Skip to main content

Use of encryption in Hitachi ID Privileged Access Manager

Hitachi ID Privileged Access Manager uses encryption as follows:

  • Administrator credentials -- both those of Privileged Access Manager itself, and those which it periodically randomizes, are encrypted using AES.
  • Communication between the main Privileged Access Manager server and Privileged Access Manager proxy servers is via TCP/IP, protected using AES, encrypted using a shared key.
  • Communication between the main Privileged Access Manager server and local agents on Unix and OS390/zOS target systems is via TCP/IP, protected using AES, encrypted using a shared key.
  • Communication between multiple Privileged Access Manager servers, to replicate data and support high availability and load balancing, is protected using AES, encrypted using a shared key.
  • Communication between IT staff, using web browsers and the Privileged Access Manager web user interface is using HTTP over SSL (HTTPS).
page top page top