Skip to main content

Non-target integrations - Hitachi ID Privileged Access Manager

Hitachi ID Privileged Access Manager has an open architecture and can be integrated with the full spectrum of existing IT infrastructure:

  • Broad Platform Support

    Privileged Access Manager has built-in support for many types of systems, directories and applications. It can also be readily integrated with custom and vertical market applications, with little or no custom programming.

    Built-in support for every relevant platform expedites deployment, as roll-out is not held up waiting for product enhancements or custom software development.

  • E-Mail Integration

    Over 300 events can trigger e-mails to users, administrators, the help desk and more. This includes requests to register, requests for change authorization and "thank you" notes. The same events can also trigger automatic creation or tickets in a problem management system.

    E-mail integration is primarily used to invite users to act and notify users of events that pertain to their profile or their authority.

  • Help desk / incident management integration

    The same events that can cause Privileged Access Manager to send an e-mail to a user or a security officer can also trigger automatic creation, update or closure of a ticket in any of more than 20 help desk applications.

  • Authentication tokens, smart cards, PKI

    Privileged Access Manager can authenticate users (requester, authorizers, security administrators) using hardware tokens, smart cards or software PKI certificates. Privileged Access Manager can also provision user objects and provision physical devices on these platforms.

Read More:

  • Network Architecture:
    How user PCs, servers, network devices, multiple, replicated Privileged Access Manager nodes and other elements interact on the network.
  • Replicated Credential Vault:
    Replicated storage of passwords to privileged accounts in multiple, physically distant, encrypted vaults.
  • Included Connectors:
    Systems on which Privileged Access Manager can discover accounts, randomize passwords and launch login sessions.
  • Infrastructure Auto-discovery:
    Automatically finding and classifying workstations, servers, applications and network devices as well as privileged accounts and services on each one.
  • Non-target integrations:
    Integrations between Privileged Access Manager and IT infrastructure where it may not be managing passwords or privileged access -- such as e-mail systems, incident management applications and more.
  • Workflow Requests and Approvals:
    Enabling users to request and approve one-off access to sensitive accounts.
  • Concurrent Access to Accounts:
    Limiting how many administrators can simultaneously manage a system and keeping administrators informed of one-anothers activity.
  • Single Sign-on Mechanisms:
    Options for connecting users to privileged accounts, through credential injection, trust manipulation and temporary group membership, all without displaying passwords from the vault.
  • Server requirements:
    Sizing, configuration and number of servers on which to deploy Privileged Access Manager.
  • Scalability:
    Scaling to manage passwords across millions of devices.
  • Emergency access:
    Access to Privileged Accounts During Emergencies.
  • Language Support:
    A list of languages supported in the web portal.
page top page top