Posted on 09-10-2020 09:38 AM
Thycotic Privilege Manager is an endpoint least privilege and application control solution for Windows and Macs, capable of supporting enterprises and fast-growing organizations at scale. The two major components are Local Security and Application Control. Using Privilege Manager, administrators can automatically discover local administrator privileges and enforce the principle of least privilege through policy-driven actions. Those policy-driven actions include: - blocking, elevating, monitoring, allowing - application quarantine, sandbox, and isolation, - application privilege elevation, and - endpoint monitoring Continue reading … See also Privilege Manager 10.8 Customer Demo
Agent installation is well documented and straight forward, however "it will take 15-30 minutes for newly installed agents to register in Privilege Manager." (As of this writing, the vendor's link to Terminal Commands to speed up the process appears to be broken.)
I found the new MacOS Agent Utility Preference Pane provided users too much information, so I disable it as part of the Jamf Pro policy to install / upgrade via Files and Processes > Execute Command (even though the vendor's screenshot features our very own @grizzly660fan).
/bin/mkdir -pv /Library/PreferencePanesDisabled ; /bin/mv -v /Library/PreferencePanes/ACSAgent.prefPane /Library/PreferencePanesDisabled/ACSAgent.prefPane
Also, the suggested How to Recover an Unresponsive macOS Endpoint procedure doesn't lend itself to automation; we're using Thycotic Privilege Manager Agent Kickstart.sh instead.
Thycotic Software
UJDHBB2D6Q
com.thycotic.privilegemanagergui
anchor apple generic and identifier "com.thycotic.privilegemanagergui" and (certificate leaf[field.1.2.840.113635.100.6.1.9] / exists / or certificate 1[field.1.2.840.113635.100.6.2.6] / exists / and certificate leaf[field.1.2.840.113635.100.6.1.13] / exists / and certificate leaf[subject.OU] = UJDHBB2D6Q)
com.apple.systemevents
identifier "com.apple.systemevents" and anchor apple
Queries the macOS Thycotic Privilege Manager Agent for various settings, saves the results to the user's Desktop as an HTML file, which is then opened in Safari.
If the testAgentConnection
function results in a failure, the kickstartAgent
function executes settmsserver -serverUri ${thycoticURL} -installCode ${agentInstallCode}
in an attempt to resolve the connection failure.
Thycotic Privilege Manager macOS Agent Information
agentUtil.sh
as root
to see exactly which policies had been applied before realizing I had neglected to add the new test machine to my testing Resource group.Thycotic Privilege Manager macOS Agent Diagnostics
settmsserver -serverUri ${thycoticURL} -installCode ${agentInstallCode}
to kickstart the agentThycotic Privilege Manager Agent Kickstart
Thycotic Privilege Manager Machine ID
Thycotic Privilege Manager Health Check
${thycoticURL}PrivilegeManager/#
${thycoticURL}Agent/AgentRegistration4.svc
updateclientitems
Please see GitHub for customization instructions.
Posted on 03-31-2021 07:49 AM
Thank you for posting this, saved me some time figuring out the PPPC and AEK. One note:
The PPPC was failing for me, I changed the Code Requirement portion to this to get it to work:
identifier "com.thycotic.privilegemanagergui" and anchor apple generic and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UJDHBB2D6Q)
Posted on 01-16-2024 01:27 AM
Hi There,
bumping this great thread (thank you for creating it!), as I'm trying to configure PPPC FDA for Privilege Manager Security as explained here: https://docs.delinea.com/online-help/privilege-manager/agents/macos/mdm-profiles.htm
But it doesn't work.
What they recommend to do is to enter the following code requirement in the config profile:
anchor apple generic and identifier "com.thycotic.acsd" and (certificate leaf[field.1.2.840.113635.100.6.1.9] /* exists */ or certificate 1[field.1.2.840.113635.100.6.2.6] /* exists */ and certificate leaf[field.1.2.840.113635.100.6.1.13] /* exists */ and certificate leaf[subject.OU] = UJDHBB2D6Q)
As you see the identifier (com.thycotic.acsd) differs from the one listed in this JN article.
When I need to run any sudo command, it will eventually time out waiting for Privilege Manager Security to get the FDA granted:
I tried also with the code listed in this page but no luck.
When checking the team ID of the app located at /Applications/Privilege Manager.app, I get the one listed in this JN article:
None anyway will work.
I can't seem to find the "Privilege Manager Security" that they mention in their official documentation.
Do you happen to know anything about this?
Thank you.
Posted on 01-16-2024 03:14 AM
Happy New Year, @trull_sengar!
You may wish to reach out to Delinea technical support.
Posted on 01-16-2024 04:16 AM
Hello @dan-snelson
Happy new year to you too!
I tried and got stuck on different bureaucracies, reason why I tried to ask here as well :-)
I'll try again though.
Thank you
Posted on 04-15-2024 04:23 PM
Hi @trull_sengar I am also working on Delinea Privilege Manager and having the same issue. Did you ever get this resolved?
Posted on 04-18-2024 04:40 AM
Hi @afleming ,
I had still the issue with the agent version 11.4.1.
I now downloaded the latest version (12.0.0 from here), and confirm that it works perfectly.
I was able to test without any issues policies such as:
I have no longer experienced the issue I described in my initial post, after I installed the latest version of the agent.
Let me know if this works for you too.