Skip to main content

Proxy Service Install

Logging directly onto managed systems from desktops leaves artifacts that can be compromised and requires ports to be opened into secure networks. A critical element of the Privilege Secure solution is the proxy, which is able to broker the connection between security zones. The application includes an advanced session proxy service for automatic connection to privileged sessions.

The NPS Proxy Service is installed on the proxy server as part of Privilege Secure install. It must also be installed on any server running services for the application, specifically the NPS Action Service, the NPS Scheduler Service, and NPS SIEM Service. This provides the option to run sessions defined in the application from different locations within your organization.

The NPS Proxy Service installer is in the Extras folder of the ZIP file downloaded from the Netwrix Customer portal. See the Install Components & Methods topic for additional information.

Follow the steps to install the NPS Proxy Service on another server that will run services for the application.

Remember, You must configure the Antivirus exclusions according to the Exclusions for Antivirus (AV) & Endpoint Software knowledge base article.

Step 1 – Copy the NPS.ProxyService.exe file to the desktop of the remote server.

Step 2 – Right-click on the installer and select Run as administrator. The Netwrix Privilege Secure Proxy Service Setup wizard opens.

Netwrix Privileged Secure Proxy Service Setup wizard on the EULA page

Step 3 – On the End User License Agreement page, check the I agree to the license terms and conditions box and click Options.

Remember, it is a best practice to read the agreement before accepting it.

Netwrix Privileged Secure Proxy Service Setup wizard on the Setup Options page

Step 4 – The default installation location for Install Folder is:

C:\Program Files\Netwrix\Netwrix Privilege Secure Proxy Service

  • To change the default location, click Browse and set a new location.
  • When the location is set, click OK.

Step 5 – You will return to the End User License Agreement page. Click Install.

NOTE: The installation process begins and the wizard displays the its Progress. This may take a few moments.

Netwrix Privileged Secure Proxy Service Setup wizard on the Successfully Completed page

Step 6 – When installation is complete, click Close.

The NPS Proxy Service is now installed on a remote server. You can verify that it is started and set to run automatically in the Services app (services.msc).

Register the Remote NPS Proxy Service

When the NPS Proxy Service is installed on a remote machine, it must be registered with the proxy server.

Follow the steps to register the NPS Proxy Service.

Step 1 – Validate the existence of the sbpam_node.json file in the installation directory of both the application and desired servers. The default location is:

C:\ProgramData\Stealthbits\PAM\ProxyService

NOTE: This file will not exist and needs to be created, unless there is already an application mesh or additional Proxy server installed.

Step 2 – Open the JSON file as an Administrator (via Administrator command prompt) on both servers.

Step 3 – (Optional) This step is only necessary if FQDN is required for DNS, otherwise do not change and move to step four. Ensure that the "advertise" value of the JSON file on each server has the Privilege Secure proxy server information:

{
"advertise": ["[Privilege Secure Server FQDN]", "[Privilege Secure Server IP Address]"],
"tag": []
}

For example:

{
"advertise": ["newyorksrv10.nwxtech.com", "192.168.13.172"],
"tag": []
}

NOTE: This file references the IP, FQDN, and hostname of the server you are on, not all servers.

Step 4 – Remove the sbpam-node.crt file from the following location on both servers:

C:\ProgramData\Stealthbits\PAM\tls\certs

Step 5 – On the proxy server, run the following command:

"C:\Program Files\Stealthbits\PAM\ProxyService\sbpam-proxy.exe" register ca-hash

Step 6 – Copy the returned hash value and substitute it into the next step.

Step 7 – On the proxy server, run the following command:

"C:\Program Files\stealtbits\PAMpam\ProxyService\sbpam-proxy.exe" register -s [Privilege Secure Server Address] -u [Privilege Secure Admin Account in NT-Style format] -H [Value copied in Step 6]

For example:

"C:\Program Files\stealthbits\PAM\ProxyService\sbpam-proxy.exe" register -s 192.168.13.172 -u nwxtech\ad.john.smith -H eb367841c099c0338cee72ed572c7b5539f68fa215f7598c0ef5dcc067ee729c

The NPS Proxy Service is now registered with the Privilege Secure application.

SSH for Legacy Cisco Device

If the Cisco device is running with insecure ciphers when the user attempts to connect to an SSH session, the following error message is displayed:

ssh: handshake failed: ssh: no common algorithm for key exchange; client offered: [curve25519-sha256@libssh.org ecdh-sha2-nistp256 ecdh-sha2-nistp384 ecdh-sha2-nistp521 diffie-hellman-group14-sha1], server offered: [diffie-hellman-group1-sha1]

Ideally the Cisco device should be upgraded to support secure ciphers. If this is not possible, it is necessary to add additional ciphers to machines with older (insecure) ciphers that need to be managed with SSH. You can “opt-in” by configuring the cipher suites used by the NPS Proxy Service.

Follow the steps to add Cipher information to the NPS Proxy Service.

Step 1 – Open a command prompt as an Administrator.

Step 2 – Change the directory path to the ProxyService folder in the NPS Proxy Service installation directory. The default path is:

C:\Program Files\Netwrix\Netwrix Privilege Secure Proxy Service\ProxyService

Step 3 – Run the following command to automatically generate the "sbpam_ssh" file:

.\sbpam-proxy.exe cfg -c sbpam_ssh

Step 4 – Browse to the location of the newly created file in "ProgramData". The default path is:

C:\ProgramData\Stealthbits\PAM\ProxyService

Step 5 – Copy and paste the following into the "nps_ssh.json" file.

{
"listenaddress": "0.0.0.0:4422",
"ClientSettings": {
"Algorithms": {
"KeyExchanges": [
"curve25519-sha256@libssh.org",
"ecdh-sha2-nistp256",
"ecdh-sha2-nistp384",
"ecdh-sha2-nistp521",
"diffie-hellman-group14-sha1",
"diffie-hellman-group1-sha1"
],
"Ciphers": [
"aes128-gcm@openssh.com",
"chacha20-poly1305@openssh.com",
"aes128-ctr",
"aes192-ctr",
"aes256-ctr",
"aes128-cbc",
"3des-cbc",
"aes192-cbc",
"aes256-cbc"
]
}
}
}

This will add the additional Key Exchange diffie-hellman-group1-sha1 and the additional Ciphers aes128-cbc, 3des-cbc, aes192-cbc, aes256-cbc, required to make old Cisco Machines work with remote login.