Service Manager

Home 

This is the latest version of the help for Ivanti Service Manager 2018. If you cannot find some of the features described in the help, you may be using an older version of the application. To upgrade the application, click here.
To view the help for the latest version of Service Manager, click here

FedRAMP Configurations

The Federal Risk and Authorization Management Program (FedRAMP) is a government-wide program that provides a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services.

Listed below are features that are required to be FedRAMP compliant in Ivanti Service Manager (ISM).

Password Complexity and Length

The Password Complexity specifies the password complexity requirements for system users. FedRAMP requires specific values to be set for the Password Complexity and Minimum Password Length fields.

  1. From the Configuration Console, go to Configure > Security Controls > Security and Session to open the Security and Session workspace.
  2. Go to the Password Policy section and set the Minimum Password Length to 15. This is the minimum value required, according to FedRAMP standards.
  3. Select FedRamp from the Password Complexity list.

  1. Click Save.

Password History

Password History defines the number of times a user can change the password in ISM.

  1. From the Configuration Console, go to Configure > Security Controls > Security and Session to open the Security and Session workspace.
  2. Go to the Password Policy section and set the History Depth to 24. This is the minimum value required, according to FedRAMP standards. A user will be unable to change the system password using any one of the last 24 previous passwords.
  1. Click Save.

Minimum Password Age in Days

Minimum Password Age defines the number of days for a password before it can be reset by a user. For example, if the value is set to 2, then a user will be unable to reset the password for two days. If the Minimum Password Age in Days value is set to zero, then the password can be reset at any point in time. If a user wants to reset the password before meeting the set value, then the user must contact the administrator.

  1. From the Configuration Console, click Configure > Security Controls > Security and Session to open the Security and Session workspace.
  2. Go to the Password Policy section, and type the desired number of days in the Minimum Password Age in Days field.

  1. Click Save.

Limit Concurrent Session (Internal Auth)

Concurrent interactive sessions refer to the number of active sessions a user can have simultaneously on one or more devices or browsers. When users reach the concurrent session limit, an error message will be displayed and an option will be provided to do a force login, which will terminate all their existing sessions.

  1. From the Configuration Console, click Configure > Security Controls > Security and Session to open the Security and Session workspace.
  2. Go to the Concurrent Session section, and enter the number of concurrent sessions for all three types of users - Named User, Privileged User, and Non Privileged User.

  1. Click Save.

Limit Concurrent Session (External Auth)

These configurations are applicable to users who reach the concurrent session limit, when they are connected to ISM through Active Directory (AD), LDAP, or other single sign on (SSO) technologies.

  1. From the Configuration Console, click Configure > Security Controls > Authentication Providers to open the Authentication Providers workspace.
  2. Select an existing record or click New Record Menu and then select New ADFS/SAML from the list.

  1. The Force Login option is applicable to users reaching concurrent session limits, in the case of external authentication.

    • If the option is selected, when users reach a concurrent session limit, the system terminates all existing sessions and devices and automatically logs them into a new session.
    • If the option is not selected, when users reach a concurrent session limit, an error message will appear on the page, and the users will need to log out of existing sessions or devices, and then try logging in again.

    If the value is set to zero, the number of times a user can login is unlimited. This means, infinite number of active sessions are possible at the same time.

  2. Click Save.

Auto-Deactivate User if Idle for [n] days

As per FedRAMP standards, the Auto-Deactivate User feature sets the duration to automatically deactivate users who do not log in to the Ivanti Service Manager (ISM). To set the auto-deactivate feature for a user, do the following steps:

  1. From the Configuration Console, click Build > Global Constants to open the Global Constants workspace.

  2. Select UserDeactivationDuration from the list.
  3. The following information is displayed for the global constant.
Field Description
Name A unique name for the global constant. For example, UserDeactivationDuration.
Value The value for the global constant. By default, the value will be displayed as 5184000, for 60 days. To adapt to FedRAMP specifications, the value can be changed to 35 days. The calculation can be done as follows: 35 days X 24 hours X 60 minutes X 60 seconds = 3024000.
Type

Field type - Text, Number, Boolean. In this case, type in the value Number.

Description A description of what the global constant is used for. For example, Duration set for a user who does not log in to ISM for [n] number of days. Once the set number of days has passed, the user will get disabled, as per FedRAMP standards.
  1. Click Save to save any changes done.
  2. From the Configuration Console, click Build > Workflow > Workflows to open the Workflows workspace.
  3. Go to the Schedule Entry section, and select Disable Inactive User.
  1. Select More Actions, and then select Activate version from the list.

  1. Click Save. The workflow will run daily, based on the "Disable User Not logged In Last N days" daily schedule. If there are any users who did not log into the system for [n] days, they will get disabled automatically.

Was this article useful?    

The topic was:

Inaccurate

Incomplete

Not what I expected

Other