Skip to content
Merged

aa26 #802

Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
77 commits
Select commit Hold shift + click to select a range
23b44ee
AA26: Add Access Analyzer v1.0 documentation (266 pages, outline WIP)
Mar 20, 2026
5dc5bb7
AA26: Restructure outline — Overview + KB only, on-prem verbiage
Mar 20, 2026
1bd992b
AA26: Complete documentation outline — 10 top-level sections with sub…
Mar 20, 2026
ade6132
AA26: Restructure outline — File Servers subsections, merge Dashboard…
Mar 31, 2026
3b0b557
build(deps): bump path-to-regexp
dependabot[bot] Mar 31, 2026
3c56da1
AA26: Structural restructure and naming improvements across documenta…
Apr 6, 2026
b5f0471
AA26: Update install guides with complete outbound domain list
Apr 7, 2026
e575b02
Rename Access Analyzer version from 1.0 to 2601
Apr 8, 2026
d8c916e
AA26: Remove Unity, Celerra, and VNX connector pages — not supported …
Apr 8, 2026
e202efc
AA26: Add quick start guides, schema references, reports pages, and o…
securebutsassy Apr 9, 2026
0760d90
Merge pull request #2 from netwrix-dev/farrah-gamboa_nwx/aa26-documen…
Cmej413 Apr 9, 2026
d63a106
AA26: Add source groups, scans, scan executions, and scanner best pra…
securebutsassy Apr 13, 2026
411ce11
Merge pull request #3 from netwrix-dev/farrah-gamboa_nwx/aa26-documen…
Cmej413 Apr 13, 2026
5e183ec
AA26: Rename service account pages to credential type names
securebutsassy Apr 13, 2026
c89ca10
Merge pull request #4 from netwrix-dev/farrah-gamboa_nwx/aa26-documen…
Cmej413 Apr 13, 2026
4a4d062
AA26: Add Access Analyzer v1.0 documentation (266 pages, outline WIP)
Mar 20, 2026
f2f72d5
AA26: Restructure outline — Overview + KB only, on-prem verbiage
Mar 20, 2026
6405016
AA26: Complete documentation outline — 10 top-level sections with sub…
Mar 20, 2026
c98573f
AA26: Restructure outline — File Servers subsections, merge Dashboard…
Mar 31, 2026
2f98a36
AA26: Structural restructure and naming improvements across documenta…
Apr 6, 2026
4d5d7b3
AA26: Update install guides with complete outbound domain list
Apr 7, 2026
070f774
Rename Access Analyzer version from 1.0 to 2601
Apr 8, 2026
d79ccad
AA26: Remove Unity, Celerra, and VNX connector pages — not supported …
Apr 8, 2026
2e65d5e
AA26: Add quick start guides, schema references, reports pages, and o…
securebutsassy Apr 9, 2026
6c77906
AA26: System logs docs, scanner/scope fixes, remove stale pages
securebutsassy Apr 13, 2026
e93cec9
Merge pull request #5 from netwrix-dev/farrah-gamboa_nwx/aa26-documen…
Cmej413 Apr 13, 2026
76eb208
AA26: Add My Reports, Reports index, Users, Sensitive Data, and Ident…
securebutsassy Apr 13, 2026
f5578b9
AA26: Add IdP installation article and cross-link configuration article
securebutsassy Apr 13, 2026
1873c39
Rewrite install/identity-provider.md with full kcadm.sh procedures
securebutsassy Apr 13, 2026
cd64af1
Rebalance install/identity-provider.md — guided prose with commands
securebutsassy Apr 13, 2026
aefc653
AA26: Add per-version KB source routing and v2601 KB placeholder
Apr 13, 2026
7d957fc
AA26: Add placeholder connector requirement pages for NAS file servers
Apr 13, 2026
9a95eee
AA26: Add installer command reference page under Installation
securebutsassy Apr 14, 2026
934dc55
Merge pull request #6 from netwrix-dev/farrah-gamboa_nwx/aa26-documen…
Cmej413 Apr 14, 2026
b7c9bb9
Merge pull request #1 from netwrix-dev/dependabot/npm_and_yarn/npm_an…
Cmej413 Apr 14, 2026
837d498
Add migration KB articles and adoption framing for AA26
securebutsassy Apr 14, 2026
0a86385
Add service account creation steps and screenshots to configuration docs
securebutsassy Apr 14, 2026
d913794
AA26: Fix system requirements — installer minimum CPU and OS compatib…
Apr 14, 2026
b68d6a2
AA26: Fix Quick Install CPU requirements and OS compatibility note
Apr 14, 2026
af2dec3
Add proxy server and job configuration migration articles
securebutsassy Apr 14, 2026
45de55d
docs(2601): document Keycloak/IdP installer integration and update sy…
Apr 14, 2026
cc059c2
Update AA26 migration articles and add configurations section
securebutsassy Apr 14, 2026
dd2b1a9
Merge pull request #7 from netwrix-dev/farrah-gamboa_nwx/aa26-documen…
Cmej413 Apr 14, 2026
592e0b5
docs(2601): remove Docker Hub endpoints from network requirements
Apr 14, 2026
fd645ef
docs(2601): move Activity Monitor Integration from KB to Configuration
Apr 15, 2026
39fe41f
Merge private/carlos-mejia_nwx/aa26-documentation — accept remote sta…
Apr 16, 2026
0ff8fa5
AA26: Remove Notifications and connector-specific Service Account pag…
Apr 16, 2026
a507627
docs(2601): Active Directory content fixes and schema heading cleanup
AleksNWX Apr 21, 2026
762897d
AA26: AD authentication docs overhaul — env-var Quick Install, TLS ce…
Apr 22, 2026
53b8647
Merge pull request #9 from netwrix-dev/aleksa_nwx/aa26-documentation
AleksNWX Apr 22, 2026
c195cd3
docs(2601): File server connector documentation — Phase 1 fixes and P…
AleksNWX Apr 22, 2026
9d2e7c3
docs(2601): File server documentation Phase 3 — activity monitor, set…
AleksNWX Apr 22, 2026
dc2b2b7
AA26: Update deployment sizing memory requirements and add internal p…
Apr 22, 2026
d48d01c
Merge pull request #11 from netwrix-dev/file-servers/aa26-documentation
AleksNWX Apr 22, 2026
42fa842
docs(2601): Scanner documentation — overview, requirements, deploy, m…
AleksNWX Apr 22, 2026
fd0dd6a
Merge pull request #12 from netwrix-dev/scanners/aa26-documentation
AleksNWX Apr 22, 2026
7fcf97b
AA26: Activity Monitor integration rewrite, Key Concepts and Overview…
Apr 23, 2026
df10f93
AA26: Add Entra ID OIDC path to Quick Install guide
Apr 23, 2026
66dd4ad
AA26: Source Groups and Scanners documentation updates
Apr 23, 2026
a349692
AA26: MIP label permissions, sensitive data updates, users page overh…
Apr 23, 2026
08b5c57
AA26: Add Application Settings documentation
Apr 23, 2026
6a48ec2
AA26: Replace all bare AA26 references with AA2601 across docs
Apr 23, 2026
fd54a7d
AA26: Expand Administrator role to include user management rights
Apr 23, 2026
3f29a6a
AA26: Rewrite SharePoint Online connector and getting-started docs
AleksNWX Apr 23, 2026
caaefd7
AA2601 docs: hide post-GA IdP options; reorder installer command refe…
Apr 23, 2026
97d9fe3
SharePoint Online documentation
Cmej413 Apr 23, 2026
a3fdd68
AA2601 docs: remove stub dashboard pages from dashboards-reports section
Apr 23, 2026
f43c415
AA2601 docs: hide KB article template from published site
Apr 23, 2026
f5e5a7e
AA26: Rewrite Entra ID connector and getting-started docs
AleksNWX Apr 23, 2026
2253cb8
Entra ID connector documentation
Cmej413 Apr 23, 2026
91b0605
AA2601 docs: add version notice to overview page
Apr 23, 2026
1adfd4a
AB#432256: Quick Start Guide supplements — GA pre-release pass
Apr 23, 2026
606987d
Merge branch 'dev' into carlos-mejia_nwx/aa26-documentation
jth-nw Apr 23, 2026
cfb1ad6
fix: restore privilegesecurediscovery v2.22 config lost in merge conf…
jth-nw Apr 23, 2026
61914b2
fix(aa2601): resolve broken links from 1.0-to-2601 rename and templat…
jth-nw Apr 23, 2026
c723c69
fix(aa2601): use .md file references for category-index docs
jth-nw Apr 23, 2026
9fdfaa1
Merge pull request #801 from netwrix/carlos-mejia_nwx/aa26-documentation
jth-nw Apr 23, 2026
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 6 additions & 0 deletions docs/accessanalyzer/2601/configurations/_category_.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
{
"label": "Configuration",
"position": 16,
"collapsed": true,
"collapsible": true
}

Large diffs are not rendered by default.

106 changes: 106 additions & 0 deletions docs/accessanalyzer/2601/configurations/application-settings.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,106 @@
---
title: "Application Settings"
description: "Managing application settings in the Configuration node"
sidebar_position: 80
---

# Application Settings

The Application Settings page exposes configurable options that control scan behavior, file scanning limits, feature availability, Activity Monitor integration, and application branding. Navigate to **Configuration** > **Application Settings** to view and modify these settings.

:::note
This page is available to users with the **Administrator** role only.
:::

## Setting categories

| Category | What it controls |
| --- | --- |
| **Feature Flags** | Enable or disable product features and integrations |
| **Scanning** | Execution history retention for scans and identity syncs |
| **File Scanning** | File size limits and excluded extensions for SMB and SharePoint scans |
| **Activity Monitor** | TCP listener behavior and enrollment token for NAM agent connections |
| **Branding** | Company name and support email displayed in the application |

## Feature Flags

Feature flags enable or disable specific product capabilities. Changes take effect immediately — no restart required.

| Flag | Default | Description |
| --- | --- | --- |
| **MIP Labeling** | Enabled | Enables Microsoft Information Protection (MIP) sensitivity label management for SMB file shares and SharePoint Online. When disabled, the label handling options on the Sensitive Data page are hidden and no labels are applied to or read from files during scans. |

:::note
Disabling MIP Labeling does not remove existing labels from files. It stops Access Analyzer from applying or updating labels in future scans.
:::

## File Scanning

These settings control which files are included in content classification during sensitive data scans. Adjusting them can reduce scan duration in environments with large binary or media files.

:::note
File metadata — name, size, permissions, and owner — is always collected regardless of file size or extension settings. These limits apply only to content classification during sensitive data scans.
:::

### SMB / CIFS

| Setting | Default | Range | Description |
| --- | --- | --- | --- |
| **Maximum file size** | 10 MB | 1–100 MB | Files larger than this limit are skipped during content classification. |
| **Excluded extensions** | `.exe, .msi, .bat, .png, .jpg, .jpeg, ...` | — | Comma-separated list of file extensions to skip. Add extensions to reduce scan time on known binary or media content. |

### SharePoint Online

| Setting | Default | Range | Description |
| --- | --- | --- | --- |
| **Maximum file size** | 1 MB | 1–50 MB | Files larger than this limit are skipped during content classification. |
| **Excluded extensions** | `.exe, .msi, .bat, .png, .jpg, .jpeg, ...` | — | Comma-separated list of file extensions to skip. |

## Scanning — Execution History Retention

Access Analyzer automatically purges old execution records on a nightly schedule based on these thresholds.

| Setting | Default | Range | Description |
| --- | --- | --- | --- |
| **Scan execution retention** | 90 days | 7–365 days | How long scan execution records are retained before automatic deletion. |
| **Sync execution retention** | 90 days | 7–365 days | How long identity sync execution records are retained before automatic deletion. |

:::note
Reducing retention frees database storage. Increasing it extends the history available in **Configuration** > **Source Groups** > **Scan Executions**.
:::

## Activity Monitor

The Activity Monitor category contains settings for the built-in TCP listener and the enrollment token used when connecting Netwrix Activity Monitor (NAM) agents to Access Analyzer.

### Enrollment Token

The enrollment token is a short-lived credential that NAM agents present during their first connection to Access Analyzer. You generate it here and paste it into the NAM agent output configuration.

1. Scroll to the **Activity Monitor** section and locate **Enrollment Token**.
2. Click **Generate Token**.
3. Copy the token using the clipboard icon.
4. Paste the token into your NAM agent output configuration before it expires.

:::note
Tokens expire after **1 hour**. Generating a new token immediately invalidates any previously issued token. A single token can enroll multiple agents simultaneously — generate it immediately before starting your enrollment session.
:::

For the full step-by-step setup walkthrough, see [Activity Monitor Integration](activity-monitor-integration.md).

### Listener settings

The remaining settings in the Activity Monitor category control TCP listener behavior — connection limits, batch sizes, buffer sizes, and timeouts. The defaults are appropriate for most deployments. For a description of each setting and guidance on tuning, see the [Activity Monitor Integration — Application Settings Reference](activity-monitor-integration.md#application-settings-reference) section.

## Branding

| Setting | Default | Description |
| --- | --- | --- |
| **Company name** | Netwrix | Displayed in the application interface. |
| **Support email** | support@netwrix.com | Email address shown to users when they need assistance. Update this to your internal helpdesk address after initial setup. |

## Resetting and cache behavior

**Resetting to default:** Each setting has a reset action that restores the factory default value. Resetting one setting does not affect any other settings.

**Cache:** Application Settings are cached for up to 5 minutes. Changes take effect immediately on the instance that applied them. Other running instances pick up the change within 5 minutes. To force an immediate refresh across all instances, click **Refresh Cache** at the top of the page.
190 changes: 190 additions & 0 deletions docs/accessanalyzer/2601/configurations/identity-provider.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,190 @@
---
title: "Identity Provider"
description: "Configure single sign-on with an external Identity Provider in Access Analyzer"
sidebar_position: 75
---

# Identity Provider

Access Analyzer supports federation with your organization's identity system so that users can sign in with their existing corporate credentials. Authentication is handled by your identity provider; roles and permissions are managed within Access Analyzer.

Setting up an identity provider connection is a two-part process: first you configure the integration in your identity system, then you prepare user accounts inside Access Analyzer.

:::note
Before completing the steps below, confirm that the infrastructure and network requirements for your IdP type are in place. See [Configure Identity Provider](../install/identity-provider.md) in the Installation section.
:::

## Supported integration types

| Type | Description |
| --- | --- |
| **LDAP / Active Directory** | Access Analyzer connects directly to your LDAP directory or Active Directory. Users enter their directory credentials on the Access Analyzer login page — no redirect occurs. |

## Part 1: Configure your identity provider

:::tip
For a complete Active Directory walkthrough that pairs this user-configuration guide with the installer-side steps, see the [Quick Install](../install/quickinstall.md).
:::

<!-- HIDDEN: Entra ID (OIDC), Entra ID (SAML), and Generic SAML are post-GA. Uncomment when ready to publish.

### Entra ID (OIDC)

Complete the following steps in Azure Portal before connecting Access Analyzer.

1. Open **Azure Portal** > **Entra ID** > **App registrations** > **New registration**.
2. Name the application and select **Accounts in this organizational directory only**.
3. Click **Register**.
4. Open the new registration > **Authentication** > **Add a platform** > **Web**.
5. Enter the redirect URI in the format `https://<hostname>/auth/realms/dspm/broker/<alias>/endpoint`, where `<hostname>` is your Access Analyzer host and `<alias>` is the identifier for this connection.
6. Click **Save**.
7. Go to **API permissions** > **Add a permission** > **Microsoft Graph** > **Delegated permissions** and add `openid`, `profile`, and `email`.
8. Click **Grant admin consent**.
9. Go to **Certificates & secrets** > **New client secret**. Set an expiry that fits your rotation policy and copy the value immediately — it's only shown once.

Collect the following values. You'll need them when Access Analyzer is connected to this application registration.

| Value | Where to find it |
| --- | --- |
| **Tenant ID** | Azure Portal > Entra ID > Overview > Directory (tenant) ID |
| **Client ID** | App registration > Overview > Application (client) ID |
| **Client secret** | Created in step 9 above |

### Entra ID (SAML)

1. Open **Azure Portal** > **Entra ID** > **Enterprise applications** > **New application**.
2. Click **Create your own application**, name it, and select **Integrate any other application you don't find in the gallery**.
3. Click **Create**.
4. Open the enterprise application > **Single sign-on** > **SAML**.
5. Click **Edit** on Basic SAML Configuration and enter the **Identifier (Entity ID)** and **Reply URL (ACS URL)** for your Access Analyzer instance.
6. Click **Save**.
7. Copy the **App Federation Metadata URL** from the SAML configuration page.

Collect the following values:

| Value | Where to find it |
| --- | --- |
| **Tenant ID** | Azure Portal > Entra ID > Overview > Directory (tenant) ID |
| **App Federation Metadata URL** | Enterprise application > Single sign-on > SAML configuration page |

### Generic SAML

Register Access Analyzer as a service provider in your IdP using the **SP ACS URL** and **SP Entity ID** for your instance. After your IdP administrator completes the registration, collect the following values:

| Value | Description |
| --- | --- |
| **SSO URL** | Your IdP's Single Sign-On endpoint |
| **Entity ID** | Your IdP's issuer/entity identifier |
| **Signing certificate** | Your IdP's SAML signing certificate in PEM format |
| **Email attribute name** | The SAML attribute your IdP uses to carry the user's email address (common values: `email`, `mail`, or `http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress`) |

END HIDDEN -->

### LDAP / Active Directory

No application registration or callback URL is required for LDAP. Prepare the following before connecting.

**Service account:**

Create a dedicated, read-only service account in your directory with read access to the user base DN. For Active Directory, the account needs **Read** permission on the user OU. No write access or special group membership is required.

**Network access:**

The Access Analyzer cluster must be able to reach your LDAP server on the configured port (389 for LDAP, 636 for LDAPS). Confirm that this traffic is permitted from the Access Analyzer cluster's egress IP range.

:::warning
Plain LDAP (`ldap://`) transmits credentials in cleartext. Use `ldaps://` (port 636) for production deployments.
:::

Collect the following values:

| Value | Description |
| --- | --- |
| **LDAP server URL** | Including protocol and port — for example, `ldaps://corp.example.com:636` |
| **Service account DN** | The distinguished name of the read-only service account |
| **Service account password** | — |
| **Users base DN** | The path where user accounts are stored — for example, `ou=users,dc=example,dc=com` |
| **Email attribute name** | The LDAP attribute that holds the user's email address (usually `mail`) |
| **Directory type** | Active Directory or generic LDAP |

## Part 2: Prepare Access Analyzer

### Sign in as the bootstrap User Admin

<!-- SYNC: install/quickinstall.md "Sign in as the bootstrap User Admin" -->
<!-- If you change this block, update the matching block in install/quickinstall.md -->

The installer seeds a bootstrap account, `admin@dspm.local`, with the **User Admin** role. This account can create and manage other users but **cannot** access system configuration. Use it on first login to pre-provision your users, then sign out and sign back in as an Administrator for system-level work.

1. Retrieve the bootstrap admin password from the Kubernetes secret:

```bash
sudo kubectl get secret -n access-analyzer dspm-bootstrap-admin \
-o jsonpath='{.data.password}' | base64 -d; echo
```

2. Open a browser and navigate to `https://<your-hostname>`.

3. Sign in with:
- **Username**: `admin@dspm.local`
- **Password**: (from step 1)

4. Complete first-login setup:
- Scan the QR code with an authenticator app, enter a device name, submit the one-time code. **Save this enrollment** — you will need the same authenticator for any future bootstrap admin login.
- Enter a first name and last name. **Do not change the email address.**

Proceed to [Pre-provision user accounts](#pre-provision-user-accounts) below.

<!-- END SYNC -->

### Pre-provision user accounts

Before a user can sign in through the identity provider, their account must exist in Access Analyzer. The application authenticates them against your IdP successfully but denies access if no matching account has been created.

:::note
The email address entered during pre-provisioning must exactly match the address sent by the IdP or stored in the LDAP `mail` attribute, including case. A mismatch causes sign-in to fail.
:::

1. Navigate to **Configuration** > **Users**.
2. Click **Add User**.
3. Enter the user's **Name** and **Email** address.
4. Select a **Role**: **Administrator**, **User Admin**, or **Viewer** (see [Roles](#roles) below).
5. Click **Create User**.

Assign at least one user the **Administrator** role — the bootstrap `admin@dspm.local` account is a User Admin only and cannot access system configuration. Assign at least one additional user the **User Admin** role if you want a non-bootstrap user to manage accounts going forward.

No password is required for pre-provisioned accounts. For details on managing users, see [Users](users.md).

### Roles

<!-- SYNC: install/quickinstall.md "Roles" -->
<!-- If you change this block, update the matching block in install/quickinstall.md -->

Access Analyzer has three roles. The bootstrap `admin@dspm.local` account is seeded as User Admin, so it can pre-provision the rest of your users, including your first Administrator.

| Role | Description |
| --- | --- |
| **Administrator** | Full access: system configuration (sources, scans, connectors, application settings) and user management (create, edit, activate, deactivate, and delete users; assign roles; pre-provision federated users). |
| **User Admin** | User and role management rights only: create, edit, activate, deactivate, and delete users; assign roles; pre-provision federated users. Does **not** have system configuration rights. The bootstrap `admin@dspm.local` account is assigned this role. |
| **Viewer** | Read-only access to data and reports. No configuration or user management rights. |

<!-- END SYNC -->

## How sign-in works after IdP is configured

When identity provider integration is active, the Access Analyzer login page presents a credential form that validates against your directory.

On first sign-in, Access Analyzer matches the email address from the IdP token or LDAP directory to the pre-provisioned account and permanently links the IdP identity to that account. On all subsequent sign-ins, the user's unique IdP identifier is used directly.

Sessions are valid for up to 8 hours from sign-in and expire after 4 hours of inactivity.

## Constraints

| Item | Detail |
| --- | --- |
| **Pre-provisioning required** | Users must have an account in Access Analyzer before their first sign-in. |
| **Email must match exactly** | The email entered during pre-provisioning must match what the IdP or LDAP directory sends, including case. |
| **Roles managed in Access Analyzer** | Roles and permissions are set in Access Analyzer, not in your IdP or directory. |
| **Local accounts coexist** | The administrator account created at deployment remains a local account and continues to sign in with a password. |
| **Password reset unavailable for federated accounts** | The **Reset Password** action in the Users page is available for local accounts only. Federated users manage their credentials through your IdP. |
| **Name and email locked after first sign-in** | Once a user has signed in at least once, their name and email are set from the IdP token and can't be changed in the Access Analyzer UI. Update them in your IdP instead. |
Loading
Loading