01. Securing Embedded Passwords
02. Baseline scenario
03. Plaintext passwords
04. Basic approach
05. Catch-22?
06. Analysis
07. Hitachi ID Privileged Access Manager API authentication
08. Authentication
09. Real world complexity
10. Authentication
11. API wrapper
12. HiPAM: PAM API CMD