Skip to main content
Question

How to use smart rules to link systems to users in Password Safe

  • January 16, 2026
  • 4 replies
  • 18 views

I’m starting to onboard users and computers to password safe and I want to allocate certain users to certain servers.

So to illustrate.

Team A has 5 users each user has a std AD account and a dedicated admin AD account.

This team is responsible for several servers which I have put in an AD group.

 

I can do the directory queries and onboard the servers and manage them. I can also onboard and manage the dedicated admin accounts and link them to the std accounts.

I’ve hit a road block linking the accounts to the servers.

There is an existing onboarding rule which sets an attribute (Tier1Server) on Servers and a rule which sets an attribute (Tier1account) on T1 accounts. The servers I want to sort now and the team users are a subset of Tier 1 so I should be able to use the similar process using attributes.

So I create a managed account smart rule with selection criteria of the directory query relating to that user group so I can set an attribute of the team name on those users. But when I save and view results it shows nothing.

Am I going about this the right way using attributes or am I just missing something on when the directory query isn’t pulling back user accounts.

Thanks

 

 

4 replies

Forum|alt.badge.img
  • January 16, 2026

Sounds like what you’re trying to do is link the assets to the managed accounts, correct?  That’s done with two smart rules:  an asset smartrule and a managed account smartrule.  For example: 

 

Create an asset smartrule that lists all your server(s).  This can be a query by attributes that you set during onboarding or regex or whatever.  It’s a good practice to keep your Onboarding smartrules separate from your asset ACL smartrules. 

 

Create a “managed account” smartrule:

Selection Criteria

  • Your directory query of managed (or dedicated) accounts

Actions:

  1. Show managed account as Smart Group
  2. Link domain accounts to managed systems -- select the asset smartrule that lists all the servers they should be linked to. 

  • Author
  • Apprentice
  • January 18, 2026

Hi Michael, 

Thanks for the reply.

I have an asset smart rule for the servers set to show as a smart group. This is working and I see the correct devices in the results.

When I create the “managed account” using a directory query rule the results are empty. If I go and edit the directory query and hit test it will find the users, so the query is correct. If I edit the smart rule to use another directory query it can see those users.

Its one selection criteria, include account from directory query. Should just work?

 

 

 


  • Author
  • Apprentice
  • January 18, 2026

Thinking about this again. The directory query is targeting the std user accounts which they will log in to Password safe with ( or PRA). These are not managed and are not going to work in a managed account rule, I think.

When I try to use the selection criteria “dedicated account” I get the error, The "Dedicated Account" filter also requires a "Map Dedicated Account To" action. The dedicated accounts are already mapped in a rule that maps all Tier1 accounts and a second that maps all tier0, irrespective of team.

So I tried a managed account fields, with “account name - starts with.” This works OK for some scenarios e.g. third parties all have T1companyname prefix on their admin accounts. But I also want to do this for internal teams who don’t have this.

 

Am I going about this the wrong way?


rhagerm
Forum|alt.badge.img
  • Rising Star
  • January 18, 2026

I have done this. 

Most companies provide a security group in AD to add elevated accounts to the local admin groups.

mydomain\Admin-Myserver will be a member of the administrators group on Myserver.

An asset smart rule to define Myserver, a directory query to get all members of Admin-Myserver and a managed accounts smart rule to tie it all together.

Once that is done, the account and host will show up since you linked the managed account to the managed system. The owner of the dedicated managed account will then see the server in their list.

This only works if you have the user in the proper security group and the security group is mapped.

I’ve never tried doing the mapping with Administrators but it should work I think. I just don’t know that a nested group would be readable in BeyondTrust but again, I’ve not tried that yet.