Skip to main content

Hitachi ID Privileged Access Manager Concept Animations

Connecting a pre-authorized administrator to a privileged account


Play movie

Content:

  • An administrator signs into HiPAM.
  • The administrator searches for the system where he needs to work.
  • The administrator launches a login session, connecting to a privileged account on the selected system.
  • HiPAM inserts current credentials, providing secure single sign-on for the administrator.

Key concepts:

  • IT staff must sign into systems using HiPAM as an intermediary.
  • HiPAM applies policy to decide whether connections are allowed.
  • HiPAM inserts credentials, providing single sign-on convenience while preventing disclosure of current password values.
  • HiPAM logs all sessions.

Randomizing privileged passwords on laptops and other mobile devices


Play movie

Content:

  • On mobile devices, the endpoint initiates the password change process.

Key concepts:

  • Password changes initiated on the endpoint can be performed even when the device is off-site, behind a firewall, etc.
  • Randomized timing improves reliability and reduces peak transaction volume.
  • A minimal software footprint is required on the endpoint device.

Randomizing privileged passwords on fixed IT assets


Play movie

Content:

  • On servers and other fixed devices or applications, no local software is required.

Key concepts:

  • Password changes are initiated on an HiPAM server and are scheduled to happen, as often as hourly.
  • Randomized password values are stored in a secure, replicated vault at a minimum of two physical locations.
  • No software is installed on systems.

Read More:

  • Features:
    Privileged Access Manager is a system for securing access to privileged accounts. It works by regularly randomizing privileged passwords on workstations, servers, network devices and applications. Random passwords are encrypted and stored on at least two replicated servers.
  • Business Case:
    Privileged Access Manager helps organizations secure access to privileged accounts by randomizing their passwords and forcing users to sign into Privileged Access Manager when they need privileged access. It automatically deactivates access for departed IT users and creates a forensic audit of login session to sensitive accounts.
  • Screen Shots:
    Snapshots of the Privileged Access Manager web interface.
  • Screen Recordings:
    Recordings of user interaction with Privileged Access Manager.
  • Concept Animations:
    Animated demonstrations illustrating user interaction with Privileged Access Manager and data flow between components on the network.
  • Slide Decks:
    Slide presentations that discuss privileged access management in general and Privileged Access Manager in particular.
page top page top