicking on
View session: a viewer allows then to go through the session video in real-time.
Note:
The option View session is only available for the current sessions.
• view the session recording in a popup window or in a dedicated web browser tab by clicking
on Replay session: a viewer allows then to go through the session video. The latter can be
downloaded by clicking on Download video below the viewer.
Note:
The option Replay session is only available for the recorded sessions.
59
WALLIX Access Manager 4.0.7.1 – Administration Guide
• view the session recording for a given action at a given time by clicking on the session's chronolog-
ical entries. These entries are displayed if the session log redirection is enabled for the bastion's
sessions in WALLIX Bastion. A viewer allows to go through the video of the selected sequence
on the Session Audit web browser tab.
60
WALLIX Access Manager 4.0.7.1 – Administration Guide
The first instance has to be installed normally. However the following ones require to manually edit
their file wabam.properties. This file is under the configuration directory. The default configu-
ration directory is /etc/opt/wallix/wabam on Linux and C:\ProgramData\Wallix\wabam
\conf on Windows. The installation encryption key (crypto.install.key), the database set-
tings (all properties with a name starting with db.connections) and the installation administrator
credentials (values starting by user.admin) should be copied from the first installation.
If the administrator credentials have to be changed later, they have to be changed on the first
instance and copied to the other ones.
Warning:
The service Access Manager must be restarted after changing the parameters in the
wabam.properties file.
When the bastions in the cluster are identical, i.e. they share the same configuration (notably
the same proxy certificates) and the same authorizations, it is recommended to enable the
bastion.cluster.identical.mode parameter in the Bastion expandable section from the
“Application” tab on the “Settings” page (accessible from the menu “Settings” > “Application Set-
tings”).
Enabling this parameter provides a significant performance improvement, as only information from
one of the bastions in the cluster is stored and synchronized.
61
WALLIX Access Manager 4.0.7.1 – Administration Guide
system is a default generic database administrator account for Oracle databases. Its password is
created at installation or database creation time. <Access Manager Schema> should be replaced
by the name which have been provided at Access Manager installation time for the user. The ex-
port will be in the wabam.dmp file located in the directory <Oracle APP directory>/<Oracle user>/
admin/<SID>/dpump.
For the import operation, a command line example is displayed below. Import information is avail-
able in logfile.log.
> mysqldump -u root -p<root password> <Access Manager Schema> > wabamp.dmp
> mysql -u root -p<root password> <Access Manager Schema> < wabamp.dmp
The mysqldump command does not handle the user; you have to recreate it manually if necessary.
62
WALLIX Access Manager 4.0.7.1 – Administration Guide
The rdp.clientName parameter can be configured to define a new RDP client name which will
be used during RDP sessions. In a cluster, this parameter also allows you to set a different RDP
client name for each WALLIX Access Manager.
Warning:
The service Access Manager must be restarted after changing the parameters in the
wabam.properties file.
The default heap size is 2373MB for the appliance and 60% of the total physical memory installed
on the server during installation for the Linux and Windows applications.
If more memory is required or the appliance memory is increased, the heap size can be changed
by editing the -Xmx option in the wabam.vmoptions file, which is located by default in:
Important:
Backup the wabam.vmoptions file before making any changes. This backup can be
used in case of syntax errors, line deletions, etc. introduced during the file modification.
Where:
63
WALLIX Access Manager 4.0.7.1 – Administration Guide
Note:
Access Manager must be restarted after modifying the wabam.vmoptions file.
The change of the heap size can be verified after restarting the Access Manager by consulting the
“tech.log” logs. A log containing “JVM arguments” displays the new value for the maximum Java
heap size. For example:
This parameter allows you to configure the value to be displayed in the headers for the HTTP 1.0
requests. If the parameter is not set, then the IP address will be displayed in the header. The default
value of this parameter is the hostname.
This parameter can be manually changed in the file wabam.properties. This file is available
in the configuration directory: /etc/opt/wallix/wabam on Linux and C:\ProgramData\Wal-
lix\wabam\conf on Windows.
Warning:
The service Access Manager must be restarted after changing the parameters in the
wabam.properties file.
The DoS filter parameters can be manually changed in the file wabam.properties. This file is
available in the configuration directory: /etc/opt/wallix/wabam on Linux and C:\Program-
Data\Wallix\wabam\conf on Windows.
Warning:
The service Access Manager must be restarted after changing the parameters in the
wabam.properties file.
• web.max.requests.perSec: allows you to specify the maximum number of requests per sec-
ond which can be accepted by the server. Requests which excess this number are first delayed,
then ignored. By default, this parameter is set to 60.
64
WALLIX Access Manager 4.0.7.1 – Administration Guide
Warning:
The service Access Manager must be restarted after changing the parameters in the
wabam.properties file.
Specifying these parameters also helps to avoid connection difficulties and to protect against secu-
rity vulnerabilities caused by denial of service attacks (DoS attacks).
Note:
The default value of the parameters corresponds to the standard proxy configuration.
• web.proxy.activated: when set to true (default value), this parameter helps you to specify
that an HTTP proxy server is activated.
• web.proxy.header.forwarded-for: this parameter helps you to identify the IP address of
the client. The default value for this parameter is X-Forwarded-For.
• web.proxy.header.forwarded-server: this parameter helps you to identify the hostname
of the proxy server. The default value for this parameter is X-Forwarded-Server.
65
WALLIX Access Manager 4.0.7.1 – Administration Guide
Warning:
Only audit data generated by Access Manager will be deleted.
User audit data can be purged from the interface of Access Manager, in the expandable Automatic
Audit Purge section from the “Application” tab on the “Settings” page (accessible from the menu
“Settings” > “Application Settings”):
• purge.audit.active: allows the administrator to enable the automatic purge of the user audit
data. This parameter is disabled by default.
• purge.audit.hourOfDayToExec: allows the administrator to specify the time at which the
automatic purge is launched each day. By default, this parameter is set to 3, i.e. 3 a.m. This
parameter allows values between 0 and 23.
• purge.audit.purgeOlderThanInDays: allows the administrator to specify the retention du-
ration (in days) of the audit data. Thus, all audit data older than this value is purged. By default,
this parameter is set to 270 days.
The parameters for the automatic purge can also be changed manually in the file
wabam.properties. This file is available in the configuration directory: /etc/opt/wal-
lix/wabam on Linux and C:\ProgramData\Wallix\wabam\conf on Windows.
Warning:
The service Access Manager must be restarted after modifying the parameters in the
wabam.properties file.
• purge.audit.active: when set to true, it allows the administrator to specify that the auto-
matic purge is activated. The default value for this parameter is false.
66
WALLIX Access Manager 4.0.7.1 – Administration Guide
Warning:
When several Access Manager instances are deployed, the purge.audit.active
parameter must be enabled only on one of the cluster nodes.
It is also possible to manually purge the audit data of a user by running the following command:
wabam-purge-audit on Linux or wabam-purge-audit.exe on Windows.
Note:
On Windows, the manual purge must be executed from a command window launched
in administrator mode.
The [--help -h] option displays the help message listing the arguments that can be used to
purge the audit data of the user.
The [--logins -l value] option is mandatory. It allows the administrator to specify the logins
of the user whose audit data must be purged. The following syntax rules must be respected:
The [--org -o value] option is mandatory. It allows the administrator to specify the name of
the organization on which the audit data of the user must be purged.
The [--after -a /(\d{2}|\d{4})-\d{2}-\d{2}/] option allows the administrator to purge
the audit data newer than the date entered. The format is as follows: YYYY-MM-DD or YY-MM-DD.
If this option is not set, all audit data of the user is deleted.
The [--before -b /(\d{2}|\d{4})-\d{2}-\d{2}/] option allows the administrator to
purge the audit data older than the date entered. The format is as follows: YYYY-MM-DD or YY-
MM-DD. If this option is not set, all audit data of the user is deleted.
The [--deleted -d] option allows the administrator to specify inactive users or organizations,
i.e. users or organizations who have been deleted, in order to purge their audit data. By default,
this option is set to false.
67
WALLIX Access Manager 4.0.7.1 – Administration Guide
• none: allows to prevent the indexing of Access Manager and the tracking of the links contained
in the Access Manager pages
• noimageindex: allows to prevent the indexing of the images from the Access Manager pages
68
WALLIX Access Manager 4.0.7.1 – Administration Guide
• the password
• the profile and
• the restricted source IPs.
The default administration profile (including all the rights and which can neither be modified nor
deleted) is then granted to the global administrator.
Warning:
Before performing the reset, make sure that the service Access Manager is not running.
If the reset is done during an upgrade, it is then necessary to perform the reset a second
time at the end of the upgrade.
• under Linux, enter the following command in the command line tool:
/opt/wallix/wabam/bin/wabam-restore-admin -f <configuration_file_path>
The [-f] option is used to set the path to the configuration file. If the option is not set, the path
to the wabam.properties file is the default path.
• under Windows, run the executable file in: C:\Program Files\Wallix\wabam\bin\wabam-
restore-admin.exe
The administrator is then requested to enter and confirm the new password in the command line
window. Under Windows, it is necessary to press again the Enter key to exit the window.
Note:
A short delay may occur after running the command or the executable file.
69
WALLIX Access Manager 4.0.7.1 – Administration Guide
Web: https://support.wallix.com/
Telephone: (+33) (0)1 70 36 37 50 for Europe, Middle East and Africa and (+1) 438-814-0255 for
the Americas
70