Specify a Privilege Elevation Validator
You can use this computer configuration group policy to validate ticket information that a user enters when she provides a ticket number along with a privilege elevation reason. You can validate ticket information using a customized PowerShell script against a ticketing system, such as ServiceNow.
If you enable this policy, here are some important things to know:
-
Delinea provides a sample script that you can use as a starting point for your own script. At the minimum, you need to enter your ServiceNow URL for the
$url
parameter. -
You can get the sample script from github: in the
centrify-agent-windows repo, go to Samples > ITSM validation > servicenow.
- If the ticket ID is not validated successfully, the user's request for elevated privilege is rejected.
-
The custom PowerShell script must be available and accessible on each Windows computer where
the validation occurs. If you're not running the PowerShell script on a local computer, be
sure to allow remote PowerShell access for the script.
-
This group policy works in conjunction with the Require justification on privilege elevation policy. If you only set one of these policies, any affected user is
prompted to provide a reason for privilege escalation.
- If the script cannot validate the ticket entry within the specified timeout duration, then the validation fails. By default, the timeout value is 2 minutes.
Please consult the group policy explain text for more details.
There are two settings for this group policy:
-
By default, when this policy is Disabled or Not Configured, users can run with elevated
privileges as normal.
-
When this policy is Enabled, you specify the PowerShell script filename and users
entries are validated against the third-party ticketing system before granting privileged access.
You can view the reason information that users enter in the audit trail event.