Skip to main content

Hitachi ID Privileged Access Manager Secure Embedded Passwords

Applications often need to connect to other applications or services on the network to function. For example, a web application may have to connect to one or more databases to retrieve or update data, to web services to initiate transactions, to a directory to create or update user objects, etc.

When an application connects to a network service, it uses credentials -- normally an ID and password -- to do so. This raises some questions about password management:

  1. Where is the password used by an application to sign into a network service stored?
  2. Does the password ever change?
  3. How is the stored password protected against compromise?

A privileged access management system must be able to address these questions.

Please register

Access to this document requires registration. Please fill in the form below. The full document will be emailed to you automatically.

required Your company/organization name:
required Your name:
Your title:
Your work telephone number:
required Your work e-mail address:
required Total number of staff in your company:
Please check the information you entered above before continuing.
Click to continue:
page top page top