cyberark.my.site.com Open in urlscan Pro
2a02:26f0:3500:18::1724:a299  Public Scan

URL: https://cyberark.my.site.com/s/article/00003736
Submission: On January 30 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

<form id="form-search" data-aura-rendered-by="14:36;a"><input maxlength="500" aria-describedby="" id="15:36;a" placeholder="Search for anything in the community..." type="text"
    class="inputSearchKey su__rtlpx-2 inputBox input uiInput uiInputText uiInput--default uiInput--input" data-aura-rendered-by="19:36;a" data-aura-class="uiInput uiInputText uiInput--default uiInput--input"
    data-interactive-lib-uid="2"><!--render facet: 22:36;a--></form>

Text Content

Loading
×Sorry to interrupt
CSS Error

Refresh
Skip to Main Content

CyberArk Technical Community
 * Home
 * Engage
   
 * Additional Resources
   
 * Welcome Center
   
 * More
   


Expand search
Search
 * Search
   ""
   


Close search

Sign-in / Register

HAVE A QUESTION? ASK THE COMMUNITY

Search



WHAT ARE PSM SHADOW USERS AND HOW DO THEY WORK?

15-FEB-2021•KNOWLEDGE ARTICLE


INFORMATION

Article Total View Count
24,246
Article Number
000004950
Title
What are PSM Shadow Users and how do they work?
Question

Q1:
What are PSM Shadow User accounts and how do they work?

Q2:
What is their purpose? 
 
Q3:
When do these accounts get deleted?
 
Q4:
What is the recommended method for cleaning up unused accounts/profiles?
 
Q5:
Why do RDP sessions not require or use a PSM Shadow User account to connect
through PSM?
 
Q6:
How does password rotation on PSM Shadow User accounts work?

 
Answer
A1:
A PSM Shadow user is automatically created during a PSM Connection. The PSM
Shadow users sandbox the client session. The point of the Shadow users is
process isolation, so the programs launched on the same server by different
vault users run under different identities, and cannot leak information between
the sessions. These identities are created by the SYSTEM user and do not have
any privileges. 

The credentials of the shadow users are managed and changed internally by the
PSM server. The PSM will change (reset) the shadow user password every time a
new connection is made. Also, the hardening of the PSM Server restricts the use
of these Shadow users. PIM Suite Installation Guide describes hardening
procedure for PSM server that includes steps to limit permissions of the Shadow
users on the PSM server 

A2:
In v6.0 we added the ability to use a variety of clients on the PSM server (i.e.
Toad, SQL+, etc...). To help increase the security and the expand-ability of the
PSM in version 7.0 we took some steps towards sandboxing the client sessions. 

This is achieved via the new PSM Shadow users with a unique account being
created for each Vault user - their shadow user. These shadow users are local
users on the PSM machine. 

This user is created dynamically and managed by the PSM (the default is for no
password to be used, unless GPO requires one) 

When a user is connecting using the PSM, we still connect to the PSM machine
using the PSMConnect user, but we now use the shadow-user to run the client
(similar to a "run-as" approach). This creates full separation with each user
having its own permissions, files, registry - making it very difficult to harm
other users sessions. 

As these Shadow users are local users they should have the log on locally
right. 
 
A3:
This is a configurable parameter (ClearUserProfilesInterval). It can be found in
PVWA in: 
1) Administration Tab 
2) (System Configuration - Component Settings - Options) 
3) (PIM Suite Configuration - Privileged Session Management - General Settings -
Server Settings) 

This parameter defines the interval in which the Shadow User cleanup process
will be initiated. The default is every 30 days. The Shadow User account and
profile will be removed by this process if the associated Vault User no longer
exists in the vault. 

A4:
It would be recommended to keep the shadow user account as long as the
associated vault user still exists. Once the vault user is removed, the shadow
user will be cleaned up in the next cycle of the ClearUserProfilesInterval. 

If you need to keep the vault user and are not concerned about losing the
associated shadow user and profile, it is ok to manually clean these up on the
PSM server by completing both steps below: 

1) Control Panel -> System -> Advanced system settings -> On Advanced tab, in
the User Profiles section - Click on the Settings button -> Select the required
user name and click on the Delete button 

A5:
Because PSMRdpClient is the only connection client that runs with PSMConnect and
not a shadow user. 
If we were using a shadow user, some functionality won't work – like copy-paste
from client to target machine. 
And shadow user is not needed here for the purpose of security that we need it
for the other connection clients. 
 
A6:
There is no mechanism in place to allow automatic rotation of PSM Shadow Users
password. 

Please note that we don't consider Shadow Users to be a risk, because a Shadow
User is a weak user, who cannot log in remotely to the PSM server. 
Additionally, every session a new password is being generated for the Shadow
User. 
Product

Related Versions
N/A
URL Name
00003736
Article Record Type
FAQ
Privileged Session Manager (PAM Self-Hosted)PAM Self-Hosted



ATTACHMENTS

Refresh
Navigation ModeAction Mode


Sort by:TitleSorted: NoneShow actionsSort by:Last ModifiedSorted: NoneShow
actionsSort by:Created BySorted: NoneShow actions




Upload FilesOr drop files
FollowFollowingUnfollow


RELATED ARTICLES

 * How to manually run an application as a PSM Shadow User
   Number of Views2.61K
 * PSM service restart initiate Cleanup job for shadow user profile deletion
   Number of Views394
 * PSM SSMS with Windows Auth showing PSM Shadow User Name
   Number of Views2.02K
 * How do Safe Permissions work for Users and Groups?
   Number of Views1.86K
 * PSM Shadow user profile not cleaned up
   Number of Views2.44K


 * CyberArk Website
 * Terms & Conditions


Technical Community

CyberArk © 2023 CyberArk Software Ltd.

All rights reserved.

 * Privacy Policy
 * Community Feedback
 * Users Access





Loading