Securden Unified PAM Features

Automated Approval Workflow with Just-in-time Access

Enter a proper email address.

Restrict Access Using Just-in-time Security Practice.

To perform certain tasks as part of their business activity, some users may need administrative access to selected IT resources. Granting them full access all the time could potentially lead to various security issues. Therefore the Just in time access (JIT) comes into play. JIT allows administrators to grant access to required IT assets the users need but only for a limited time frame. This need based approach eliminates the standing privileges that bad actors could exploit and at the same time fulfilling the user's business needs. Just in time access follow a well-defined request release controls with automatic password resets.

Automated Approval Workflow and Access Management

Adhering to the four-eyes principle, no user can access critical systems without prior approval from appropriate business authority. When the users need access to a sensitive IT asset, they need to raise a request clearly stating their business need. The business approver will then review the request and grant time-limited permission for access if deemed necessary. The users will then be able to access the IT assets only during the given time. Once the time limit ends, the access will be revoked and the password will be reset automatically.

Flexibility to Grant Permanent and Temporary Access

Securden Unified PAM allows the administrators to grant permanent access or just-in-time access depending on specific requirements.

  • For certain categories of users or specific IT assets/applications, permanent privileged access can be granted. This is helpful for employees who continuously work with admin interfaces.
  • For other categories of users, You can selectively enforce request-release approval workflow which ensures temporary, just-in-time access.

One Time Password (OTP) or Disposable Password

Securden Unified PAM has a feature that allows users to access IT assets using One-time passwords or temporary passwords. When the access ends, the password will automatically change.

On-Demand and Advance Access Requests

Securden Unified PAM allows users to request access whenever required. This can be categorized as an On-Demand access request. Users can also submit requests in advance for planned activities. Both requests need a reason to justify their access so the administrators can verify and grant access.

Self-Service Requests

You can configure automated approvals for requests from specific categories of users such as senior developers or senior administrators. They need not have to wait for approvals. This feature comes in handy to handle scenarios like an approver going on vacation.

Fully Controlled Access and Session Recordings

Securden Unified PAM provides session management. This allows administrators to monitor the sessions in real-time and take control by terminating the sessions over any suspicious activity. Also, the recording feature allows the entire session to be recorded which can be played back anytime for forensics.

Trace Activities with Audit Trails

Every single privileged activity performed is recorded as an audit trail. A clean and complete audit trail not only improves privileged access governance but also helps organizations to comply with regulatory requirements. The audit logs include details such as who requested access, their business needs, who approved it and what they did with their access. You can also filter for a specific activity using text-based or command-based search.

Frequently Asked Questions

plus icon minus icon
What is Just-in-Time (JIT) PAM?

JIT access gives users time-limited access to IT systems, severs, applications, and network devices. This can be granted after approval from an admin or IT manager. Once time duration ends, the access is revoked.

How Just-in-time works for an end-user

  • User requests access to a system/secret/app/admin account
  • Request goes through approval within PAM system
  • Admin or manager approves request and sets access duration
  • User gets onboarded/granted access to the IT resource
  • Time duration ends, user access is terminated
plus icon minus icon
How can I configure JIT access without operational friction?

Implementing JIT access sounds great as a security best practice, but IT may face challenges in real-world scenarios. The key is setting approval workflows and session windows that match how your team actually operates, not how you wish they operated.

Here’s a few tips to streamline JIT access to be operational:

  • Configure approval manager for access to critical assets/admin accounts and introduce MFA-layer only where required.
  • Keep text justification as the minimum requirement for other light systems/applications.
  • Grant sufficient time of access for your users to complete their tasks, limiting the access duration too much may cause them to raise multiple requests and complicates things.
  • Configure a break-glass account for emergency access scenarios.
  • Consider using ephemeral credentials for access to sensitive assets.
Securden Help Assistant
What's next?
Request a Demo Get a Price Quote

Thanks for sharing your details.
We will be in touch with you shortly

Thanks for sharing your details.
We will be in touch with you shortly