Lab Guide
Lab Guide
x:
Administration Foundations 200
<Brand> <Product>
Lab Guide
04PIM2010S
04PIM2010LG1
<course code>
<inventory code>
- PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA confidential & proprietary information. For CA, CA Partner and CA
Customer use only. No unauthorized use, copying or distribution. All names of individuals or of companies
referenced herein are fictitious names used for instructional purposes only. Any similarity to any real
persons or businesses is purely coincidental. All trademarks, trade names, service marks and logos
referenced herein belong to their respective companies. These Materials are for your informational
purposes only, and do not form any type of warranty. The use of any software or product referenced in the
Materials is governed by the end users applicable license agreement. CA is the manufacturer of these
Materials. Provided with Restricted Rights.
Table of Contents
Introduction 1
Guided Practice 3-1: Users 5
Guided Practice 3-2: Import Users from AD 9
Guided Practice 3-3: RADIUS Users 13
Guided Practice 3-4: CSV User Import 15
Guided Practice 4-2: Manually Add a Device 18
Guided Practice 4-3: Export/Import from csv File 20
Guided Practice 4-4: AD Import of Devices 22
Guided Practice 4-5: Auto discovery of Devices 25
Guided Practice 4-6: Establish Baseline Devices 27
Guided Practice 5-1: Command Line Filter 29
Guided Practice 5-2: Socket Filter 31
Guided Practice 5-3: SSH Access Policy 33
Guided Practice 5-4: RDP Access Policy 37
Guided Practice 5-5: Web Access Policy 39
Guided Practice 6-1: Password Composition Policies 40
Guided Practice 6-2: Password View Policies 43
Guided Practice 6-3: Vault for SMTP Account 44
Guided Practice 6-4: Vault for Syslog/Splunk Account 46
Guided Practice 6-5: Windows Domain Service Account 48
Guided Practice 6-6: WDS Master/Slave Accounts 50
Guided Practice 6-7: UNIX Accounts with Username/Password 52
Guided Practice 6-8: Windows Proxy GUI Install 54
Guided Practice 6-9: Windows Proxy Silent Install 56
Guided Practice 6-10: Local Windows Account 58
Guided Practice 6-11: UNIX Accounts with SSH Key 60
Guided Practice 7-1: Automated Login to UNIX Systems 61
Guided Practice 7-2: Automated Login to Windows Systems 63
Guided Practice 7-3: Automated Login to Web Applications 66
Guided Practice 8-1: Configuration of Password Management 68
TOC-1
2015 CA. All rights reserved.
TOC-2
2015 CA. All rights reserved.
This lab guide provides you with opportunities to practice what you learn in the course as
well as apply what you learn in real-world scenarios.
Scenario
Voonair Airlines is a fictitious niche airline providing service to the Arctic. The company provides
access to areas that are otherwise inaccessible for residents and researchers and has been
successful in this area. The Voonair IT Security team recently discovered unauthorized access to
servers that contain sensitive data. While the existing security posture at Voonair is strong, there
were no measures for protecting privileged identities which were acquired as part of a social
engineering attack.
The company has decided to strengthen their security around privileged identities and direct access
to servers that contain sensitive data. Voonair has partnered with CA Technologies to deploy CA
PAM to meet their needs.
As part of Voonair Airlines IT staff and following the configuration course, you will now configure,
administer and test CA PAM 2.5.x functionality.
CA Technologies
CA Technologies
Process Overview
This foundations course will focus on the Administration section depicted below. Additional
courses are being continually added to support various typical integrations.
Architecture
Architecture and
Features
CA Technologies
Configuration
Appliance
Configuration
Firewall Permissions
Administration
Access Control
Credential
Management
Password
Management
Access Control and
Automated Login
Access Control Web
Services
The Dynamic lab environment will start with all VMs already logged in as voonair\administrator
(caeducation). You do not need to log off the machines when suspending. Some labs require you to
log in as a different user. Use these steps to log off/on to a virtual machine as the domain admin:
Unless otherwise
instructed, log in to
each VM as the domain
admin
voonair\administrator
with password
caeducation
CA Technologies
To demonstrate how to create users and groups via the GUI and CSV import.
Scenario
Time
10 Minutes
Instructions: Connect to the virtual machine named Access and from the desktop launch the
shortcut labeled Privileged Access Manager A.
Log on to Privileged Access
Manager A
User: super
Password: caeducation1
CA Technologies
CA Technologies
CA Technologies
CA Technologies
Onboarding users to CA PAM can also be done by importing from an LDAP source
such as Active Directory. After users have been imported, you will assign the
appropriate roles to the groups.
Scenario
Voonair has determined specific groups of users within AD are required to utilize
CA PAM for access the privileged identities.
Time
15 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Log on to Privileged Access
Manager A
User: super
Password: caeducation1
a. From the Users menu, select
Manage Groups
b. Select Import LDAP Group
c. Select OK to connect to Active
Directory using the LDAP
Browser
CA Technologies
CA Technologies
10
CA Technologies
11
CA Technologies
12
Create a user group configured for RADUIS authentication. Users are created at
the first login and the role is assigned based on the group configuration. This
exercise will demonstrate this configuration and functionality.
Scenario
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create user group rad-grp1
a. Select Manage Groups from the
Users menu
b. Select Create RADIUS Group
c. Set the Groupname to rad-grp1
d. Set the Authentication type =
RADIUS
e. Add the role Configuration
Manager as the role
f. Remove Standard User role by
selecting Remove
g. Click Save
Log Off from PAM A by selecting Log
Off in the top right hand corner
CA Technologies
13
CA Technologies
14
Create users via a CSV import file. This exercise will lead you through importing
users from a CSV file. This is a good method for importing users that are not
available in the user store.
Scenario
Voonair has a set of users that must be imported as they do not existing in Active
Directory.
Time
5 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Import users from a CSV file
a. From the Users menu, select
Import/Export Users
b. Browse to C:\ClassFiles\PAMBootstrap-1.5\
c. Select PAM-users.csv and click
Open
d. Select Import Users
Confirm 100% import complete with
no errors.
15
Configure SSH access using PuTTY local client and web access to the Splunk
servers. This will be utilized during a later exercise.
Scenario
Vooniars UNIX / Linux administrators would like to use PuTTY for SSH access to
servers that they manage. Additionally, Voonair will require access to Splunk be
controlled by CA PAM.
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create a new service for locally
installed putty SSH client
a. From the Services menu, select
TCP/UDP Services
b. Click on Create TCP/UDP Service
c. Enter PuTTY as Service Name
d. Enter Port: 22
e. Protocol: TCP
f. Application Protocol: SSH
g. Client application
c:\util\putty.exe -ssh <Local IP> P <First Port>
h. Click Save
Create a new service for Splunk
a. From the Services menu, select
TCP/UDP Services
b. Click on Create TCP/UDP Service
c. Service Name: Splunk
d. Port: 8000
e. Protocol: TCP
f. Application Protocol: Web
Portal
g. Launch URL:
https://<Local IP>:<First Port>
CA Technologies
16
CA Technologies
17
Create a device and device group using the CA PAM web interface. Group
membership is also explored for different ways to add and remove devices.
Scenario
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create a new device for unix1 server
a. From the Devices menu, select
Manage Devices
b. Click Create Device
c. Device Name: unix1
d. Address: 192.168.0.21
e. Access methods: Click on SSH
f. Under Services, click Add and
select PuTTY as a service
g. Device type is Access and
Password Management (Both
should be checked)
h. Click Save
CA Technologies
18
CA Technologies
19
Create additional devices using a CSV file. You will export existing devices in
order to then modify the CSV and import the changes.
Scenario
With the number of devices that Voonair will manage on CA PAM, creating them
via the web interface is not practical. This is the first method of device import
you will explore.
Time
15 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Export devices to a CSV file.
a. From the Devices menu, select
Import/Export Devices
b. Click Export Devices and open
the file with Microsoft Excel
Edit the csv file and duplicate the
device unix1 to unix2 and unix3
a. Necessary changes are device
name and address/hostname (as
seen in the image on the left)
b. Save the file on your desktop
and be sure it is in CSV format.
c. Close the excel file
CA Technologies
20
CA Technologies
21
Import devices from specific groups in Active Directory and observe the results.
The test group will be deleted and not saved during this exercise.
Scenario
Devices that belong to a domain can also be imported via an LDAP group. Since
Voonair utilizes Active Directory services, you will import devices from specific
groups.
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
a. From the Devices menu, select
Manage Groups
b. Select Import LDAP Groups to
open the LDAP browser
CA Technologies
22
CA Technologies
23
CA Technologies
24
Using Autodiscovery, find and add all devices within a specified IP range.
Scenario
You can discover devices and add them automatically to CA PAM. This is helpful
for when the target device population for a specified netmask or IP range is not
known.
Time
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Scan the subnet for new devices
a. From the Devices menu, select
Autodiscovery
b. Change radio button to Range
and enter Address range:
192.168.0.10 to 192.168.0.50
c. Click Scan and beware that the
scan may take several minutes
to complete
CA Technologies
25
CA Technologies
26
Remove all previously created Devices and Services to prepare for additional lab
exercise.
Scenario
In order to ensure that your lab environment is built correctly for future lab
exercises and to save you time in having to do repetitive work, you will remove
previously created services and devices. You will then import Services and
Devices from CSV files provided.
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Remove all services created.
a. From the Services menu, select
TCP/UDP Services
b. Delete PuTTY and Splunk
services previously created.
CA Technologies
27
CA Technologies
28
Scenario
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if
closed, connect to the virtual machine named Access and from the desktop
launch the shortcut labeled Privileged Access Manager A
CA Technologies
29
30
Create socket filters in order to further create white and blacklists for RDP and
SSH for specific devices.
Scenario
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
a. From the Policy menu, select
Manage Policies and then select
Manage Filters
b. Select Socket Filter Config
c. Change Action After Limit
Exceeded to Logout of terminal
device
d. Enable SFA Monitoring and
Log All Access
e. Enter a Violation e-mail message
as seen in the image on the
right. (RDP is not allowed on
this network. Your activity has
been reported to Information
Security)
f. Click Save Socket Filter Config
CA Technologies
31
CA Technologies
32
Scenario
Time
Create SSH access policies that utilize both CA PAM built in SSH client or the local
PuTTY installation. Also, connections will be made with the configured access
users to observe the options and restrictions configured as part of the access
policy. Lastly, observe the session recordings of your attempted access.
As you continue configuring CA PAM, this exercise begins to put it all together.
You will now assign an access policy to specific users/groups and devices/device
groups.
20 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Best Practice Tip: For the remainder of the labs, it is highly recommended you use two web
browsers instead of logging in and out. You may leave your super account logged in (default:
Firefox), but open a separate Internet Explorer browser and launch PAMA when the lab
instructions tell you to login as abc-admin1.
Create an access policy for SSH
access to UNIX1:
a. From the Policy menu, select
Manage Policies
b. User (Group): enter admin1 and
select the abc-admin1 user
c. Device (Group): unix1
d. Click Create Policy
e. Access: Add SSH
f. Enable Command Line session
recording
g. Click Save
CA Technologies
33
CA Technologies
34
35
CA Technologies
36
Create an RDP access policy for a specific device and a device group. The session
recordings will also be viewed as part of this exercise.
Scenario
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create an access policy for RDP
access to WIN1 server.
Login in as the super user.
a. From the Policy menu, select
Manage Policies
b. User (Group): abc-admin1
c. Device (Group): win1
d. Select Create Policy
e. Add Access: RDP
f. Use a socket filter: Block
RDP/SSH Alert
g. Choose to record session:
Graphical
h. Click Save
CA Technologies
37
CA Technologies
38
Create a web access policy to use Splunk via CA PAM. You will also connect using
this policy to observe the access process as well as the subsequent session
recording.
Scenario
In addition to managing access via SSH and RDP, web access control is also
required as part of the Voonair security strengthening.
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create an access policy for Splunk
service to syslog server.
a. From the Policy menu, select
Manage Policies
b. User (Group): abc-admin1
c. Device: 168.0 syslog
d. Click Create Policy
e. Services: Add Splunk
i. Choose to record session:
Web Portal
j. Click Save
Observe the access page and
connect to Syslog using Splunk.
a. Login as admin with password
caeducation
39
Create password composition policies to be used for Windows, UNIX, and Oracle
accounts. You will utilize these policies in later lab exercises.
Scenario
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create a Password Composition
Policy (PCP) for Windows.
a. From the Policy menu, select
Manage Passwords
b. Now from the Targets menu,
select Password Composition
Policies and then click Add
c. Enter Windows as the Name
d. Create a description for the PCP,
for example: Password
composition policy for Windows
Account.
e. Maximum length should be 24
or more characters
f. Set Maximum Password Age =
7 days (click the enable option in
order to enter the 7 days)
g. Click Save
CA Technologies
40
CA Technologies
41
CA Technologies
42
Create password view policies to change after view and change after checkin/check-out. You will utilize these policies in later lab exercises.
Scenario
Voonair has requirements for changing password upon view and use, since the
goal of CA PAM implementation is to provide access to target devices without
exposing the passwords to the user.
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create a PVP for Change Password
on View.
a. From the Policy menu, select
Manage Passwords
b. Now from the Workflow menu,
select Password View Policies,
and then click Add
c. Change Password on View after
3 minutes
d. Name it so you recognize it, e.g.
CPOV-3
Create a PVP for Checkout/checkin
a. Checkin after 60 minutes.
b. Name it so you recognize it, e.g.
Checkout-60
CA Technologies
43
Create a target application and target account for the SMTP server and email
account. This will also be utilized in later lab exercises.
Scenario
Time
5 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
SMTP Target Server
a. From the Devices menu, select
Manage Devices
b. Review device: XXX.99 SMTP
c. Verify it has Device Type
Password Management
CA Technologies
44
CA Technologies
45
Create a target application and target account for the Syslog/ plunk account.
This will be utilized in later lab exercises.
Scenario
Similar to the 6-3 lab, this time you are vaulting the Syslog/Splunk account
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Syslog Target Server
a. From the Devices menu, select
Manage Devices
b. Review device
syslog.voonair.local
c. Verify it has type Password
Management
Splunk Target Application
a. While syslog.voonair.local is
selected in the Manage Devices
section, select Manage Target
Applications and then click Add
b. Find server syslog.voonair.local
c. Add application name Vault
syslog/splunk
d. Set application type Generic
e. Click Save
CA Technologies
46
CA Technologies
47
Create a target application and target account for a Windows domain service
account. This will be utilized in later lab exercises.
Scenario
Another iteration of vaulting credentials, this time for a Windows domain service
account.
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Windows Domain Service Target
Server. The Active Directory is the
target server for WDS type
accounts.
a. From the Devices menu, select
Manage Devices
b. Review AD device (IP address
192.168.0.10)
c. Device Type at least Password
Management
d. Select Manage Target
Applications for the next step
CA Technologies
48
CA Technologies
49
Scenario
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Add Windows Domain a Target
Account.
a. From the Targets menu, select
Accounts
b. Click Add
c. Find the AD server and WDS AD application
d. Account name: testadmin2
e. Enter password random value
f. Enter the users DN.
You can use the LDAP browser
to find it.
CN=Test Admin 2,CN=Users,DC=voonair,DC=local
50
CA Technologies
51
Scenario
Local accounts on the target device can and will be managed by CA PAM for the
Voonair implementation.
Time
15 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
UNIX Target Server
a. From the Devices menu, select
Manage Devices
b. Review UNIX1 device
Device Type at least Password
Management
UNIX Target Application
a. From the Manage Devices
display, select Manage Target
Applications and Click Add
b. Find the unix1 server
c. Use application name: UNIX
unix1
d. Application type: UNIX
e. Password Composition Policy:
UNIX
f. Set UNIX variant (in Script
Processor section) to Linux
g. In Descriptor1 add UNIX
h. Scroll down and click Save
CA Technologies
52
CA Technologies
53
Scenario
Time
20 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
This is the GUI installer of the CA
PAM Windows Proxy.
Login to win1 as user Administrator
with password caeducation (local
account, not voonair domain)
Install the Windows proxy
a. Run the installer as
Administrator for the Windows
proxy:
C:\software\setup-windowsagent-4.5.3-v2.exe
CA Technologies
54
CA Technologies
55
Install the Windows proxy on a second Windows server using the silent install
script option.
Scenario
This is a repeat of the process from lab 6-8, except that now the installation is
done silently again a second Windows server.
Time
15 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
This is the silent installer of the CA
Privileged Access Manager Windows
Proxy.
Login to win2 as user Administrator
with password caeducation
Silent install the Windows proxy.
a. Run the silent installer script for
Windows proxy as Administrator
c:\scripts\install-proxy.bat
b. Confirm that the cspmagentd
service is running or start if
needed.
CA Technologies
56
CA Technologies
57
Scenario
Target accounts local to Windows servers will also be managed by CA PAM for
Voonairs implementation. This will utilize the proxy server to manage the
credentials.
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create a target application for
server win1 of type Windows Proxy.
a. Set Application Name to Win1proxy
b. Choose Application Type:
Windows Proxy
c. Choose the scope to be Local
Account
d. Choose the proxy installed on
the win1 server
e. Save
CA Technologies
58
CA Technologies
59
Scenario
SSH keys within the Voonair infrastructure are also in scope for the deployment.
You will need to create the necessary configuration to support this need.
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
UNIX Target Account SSH key
a. Create a new Target Account
b. Find the unix1 server and UNIX
- unix1 application
c. Account name: ec2-user
d. Change the protocol to SSH-2
Public Key
e. Current SSH key is found on
C:\classfiles\PAM-Bootstrap1.5\Keys\UX
Private key id_rsa (no
password on the key)
Public key id_rsa.pub
f. Move synchronized radio button
to Update both
g. In Descriptor1 add UNIX
h. Save
Green circle with check mark
indicates account is synchronized.
CA Technologies
60
Create access policy to allow for single sign on using vaulted credentials.
Scenario
Voonair would like for administrators to access target devices without entering
or exposing the credentials. This process will configure that access.
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
It is assumed that Error! Reference
source not found. has been
completed.
Edit access policy for abc-admin1
user and unix1 server.
a. Associate adm1 account to the
SSH access method
b. Show the access page and select
SSH
Automated login using adm1 should
happen.
CA Technologies
61
CA Technologies
62
Scenario
Voonair would also prefer the Windows administrators access their target
devices without entering or exposing the credentials.
Time
15 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create a device group for Windows
domain servers.
a. Use the AD as credential source
b. Add the AD server and Win1
server as a device to the group
c. Select RDP as Access Method
d. Click Save
CA Technologies
63
CA Technologies
64
CA Technologies
65
Scenario
Following the method for UNIX and Windows servers, access to web applications
should also be done in a single sign on manner.
Time
15 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create or edit access policy for user:
abc-admin1 / syslog server
a. Add or update the Splunk_SSO
service and associate the Vault
Syslog/Splunk account
b. Click Save
a. Login as abc-admin1, show the
access page and select
Splunk_SSO.
b. If the learn mode was not done
an error is shown
c. Select Splunk_SSO(Learn) to
begin
CA Technologies
66
CA Technologies
67
Configure Password Management for alerting (email) settings and confirm that
alerts are sent via email.
Scenario
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Setup e-mail server connection
a. Be sure that you are in
Password Management and
from the Settings menu, select
E-mail settings
b. Chose Vault SMTP account
created in Lab 6-3 as the
account for e-mail configuration.
c. The hostname should be set to
smtp.voonair.local
d. Set the one click approver
to the address of your appliance
(xsuitea.voonair.local)
e. Set the from e-mail to
xsuite@voonair.local
f. Scroll down and then Click Save
g. Update message is at the top of
the screen
CA Technologies
68
CA Technologies
69
Create static and dynamic target groups for password management. Observe the
devices added to each group.
Scenario
Since the management of several target devices will follow a similar model,
Target Groups can be created for ease of management.
Time
15 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create a (static) Target Group
UNIX containing all UNIX Server
accounts.
In Password Management:
Select Targets and then Target
Groups.
Click Add Static Group
Name: UNIX
Under Group Servers, select the
plus sign and filter devices on
hostname beginning with unix
Click Save and then Click Show
to observe the accounts visible
through the target group
CA Technologies
70
CA Technologies
71
Create user groups for various user types. You will also login as various users to
test group membership and permission inheritance.
Scenario
As was done for devices, users will also be added to groups for ease of
management.
Time
15 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
Create a PM User group for UNIX
account administrators.
a. From the Groups menu, select
User Groups and click Add
b. Chose PM role TargetAdmin
Chose Target Group UNIX
c. Click Save
Create / update a CA PAM user
(Student10 for example)
a. Chose role Standard User and
Password Manager
Verify that no additional
inherited roles exists for the
user
b. Assign the PM User Group UNIX
account administrators to the
user
Verify that there are no other
PM groups assigned to the
user
c. Click Save
CA Technologies
72
CA Technologies
73
Create an Auditor user and observer the system access that is granted.
Scenario
To support the needs of Voonair auditors, a read only user with access to CA
PAM is required.
Time
10 Minutes
Instructions: Continue using the browser session from the prior exercise or if closed, connect to
the virtual machine named Access and from the desktop launch the shortcut labeled Privileged
Access Manager A
In PM create a user group
for read-only
a. Chose PM role read-only
b. Target group: Targets - all
accounts
c. Click Save
74
System Requirements
The minimum system requirements for an individual client machine accessing the Dynamic Lab
Environment are listed below. Please check that you meet the minimum requirements and that
you have the equipment you need before attempting to use the environment.
Operating
Systems
Browsers
Java Version
CA Technologies
75
Network Requirements
We recommend a minimum download speed of 1.16 Mb/sec (150 KB/sec) per client connection
(i.e., each individual user). In addition, we recommend latency of 250ms or less.
76
CA Technologies
CA Technologies
77
The above sample environment includes three VMs. Your particular environment will be
appropriate for the course activities for which you have registered.
NOTE: When you initially access your environment, you may see a Java prompt, asking if
you want to run this application. Click Run if you see this prompt. It will enable you to
properly connect into the environment and enable the keyboard to work correctly.
78
CA Technologies
When you click Suspend, your allocated lab time is preserved and the time clock remains paused
until you change the status to Run. The VMs in a suspended environment display that status as
shown in the following image:
Once you have suspended your environment, you can minimize or close the browser window in
which the environment has been running. Use the same URL you were sent in email to re-open
your environment when you are ready to resume.
This may take several minutes. The environment is ready the when VMs are highlighted in green
and display a Running status. Click on the machine(s) you want to directly access to start or resume
your lab activities.
CA Technologies
79
Network Requirements
We recommend a minimum download speed of 1.16 Mb/sec (150 KB/sec) per client connection
(i.e., each individual user). In addition, we recommend latency of 250ms or less.
If you have a group of 15 users, each connecting to their own client session from the same physical
location concurrently, the recommended amount of bandwidth required is
1.16Mb/sec per user x 15 or 17.5Mb/sec.
Connection Test
If you are connecting for the first time, or connecting from a computer you have never used before,
run the connection and speed tests to make sure that your browser supports a connection to the
Dynamic Lab Environment. These tests are hosted by Skytap directly.
Use the following URL to use the Skytap Connectivity Checker to run connection and speed tests:
https://cloud.skytap.com/tools/connectivity
80
CA Technologies
1. Click the URL link or copy and paste the link to your web browser. If the URL link is valid, your
web browser will load the environment with the appropriate VM or VM set for hands-on
activities.
2. Examine all VMs and ensure they are running by selecting them and clicking the Run button to
power them on.
CA Technologies
81
Once they are powered on, all VMs will show that they are in a running status and you may
log in to the VMs by clicking the desired VM machine.
3. Click the desired VM machine to connect directly to it.
Note: Most VMs will take you directly to the desktop, but if you are prompted to enter login info,
use the following credentials:
- Username: administrator
- Password: caeducation
Students should have been sent an email message telling them to run the tests before class starts.
Best practice is for the instructor to send an email message to your students to introduce yourself
as the instructor and remind them to run the connectivity test before the class starts.
82
CA Technologies
Best Practices
Use the following list of best practices to help you avoid potential issues with the Dynamic Lab
Environment:
Ensure that you are connected to a dedicated hardwired network connection on a
broadband internet connection.
Do not use Wi-Fi connection because it is more susceptible to higher latency issues
impacting performance.
Close all applications and documents you are not using for your virtual training; applications
running in the background may use up your computer's bandwidth and affect system
performance.
You should not be connected to a corporate VPN while connecting to the virtual training
class.
CA Technologies
83
Troubleshooting
Run both Connectivity Checker and Speed Test from appropriate application regions and submit
results to educationlabs@ca.com. Before the start of class, make sure your browser supports a
connection to the remote labs.
84
CA Technologies