2.14. Procedure – Four-eyes authorization

Purpose: 

When four-eyes authorization is required for a connection, a user (called authorizer) must authorize the connection on PSM as well. This authorization is in addition to any authentication or group membership requirements needed for the user to access the remote server. Any connection can use four-eyes authorization, so it provides a protocol-independent, out-of-band authorization and monitoring method.

The authorizer has the possibility to terminate the connection any time, and also to monitor real-time the events of the authorized connections: PSM can stream the traffic to the Audit Player application, where the authorizer (or a separate auditor) can watch exactly what the user does on the server, just like watching a movie.

Note

The auditor can only see the events if the required decryption keys are available on the host running the Audit Player application.

Figure 2.15. Four-eyes authorization

Four-eyes authorization

Technically, the process of four-eyes authorization is the following:

Steps: 

Note

Four-eyes authorization can be used together with other advanced authentication and authorization techniques like gateway authentication , client- and server-side authentication, and so on.

  1. The user initiates a connection from a client.

  2. If four-eyes authorization is required for the connection, PSM pauses the connection.

  3. The authorizer logs in to the PSM web interface, selects the connection from the list of paused connections, and enables it.

  4. The user performs the authentication on the server.

  5. The auditor (who can be the authorizer, but it is possible to separate the roles) watches the actions of the user real-time.