Self-Service Privilege Elevation in PAM36019 minutes to read
Self-Service Privilege Elevation allows end-users to perform highly privileged operations in remote sessions without relying on administrators for their approvals. The highly privileged operations include; installing applications, executing specific operations, executing commands, etc., that need administrator or root privileges, depending on the type of Operating System. The process involves configuring the selected accounts/resource with the allowed apps/scripts/commands shared with the end-users for their accessibility. Users with the administrator role control the overall configuration of Self-Service Privilege Elevation with predefined rules and policies. Let us consider a case where an administrator has to allow a non-privileged user to install third-party applications or execute commands to access a particular directory for a specific period. It will be painful for the administrator when this has to be repeatedly done for multiple users. Here comes this elevation feature into play - it allows configuring users' operations with a privileged account, which lets users self-elevate privileges for a stipulated time until they complete their intended operations. Note: At the end of this document, you will have learned the following in detail:
1. Self-Service Privilege Elevation for Windows and Windows Domain
|
Self-Service Privilege Elevation | SSH Command Control | Elevation Result in PAM360 Session |
---|---|---|
|
|
No Elevation |
|
|
Allowed Elevation |
|
|
No Elevation |
|
Allowed Elevation |
|
|
No Elevation |
Case 2:
Switching Self-Service Privilege Elevation between Configured User Accounts from the SSH Console
Consider the following users account with different configuration for the upcoming scenarios:
Scenario 1:
If a user logs in to the account kate using PAM360 remote session and then changes internally to marko, which is not a PAM360 user account - then the current user account session does not allow Self-Service Privilege Elevation for the privileged commands configured in kate.
Scenario 2:
If a user logs in to the account kate using PAM360 remote session and then changes internally to lindsey, which is not configured with Self-Service Privilege Elevation - then the current user account session does not allow Self-Service Privilege Elevation for the privileged commands configured in kate.
If a user logs in to the account kate using PAM360 remote session and then changes internally to paul, which is configured with Self-Service Privilege Elevation for different sets of privileged commands - then the current user account session allows Self-Service Privilege Elevation for the privileged commands configured only in paul.
1. Error: 'The directory name is invalid'
Issue: During the Self-Service Privilege Elevation (SSPE) to application, this error occurs when the application’s .exe file is located in user-specific folders such as Downloads or Documents, which are tied to the currently logged-in user.
Solution: To resolve this issue, the user needs to relocate the application's executable (.exe) file from user-specific folders like Downloads or Documents to a shared location accessible by all users on the system. Examples of such shared locations include the root directory of drives D: or E:. This ensures that the application can be accessed and elevated correctly during the Self-Service Privilege Elevation (SSPE) process, regardless of the currently logged-in user's profile.
2. Error: 'The requested operation requires elevation'
(The solution is applicable from build 7500 and above only)
Issue: During the Self-Service Privilege Elevation (SSPE) to application, this error occurs when Windows' default self-elevation process fails to trigger the User Account Control (UAC) pop-up, preventing privilege elevation.
Solution: Execute the application using PowerShell after adding the following system property in the Agent.conf file located in the PAM360 installation directory:
executeSSPEviaTerminal=cmd | powershell | false
cmd - elevates the application via Command Prompt.
powershell - elevates the application via PowerShell.
false - elevates the application using default SSPE to implementation.
Note: The system property name in the previous build version will be executeSSPEviaCMD=True | False