Lithnet Access Manager
PricingRequest a trial or quoteDownloads
v2.0
v2.0
  • Home
  • What's new in Access Manager v2
  • How does Lithnet Access Manager help prevent lateral movement?
  • Access Manager Editions
  • Licensing
  • Change log
  • Installation
    • Getting started
    • System Requirements
    • Downloads
    • Upgrading from Access Manager v1
    • Installing the Access Manager Server
      • Creating a service account for the Access Manager Service
      • SQL installation options
      • Installing the Access Manager Service
      • High availability options
        • Load balancing Access Manager
        • Installing Access Manager in a Failover Cluster
    • Installing the Access Manager Agent
      • Choosing between the Microsoft and Lithnet agents for LAPS support
      • Installing the Access Manager Agent on Windows
      • Installing the Access Manager Agent on Linux
      • Installing the Access Manager Agent on macOS
  • Configuration
    • Setting up Authentication
      • Setting up authentication with ADFS
      • Setting up authentication with Azure AD
      • Setting up authentication with Okta
      • Setting up smart card authentication
      • Setting up integrated windows authentication
    • Deploying Features
      • Setting up Microsoft LAPS for Active Directory
      • Setting up Microsoft LAPS for Azure Active Directory
      • Setting up Lithnet LAPS
        • Preparing the AMS directory
        • Setting the AMS directory for Lithnet LAPS clients
        • Setting up Lithnet LAPS for Azure AD joined and registered devices
        • Setting up Lithnet LAPS for domain-joined devices
        • Setting up Lithnet LAPS for macOS and Linux
        • Setting up Lithnet LAPS for standalone Windows devices
      • Setting up BitLocker access
      • Setting up JIT for computers
      • Setting up JIT for roles
    • Importing authorization rules
      • Import Microsoft LAPS permissions from Active Directory
      • Importing BitLocker permissions from Active Directory
      • Importing local administrator group membership from domain-joined Windows devices
      • Import mappings from a CSV file
      • Importing rules from the Lithnet LAPS web app
      • Performing an offline discovery of local admins
  • Help and support
    • Frequently asked Questions
    • Troubleshooting
    • Quick start guides
      • Getting started with Windows LAPS and Lithnet Access Manager
      • Getting started with Windows LAPS for Active Directory
      • Getting started with Windows LAPS for Azure Active Directory
    • Support Articles
      • KB000001: The Access Manager Agent cannot connect and logs a token-validation-failed error
      • KB000002: Users retain their admin rights after their JIT period expires
      • KB000003: Configuring the Access Manager Agent to manage an account other than 'root' on Linux
      • KB000004: Creating a log file to troubleshoot installation issues with the Access Manager Service
      • KB000005: Access Manager stops working after applying the November 2022 Windows update
      • KB000006: Migrating the Access Manager Database
      • KB000007: Adding JIT groups via Group Policy doesn't work with NTLM Disabled
      • KB000008: AMS is unable to JIT into privileged groups such as Domain Admins
    • Advanced help topics
      • Ports and traffic flows
      • Internet access requirements
      • Access evaluation in Access Manager Service (AMS)
      • Recovering from a lost encryption certificate
      • Script-based authorization
      • Customized auditing with PowerShell notification channels
      • Variables available in audit notification channels
      • Setting up audit templates
      • Backup and Restore
      • Event ID reference
    • PowerShell reference
      • Add-AmsDeviceRegistrationKeyGroup
      • Add-AmsGroupMember
      • Export-AmsServerDiagnostics
      • Get-AmsActiveDirectoryJitOptions
      • Get-AmsComputerAuthorizationRule
      • Get-AmsDevice
      • Get-AmsDeviceRegistrationKey
      • Get-AmsGroup
      • Get-AmsGroupMembers
      • Get-AmsHostConfig
      • Get-AmsJitSchedulerJob
      • Get-AmsLocalAdminPassword
      • Get-AmsLocalAdminPasswordHistory
      • Get-AmsRoleAuthorizationRule
      • New-AmsComputerAuthorizationRule
      • New-AmsDeviceRegistrationKey
      • New-AmsGroup
      • New-AmsRoleAuthorizationRule
      • Remove-AmsComputerAuthorizationRule
      • Remove-AmsDevice
      • Remove-AmsDeviceRegistrationKey
      • Remove-AmsDeviceRegistrationKeyGroup
      • Remove-AmsGroup
      • Remove-AmsGroupMember
      • Remove-AmsJitSchedulerJob
      • Remove-AmsRoleAuthorizationRule
      • Set-AmsActiveDirectoryJitOptions
      • Set-AmsComputerAuthorizationRule
      • Set-AmsDevice
      • Set-AmsDeviceRegistrationKey
      • Set-AmsGroup
      • Set-AmsHostConfig
      • Set-AmsRoleAuthorizationRule
    • Application help pages
      • Access Manager Directory configuration page
      • Access Manager Directory Devices page
      • Access Manager Directory Groups page
      • Lithnet LAPS configuration page (Access Manager Directory)
      • Access Manager Directory Registration Keys page
      • Lithnet LAPS configuration page (Active Directory)
      • Microsoft LAPS configuration page
      • Active Directory configuration page
      • Auditing page
      • Authentication configuration page
      • Computer authorization rules page
      • Role authorization rules page
      • Azure Active Directory configuration page
      • BitLocker configuration page
      • Database configuration page
      • Effective access page
      • Email configuration page
      • IP Address detection configuration page
      • Just-in-time access configuration page
      • Licensing configuration page
      • Rate limit configuration page
      • Host configuration page
      • User interface configuration page
      • Security page
    • Getting Support
Powered by GitBook
On this page
  • Summary
  • Upgrading the Access Manager Agent
  • Upgrade the Access Manager Server
  • Method 1: In-place upgrade
  • Upgrade method 2: Deploying to a new server and importing existing configuration
  • Upgrade method 3: Importing authorization rules
  • Changed functionality
  • Just-in-time Access changes
  • Audit templates
  • Audit scripts
  • Certificate authentication

Was this helpful?

  1. Installation

Upgrading from Access Manager v1

PreviousDownloadsNextInstalling the Access Manager Server

Last updated 1 year ago

Was this helpful?

Summary

There are several methods you can use to upgrade AMS to version 2, and a few things you will need to plan for.

  • Access Manager v2 requires an SQL server. You can either use the built-in Microsoft SQL Express instance, or an external SQL server. , and ensure you have an appropriate database backup strategy in place.

  • If you had deployed AMS in a failover cluster, the shared storage is no longer a requirement, but can remain if you'd like to have a central copy of the log files.

Upgrading the Access Manager Agent

If you've deployed the Access Manger Agent in your environment, you can simply deploy the new version. There are no changes in functionality or behavior from v1.0 for domain-joined hosts.

Upgrade the Access Manager Server

Method 1: In-place upgrade

The in-place upgrade process from Access Manager v1 to v2 is very straight forward. You simply install the new version of AMS over the top, and the application will take care of importing the configuration from v1 automatically.

We recommend taking a backup of the server, or at least the config folder, before you begin the upgrade process.

A few notes about this method

  • Access Manager v2 no longer uses the appsettings.json file to store its configuration. Upon installation, the configuration will be imported into the database, and the file renamed appsettings.json.<date>.backup

  • All authorization rules, audit templates, scripts, certificates and user interface configuration will be imported into the database. Scripts and template files remain on the disk in the config folder, but are no longer used.

Upgrade method 2: Deploying to a new server and importing existing configuration

If you do not wish to upgrade your existing server, and want to deploy v2 on a new server, while keeping all your configuration then follow these steps.

From the AMS v1 server

  1. From the AMS v1 server, navigate to the config folder that was specified during installation. This is usually C:\Program Files\Lithnet\Access Manager Service\config, unless modified at installation time.

  2. From the config folder, copy all files and folders except for the db folder. The database does not contain stateful information, and does not need to be migrated to v2.

  3. Open the configuration tool, navigate to the Local admin passwords tab, and export any encryption certificates that are present.

On the new server

Migration of config to a new server must be done before the new server is configured. If configuration has taken place on the new server, then an import of settings is not possible. You will still be able to import authorization rules, as per the section on Upgrade method 3.

  1. Install the Access Manager v2 service onto the new host. Do not open the configuration tool when prompted by the installer. If you configure the new instance, a configuration import is not possible.

  2. Stop the Lithnet Access Manager Service Windows service

  3. Copy the contents of the config folder obtained for the v1 installation, and place it in the v2 server's config folder.

  4. The config folder should now contain the appsettings.json file, the scripts folder, and the templates folder.

  5. Start the Lithnet Access Manager Service Windows service

  6. Open the access-manager-v1-migration.log file located by default in the logs folder at C:\Program Files\Lithnet\Access Manager Service\logs and check for any migration errors

Note that encrypted values such as the OpenID Connect application secret, and SMTP password cannot be migrated from one server to another, and will be set to blank values. You will need to reset these from the configuration tool to the correct value.

  1. Open the configuration tool, and navigate to the Directory Configuration, Active Directory, Lithnet LAPS page. If you exported encryption certificates from the v1 instance, re-import those certificates here.

  2. Enter any OpenID Connect or SMTP passwords that were not migrated from the import process.

  3. Validate the configuration is as you expect, and then save the settings.

Upgrade method 3: Importing authorization rules

The final upgrade method is to deploy a new server, install Access Manager, and configure it from scratch, but then importing only the authorization rules and associated notification channels from the v1 server.

  1. On the AMS v1 host, navigate to the applications config folder using Windows Explorer. (By default this is at C:\Program Files\Lithnet\Access Manager Server\config). From there, copy the appsettings.json, as well as the audit-templates and scripts folders.

  2. Copy these files to the new host, and place them in a new folder, keeping the original structure intact (e.g. appsettings.json file is in the same folder as the audit-templates and scripts folders).

  3. Install Access Manager v2 onto the new host.

  4. Navigate to Authorization Rules, Computer, and click the Import authorization rules button.

  5. When prompted, select the option to Import authorization rules from an Access Manager v1.0 config folder

  6. Select the path to folder you created that contains the appsettings.json file and associated sub folders. Optionally select if the import wizard should also import your notification channels and subscriptions for each rule.

  7. Validate the rule settings, and make any modifications that are appropriate, and import them into your v2 system when you are ready.

  8. Save your configuration to commit the new rules to the server.

Changed functionality

Just-in-time Access changes

In order to better manage Active Directory resources, AMS v2 has moved to an internal scheduler to manage the removal of principals from groups when their access period has expired.

There are no configuration changes required to AMS or AD to transition to the internal scheduler. However, it is important to note, that if the AMS server is offline at the time when a user's JIT access was scheduled to be removed, the removal will not take place. However, when the AMS server is brought back online, the scheduled removals will take place immediately.

Enterprise edition customers can run multiple front-end AMS servers. As long as one of the servers is up, then the scheduled removal will be executed.

Audit templates

Access Manager v1 allowed you to provide an individual success and failure file to be used for email and webhook templates.

The import process will automatically convert your success and failure templates into a new conditionally rendered file. Audit events will appear and behave just as they did in v1.

Audit scripts

Changes were also made to the PowerShell audit scripts feature. All your existing scripts will be imported, and will work for computer authorization auditing, as they do today. They will be marked as v1 scripts in the UI.

Note that support for v1 audit scripts will be removed in a future version of Access Manager.

Certificate authentication

Open the configuration tool and configure the app according to the

In Access Manager v1, when the JIT feature was used in an Active Directory domain that did not have the privilege access management optional feature turned enabled, AMS would fall back to a mechanism that used . These are objects that self-delete after a period of time. While this served the JIT function well, each JIT request consumed a RID from the - a large, but finite resource.

The gold standard for JIT access, will always be using the of Active Directory. We do recommend upgrading to Windows Server 2016 functional level, and enabling the PAM optional feature for the best JIT experience possible. Access Manager will always use this mode for JIT if it is available in the domain.

Access Manager v2 introduces a powerful new rendering engine that allows you to have a single template file, and conditionally render it based on the audit data to your choosing. This is done using the language.

However, if you plan to use JIT for roles, you'll need to that accommodate role auditing alongside computer auditing. You can use the imported scripts, but they may not contain all the information you expect. Simply create a new email or webhook audit channel, and the new format templates will be pre-filled for you.

In order to process JIT for roles events, you'll need to update them to the .

In line with the certificate-based authentication changes announced by Microsoft in , Access Manager v2, by default, now only accepts certificates containing the user's SID in an extension with OID 1.3.6.1.4.1.311.25.2.

If your certificates were issued before this patch was installed, they will not contain this new extension, and AMS will fail to authenticate the user. In order to resolve this issue, you can enable the old behavior from the page, by selecting Enable weak identity bindings and select enable UPN mapping.

You'll need to plan for where you will set your database up
setup guide
Active Directory dynamic objects
RID pool
Privileged Access Management optional forest feature
handlebars
create new templates
new v2 script format
KB5014754
Authentication