Privileged Access Management (PAM) systems are generally used to replace static, well known passwords with frequently changing, cryptographically stored passwords access to which is brokered subject to strong authentication and robust authorization and audit. In short, IT users lose their cherished administrator passwords and must instead request access to systems and applications from the PAM system, possibly subject to workflow approval and session recording.
IT users rarely enjoy losing this access. Consequently, it makes sense to offer them a user experience that is friendly, convenient and performant, so that they gain from the PAM system at least as much as they lose when their static, shared passwords are gone.
Access to this document requires registration. Please fill in the form below. The full document will be emailed to you automatically.