Purpose
This document provides set up information on the Thycotic integration.
Introduction
Thycotic provides a privileged account security solution and password vault. It is required to have the Thycotic Secret Server account to use the integration.
Thycotic authentication can be configured on the scan policy, on the target or on the target group.
Set Up Thycotic Integration in OUTSCAN or HIAB
To set up Thycotic in OUTSCAN or HIAB:
-
Go to Main Menu > Settings > Integrations.
-
Select the Thycotic tab.
-
Configure Thycotic Sever:
|
Option |
Description |
|---|---|
|
Enabled |
Click on this field to enable Thycotic. |
|
Name |
Provide a name for this configuration. |
|
URI |
Provide your Thycotic Secret server URI. |
|
User |
Provide your Thycotic user name. |
|
Password |
Provide your Thycotic password. |
|
Organization (optional) |
Provide the name of the organization that should be queried in a Thycotic Cloud setup. |
|
Tenant (optional) |
Provide the tenant for Thycotic Cloud setup. |
|
Ignore certificate validation |
It is recommended to leave this box unchecked. Check this box only when there is no trusted certificate available. |
|
Test Authentication |
Click on this button to test the authentication status. |
|
Add |
Click to add the configuration settings. |
-
Click Save.
After enabling Thycotic, the authentication can be configured on a target, target group, or a scan policy.
Target / Target Group
-
Go to Main Menu > Netsec > Manage Targets.
-
Target: Edit a target to setup the Authentication.
-
Target Group: Right-click on a group and select Set Target Authentication.
-
-
Select Thycotic SMB or Thycotic SSH from the drop-down list, to use the respective authentication.
-
Fill in the Credentials:
|
Option |
Description |
|---|---|
|
Thycotic Config |
Select the config from the drop-down list. |
|
Secret name |
Provide the name of the Secret.
When the user provides a phrase, it searches for the name matching the given phrase. The first name matched is used. ${IP} will get replaced by the target IP. ${HOSTNAME} will get replaced by the host name of the target. |
|
Override path |
Provide a new path to cancel using the existing path. |
|
SSH substitute user command |
The use of the following commands is to execute commands with a different user/privilege escalation.
|
|
SSH custom user command |
This field is available when the user selects custom in the SSH substitute user command field. Add a custom command for escalating privilege. |
|
SMB allow NTLMv1 |
Check this box to enable the authentication using NTLMv1. |
|
Enable remote registry |
If enabled, the scanner initiates the Remote Registry service with the given details. Disable the service when the scan is finished. |
-
Click Test to start a verification.
-
Click Save to enable the current settings.
Scan Policy
-
Go to Main Menu > Netsec > Scan Scheduling > Scan Policy.
-
Edit a scan policy to setup the Authentication. Under SMB and SSH tabs, Thycotic SSH and Thycotic SMB are now visible as new options.
-
Click on any of the options to use the respective authentication.
-
Provide your Credentials:
|
Option |
Description |
|---|---|
|
Thycotic Config |
Select the config from the drop-down list. |
|
Secret name |
Provide the name of the Secret. When the user provides a phrase, it searches for the name matching the given phrase. The first name matched is used. ${IP} will get replaced by the target IP. ${HOSTNAME} will get replaced by the host name of the target. |
|
Override path |
Provide a new path to cancel using the existing path. |
|
SSH substitute user command |
The use of the following commands is to execute commands with a different user/privilege escalation.
|
|
SSH custom user command |
This field is available when the user selects custom in the SSH substitute user command field. Add a custom command for escalating privilege. |
|
SMB allow NTLMv1 |
Check this box to enable the authentication using NTLMv1. |
|
Enable remote registry |
If enabled, the scanner initiates the Remote Registry service with the given details. Disable the service when the scan is finished |
-
To start verification, provide the target IP or Hostname and click on Test Credentials.
-
Click Save to enable the current settings.
Related Articles
- Windows 10/Windows 2019 Server
- HIAB Updates
- General Information about SMB/WinRM Scanning
- Change Risk Levels
- Removing an Agent from Windows
- ServiceNow - Legacy
- Windows 8.1
- Netsec Filters
- Discovering the Agent in OUTSCAN
- Technical Specification
- Account Settings
- How to Test SMB Authentication
- Windows 2016 Server
- Identity Provider Settings
- HIAB Server Settings
- Installing a Linux Agent
- Okta Identity Provider Configuration
- Scanning-Less Scanning
- Check Connectivity to Agent Server
- Scan Scheduling Errors
- Overview
- Event Notification Module
- HIAB Maintenance Settings
- HIAB Deployment Guide
- Database Connector (HIAB only)
- Azure AD Identity Provider Configuration
- Add Comments
- Target Groups
- Checking if Agent is Running
- Core Installation
- Windows 2008 R2 Server
- Agent Installation Introduction
- Automatic Asset Joining With Netsec
- Manage Users
- Firewall Setup for Agents
- Scanning Range
- SNMP (HIAB only)
- ADFS Identity Provider Configuration
- Splunk
- Agent Call Home
- Advanced Report Filters
- Accept Risks
- SMB Authentication from OUTSCAN/HIAB
- Virtual HIAB Appliance
- Using the Agent Info Command
- Amazon
- User Roles
- Removing an Agent from Linux
- Retrieving the Agent UUID
- Atlassian Jira
- Understanding Scanner and Scheduler
- Finding the Agent Version
- Create and Edit Event Notifications
- Installing a macOS Agent
- Syslog (HIAB only)
- Setting Up an Agent Using System Proxy
- ServiceNow - App
- Thycotic
- DNS Lookup in UI and in Console
- HIAB Console
- Auditing Guide
- Adding Agent Attributes
- HIAB Distribution Settings
- Run Verification Scans
- Agent Latest Version
- Finding New Agents In OUTSCAN
- Setting up a HIAB as an Appsec Scale Scanner
- Checking Schedules from OUTSCAN in Agent
- Hardening the HIAB
- Performing a PCI DSS Scan
- Two Factor Authentication
- Attributes
- Firewall Rules
- HIAB Enrollment
- Supported Platforms for Authenticated SSH Scanning
- Authenticated Scanning Using WinRM
- OneLogin Identity Provider Configuration
- Windows 7
- HIAB Remote Support
- Compliance Scanning
- Manage Targets
- Assign Tasks
- Authenticated Scanning Using SSH
- Tickets Quick Start Guide
- Retrieving Results From the Agent in OUTSCAN
- Appliance Logs
- Converting Normal with Webapp Scans (Netsec) to Portal Workflows
- Updating the Agent
- Troubleshooting SMB Authentication
- Agent Licensing
- Mark as False Positives
- Installing a Windows Agent
- Using Farsight in Netsec
- Testing Target System for Open TCP Ports
- HIAB Restore
- Scan Stages
- Request Clarifications
- HIAB Setup Guide
- Updating Agent Attributes
- CyberArk
- LDAP/AD
- Checking if the Agent has Produced Results
- ArcSight (HIAB only)
- HIAB E-mail Whitelisting
- Adjust Identity Provider SAML Metadata File
- Scanning Critical Industrial Devices/Machines
- Reporting Tools
- Scan Scheduling
- Scanning Performance and Impact Tuning
- PCI Compliance Scanning
- Configuring and Accessing the HIAB console using SSH
- User Groups
- Create Users
- HIAB Remote SSH Guide
- Download Agents
- Create Targets
- Windows 2012 R2 Server
- HIAB Backup
- Report Scheduling
- Access Tokens
- O24AUTH
- Complementary Authenticated Scan on Default Credentials
- Authenticated Scanning Using SMB
- Dynamic Target Group