Discovery Basics
Setting up KeeperPAM for Discovery
In this guide, you will learn how to discover resources within your target infrastructure using Discovery.
Prior to using Discovery, make sure to have the following:
An active license of KeeperPAM
Activate on the Admin Console to enable discovery
Deploy a using the latest version
Discovery Enforcement Policies
On the Admin Console, the following Enforcement Policies affect the user's ability to run Discovery jobs.
Enforcement Policy
Enforcement Policy
Definition
Discovery can also be enabled on the using the enterprise-role command:
Installing the Keeper Gateway
The is a service that is installed on the customer's network to enabled zero-trust access to target infrastructure. This service is installed on a Docker, Linux or Windows environment in each of the networks under management.
Populating PAM User records
Before running a Discovery job, it is recommended to create records for any administrative credentials you expect to use. Save these credentials as PAM User record types within the Shared Folder that is associated with your Application and Keeper Gateway.
PAM Configuration
To get started with Discovery, you need a set up for your target infrastructure. The PAM Configuration directs the discovery process where to locate resources.
Network Discovery
Local network discovery utilize a CIDR for scanning. In order for discovery to locate a resource, it must be listening on the required port. Below is the PAM Configuration data required for a successful discovery.
AWS discovery makes use of whatever AWS Role Policies have been granted to the Keeper Gateway in order to discover resources. The PAM Configuration filters against the provided region names to limit the findings.
In order for the Keeper Gateway to discover an AWS resource, it must be able to communicate to the target over standard ports (e.g. port 22 for SSH, 3389 for RDP, etc). If a non-standard port is being used, this needs to be specified in the PAM Configuration. Discovery will only add the resources to the Keeper vault if it can successfully communicate over the port. Adjust your security groups as necessary to allow this.
Below is the PAM Configuration data required for a successful discovery.
Azure Discovery
Azure discovery makes use of whatever permissions have been granted to the role assigned to the Keeper Gateway in order to discover resources. The PAM Configuration filters against the provided region names to limit the findings.
In order for the Keeper Gateway to discover an Azure resource, it must be able to communicate to the target over standard ports (e.g. port 22 for SSH, 3389 for RDP, etc). If a non-standard port is being used, this needs to be specified in the PAM Configuration. Discovery will only add the resources to the Keeper vault if it can successfully communicate over the port. Adjust your Network Security Groups as necessary to allow this.
Below is the PAM Configuration data required for a successful discovery.
Discovery Workflow
The basic workflow for running Discovery jobs is the following:
Set up a Keeper Gateway with associated Shared Folders
Populate the shared folders with any administrative credentials as PAM User record types
Run a discovery job on the target infrastructure
Discovery Types
Keeper will discover Resources and associated user accounts in the following resources:
Directories and directory users
Directories and directory users
Services and Scheduled Tasks
When discovery is performed on a Windows machine, Keeper will automatically determine if a PAM User should be directly associated with any running services or scheduled tasks. When rotation is performed on any user accounts, Keeper will then update the Windows service account "log on as" credentials for any Windows services running as the PAM User, and restart the service. Keeper will also update the credential of any scheduled task running as that user on the target machine.
To learn more and set up this capability, see the page.
Activating PAM Features
After a Discovery process has been completed, you can edit the vault records to activate advanced features such as , , and .