Previous PDF

swipe to navigate

Introduction

Privileged Access Management (PAM) systems are generally used to replace static, well known passwords with frequently changing, cryptographically stored passwords access to which is brokered subject to strong authentication and robust authorization and audit. In short, IT users lose their cherished administrator passwords and must instead request access to systems and applications from the PAM system, possibly subject to workflow approval and session recording.

IT users rarely enjoy losing this access. Consequently, it makes sense to offer them a user experience that is friendly, convenient and performant, so that they gain from the PAM system at least as much as they lose when their static, shared passwords are gone.

Previous PDF

Comment via LinkedIn