Skip to main content

Use of encryption in Hitachi ID Privileged Access Manager

Hitachi ID Privileged Access Manager uses encryption as follows:

  • Administrator credentials -- both those of Privileged Access Manager itself, and those which it periodically randomizes, are encrypted using AES.
  • Communication between the main Privileged Access Manager server and Privileged Access Manager proxy servers is via TCP/IP, protected using AES, encrypted using a shared key.
  • Communication between the main Privileged Access Manager server and local agents on Unix and OS390/zOS target systems is via TCP/IP, protected using AES, encrypted using a shared key.
  • Communication between multiple Privileged Access Manager servers, to replicate data and support high availability and load balancing, is protected using AES, encrypted using a shared key.
  • Communication between IT staff, using web browsers and the Privileged Access Manager web user interface is using HTTP over SSL (HTTPS).

Read More:

  • Multi-layered security architecture:
    Security is implemented as multiple layers, each of which acts to protect Privileged Access Manager data and embedded privileges.
  • Hardened server platform:
    Privileged Access Manager runs on a locked-down, hardened operating system.
  • Use of encryption:
    Use of Encryption to protect sensitive user data in storage and transit.
  • Web form input protection:
    Inputs to web forms in Privileged Access Manager are automatically protected against bogus data, buffer overruns and more.
page top page top