Skip to main content

Senhasegura

Description

The Senhasegura connector uses the Senhasegura A2A REST API to discover managed credentials (accounts) and managed devices within a Senhasegura PAM instance. It authenticates using the OAuth 2.0 client credentials grant, with managed devices recorded as SENHASEGURA_DEVICE entitlements and credentials mapped to the device they belong to.

System Type Classification

FieldValue
System TypePAM Tool
Default Scan Priority500

Version Support

OrbisID EditionSupported
CommunityNo
ProYes
EnterpriseYes

Supported Protocol

ProtocolPortNotes
Senhasegura REST API (HTTPS + OAuth 2.0)443 TCPClient credentials flow via /iso/oauth2/token

What OrbisID Discovers

DataSource
Managed credentials (accounts)GET /iso/pam/credential (paginated)
Account usernameusername / user field
Account hostnamehostname field — used as qualified account name
Managed devicesGET /iso/pam/device (paginated) — recorded as SENHASEGURA_DEVICE entitlements
Device typetype field — stored as entitlement attribute
Credential-to-device relationshipCredential hostname matched to device name

Connection Requirements

Senhasegura A2A Application

OrbisID authenticates using an A2A (Application-to-Application) OAuth 2.0 application registered in Senhasegura.

Steps to create the A2A application:

  1. In the Senhasegura Admin Console, navigate to A2A → Applications
  2. Click New and create a new application (e.g., OrbisID Scanner)
  3. Set the authentication type to OAuth 2.0
  4. Assign the following permissions:
    • PAM CoreList Credentials (read)
    • PAM CoreList Devices (read)
  5. Note the Client ID and Client Secret

Credential Mapping

OrbisID FieldSenhasegura Value
credential.usernameA2A application client ID
credential.passwordA2A application client secret
system.pamPlatformUrlSenhasegura base URL (e.g., https://pam.example.com)

Network Requirements

The OrbisID server (or On-Premise Agent) must have HTTPS access to the Senhasegura instance on port 443.

Configuration Steps

  1. Create an A2A OAuth 2.0 application in Senhasegura with PAM Core read permissions
  2. Create a Credential in OrbisID:
    • Username: A2A client ID
    • Password: A2A client secret
  3. Navigate to Systems → Add System
  4. Fill in the fields:
FieldValue
NameDescriptive name (e.g., Senhasegura – Production)
PAM Platform URLSenhasegura base URL (e.g., https://pam.example.com)
OS TypeSenhasegura
System TypePAM Tool
CredentialThe A2A application credential
  1. Click Test Connection to verify OAuth authentication
  2. Click Save

Troubleshooting

SymptomLikely CauseResolution
Authentication failedInvalid client ID or secretVerify the A2A application client ID and secret
Access denied (403) on credentialsMissing PAM Core read permissionAssign List Credentials to the A2A application
No devices returnedMissing PAM Core device read permissionAssign List Devices to the A2A application
Connection refusedPAM Platform URL incorrect or SSL errorVerify pamPlatformUrl; check that the Senhasegura server certificate is trusted