Unified PAM - Introduction¶
This help guide is designed to assist administrators in configuring Securden Unified PAM with step-by-step instructions. This guide covers the ideal flow in which Unified PAM is configured.
Troubleshooting tips and other important product information are included where necessary.
Unified PAM is a comprehensive privileged access management solution that protects your sensitive assets and data from threats. It acts as a single solution that encompasses
- Passwords, Secrets & Credential Management
- Privileged Account and Session Management (PASM)
- Privilege Elevation and Delegation Management (PEDM)
- Secure Remote Access and Assistance (RPAM)
- Cloud Infrastructure & Entitlements Management (CIEM)
Unified PAM Capabilities:¶
An overview of the product capabilities and functions include:
-
Discovery of privileged accounts spread across servers, databases, and network devices.
-
Management and secure sharing of passwords, SSH keys, TOTPs, domain, admin, and cloud accounts.
-
Elevation of privileges for just-in-time (JIT) access to assets, applications and credentials
-
Agentless remote access to IT assets like servers, databases, apps, and systems.
-
Launching of secure remote SQL/SSH/RDP/PuTTy connections to assets in distributed networks
-
Monitoring and termination of privileged sessions (in real-time) with video recordings of all activity
-
Auditing of all privileged actions, activity and access with customizable report generation to demonstrate compliance.
Help Documentation Summary¶
This help guide is designed to assist administrators in configuring Securden Unified PAM with step-by-step instructions. This guide covers the ideal flow in which Unified PAM is configured.
As an IT admin, you will be able to deploy and successfully implement PAM in your organization by carefully following the steps outlined in the guide.
Note
Troubleshooting tips and other important product information are included where necessary. At any stage if you find it difficult to configure the product – you can reach out to support@securden.com for quick assistance.
An overview of the product capabilities include:¶
Discovery of privileged accounts spread across servers, databases, and network devices.
- Management and secure sharing of passwords, SSH keys, TOTPs, domain and cloud accounts.
- Elevation of privileges for just-in-time (JIT) access to assets, applications and credentials
- Launching of secure remote SQL/SSH/RDP connections to assets in distributed networks
- Monitoring and termination of privileged sessions (in real-time) with video recordings of all activity
- Auditing of all privileged actions, activity and access with customizable report generation to demonstrate compliance.