- 1 minute to read
- Print
- DarkLight
- PDF
How to use a personal credential
- 1 minute to read
- Print
- DarkLight
- PDF
In this document, you’ll find a step-by-step guide on how to use a personal credential to access a remote session.
Only with the Allow use of personal credentials parameter enabled the user will be able to access the remote session with their personal credential. To enable this parameter, access the How to configure a remote session (proxy) document.
Requirements
- Ensure that the Allow use of personal credentials parameter is enabled for the session.
Personal credentials are only available for Terminal Proxy and RDP Proxy sessions.
Access with a personal credential
We recommend that users and devices using a personal credential don't have typed text indexing configured, in order to not infringe the user's right to privacy. But if the user's personal password or personal data is displayed on the screen due to output from the target device, these texts can be indexed, if configured, and they’ll be present in the session video.
Via Proxy Terminal
- In the terminal application of your choice, log in to senhasegura.
- Enter the protocol, your senhasegura user, and the senhasegura vault IP address or hostname. ex.:
ssh senhasegura_user@mysenhaseguraserver
- Press Enter.
- Enter your password.
- With the senhasegura session started, enter the protocol, your personal credential and the IP address or hostname from the device you want to access. ex.:
ssh personal_credential@target_device
- Press Enter.
- Enter your password.
- Press Enter.
Now, the senhasegura session via Terminal Proxy will be used by the personal credential.
Via RDP Proxy
- In the RDP application, log in to senhasegura.
- Click Connect.
- On the home screen, type:
- senhasegura user.
- Credential password.
- Device to be accessed.
- Personal credential.
- Personal credential password.
- Click Access.
Now, the personal credential will use the senhasegura session via RDP Proxy.
The use of personal credentials doesn’t prevent the use of Access Groups with workflow, MFA tokens, emergency access, audited commands, or any other mechanism available for proxy sessions.
Next:
How to configure a remote session (proxy)
Segregated parameters
Do you still have questions? Reach out to the senhasegura Community.