Manage VM on Microsoft Azure with Safeguard Privileged Password (SPP)

Hi Guys,

I know there is no Azure on Supported Platform for SPP.

I just wondering, have you guys ever tried to manage environment that hosted on Microsoft Azure using Custom Platform?

I'm not able to try it, because I have no Azure Environment. If you guys do have success story with this case, kindly please share with me, I really need it. My customer would like to use Safeguard but they have plan to use Azure in the future, so I need to know whether SPP can manage the Azure or Not.

Your feedback is highly appreciated.

Thanks,

Gustri

  • At the present time it is not possible to manage passwords in Azure. This is being considered for the future, but there are no confirmed plans at the moment.

    It is possible to use Azure AD credentials for external authentication in SPP.

  • Azure Active Directory (Azure AD) Privileged Identity Management (PIM) is a service that enables you to manage, control, and monitor access to important resources in your organization. These resources include resources in Azure AD, Azure, and other Microsoft Online Services like Office 365 or Microsoft Intune.

    Reasons to use

    Organizations want to minimize the number of people who have access to secure information or resources, because that reduces the chance of a malicious actor getting that access, or an authorized user inadvertently impacting a sensitive resource. However, users still need to carry out privileged operations in Azure AD, Azure, Office 365, or SaaS apps. Organizations can give users just-in-time (JIT) privileged access to Azure resources and Azure AD. There is a need for oversight for what those users are doing with their administrator privileges.

    What does it do?

    Privileged Identity Management provides time-based and approval-based role activation to mitigate the risks of excessive, unnecessary, or misused access permissions on resources that you care about. Here are some of the key features of Privileged Identity Management:

    • Provide just-in-time privileged access to Azure AD and Azure resources
    • Assign time-bound access to resources using start and end dates
    • Require approval to activate privileged roles
    • Enforce multi-factor authentication to activate any role
    • Use justification to understand why users activate
    • Get notifications when privileged roles are activated
    • Conduct access reviews to ensure users still need roles
    • Download audit history for internal or external audit