Connection Actions and Configurations21 minutes to read
As explained in the previous document, the Connections tab offers you a comprehensive view of all the resources that are owned by you and/or shared to you as well as the accounts belonging to them. In this document, you will learn about the various actions and all possible configurations that can be performed on connections. Click each of the below links to learn in detail about the different connection actions and configurations in detail:
1. Different Resource Pane ScenariosBased on the type of resource you select from the Resources pane, the view in the Accounts pane will change. Consider the following scenarios: Scenario 1: You have selected a Windows Domain resource named CHNPRODTEST-01 in the Resources pane.In this case, the Accounts pane will display two columns:
![]() ![]() Scenario 2: You have selected a non-Windows Domain resource, such as a Windows or a Linux resource in the Resources pane.In this case, the Accounts pane will display two columns:
![]() ![]() Note: Apart from the SSH protocol, Telnet, Legacy SSH, and other auto logon helpers will be disabled for the accounts applied with SSH command control (filtering). Scenario 3: You have logged into PAM360 using your Active Directory (AD), Microsoft Entra ID, or LDAP credentials.Here, you will see two tabs based on your choice of resources in Scenarios 1 and 2. In addition to that, the Accounts pane will also show the following tab as the third one: Note: The logon options available for Logged in AD/Microsoft Entra ID/LDAP Account will be Windows Remote Desktop for Windows and SSH for Linux systems. Scenario 4:For certain resource types like PostgreSQL, MySQL, and Oracle DB Server, both Domain accounts and AD/Microsoft Entra ID/LDAP accounts will not be shown. For those types, the Accounts pane will display only the Local Accounts tab. Note: In the Accounts pane, you can pin a specific tab for quick access and reference. For example, if you pin the Local Accounts tab, whenever you choose a resource, the local accounts of the resource will be displayed first. This operation is user-specific and does not affect the view for other users accessing the same installation. 2. Launching Secure Remote SessionsPAM360 allows you to establish privileged remote sessions to RDP, SSH, VNC and SQL systems through HTML-5 compatible browsers. PAM360 carries out remote sessions and file transfer operations using secure protocols such as the Remote Desktop Protocol (RDP), SSH File Transfer Protocol (SFTP), Secure Copy Protocol (SCP), File Transfer Protocol (FTP). As the privileged remote sessions are tunneled through the PAM360 server, it creates a secure channel to protect your remote connections from third-party interceptions. The passwords needed to establish the remote connections are securely stored in PAM360. There is also a provision to enforce password access control the resources. These safety measures ensure your data stored in the PAM360 repository and remote sessions carried out from PAM360 always remain secure. In addition to launching secure remote sessions, you can record, playback, and archive the remote sessions launched from PAM360. The archived files support forensic audits and compliance requirements of organizations. To launch a remote session to a resource, follow the below steps:
When a privileged remote session is active, you can view the details from the Notifications panel, the Password Dashboard, and under Audit >> Active Privileged Sessions. All remote connections can be recorded and archived. Click here to learn about session recording in detail. 2.1 Single-click Auto Logon using AD, Microsoft Entra ID, and LDAPPAM360 allows users to launch a direct RDP connection with the target resource using any domain account that is owned by you or shared with you. Users can select the required Domain account or can use the currently logged in AD/Microsoft Entra ID/LDAP account to connect to the desired resource. For a selected set of resource types, PAM360 allows you to log into resources that are shared to you or owned by you using the AD/Microsoft Entra ID/LDAP credentials with which you have currently logged in. When you are logged into PAM360 using your AD/Microsoft Entra ID/LDAP credential, you will find your details displayed in the Connections tab as a separate column named Logged in AD/Microsoft Entra ID/LDAP account. For example, this option will not be available for resource types that do not support Domain accounts login such as PostgreSQL and MySQL. From this space, you can log into the required resource with a single click using the auto logon options that are displayed with a mouse hover.
Click to learn about enabling Active Directory, Microsoft Entra ID or LDAP authentication in PAM360. 3. Website Connections3.1 Launching Secure Website ConnectionsPAM360 allows users to initiate secure website sessions for sensitive web applications and services directly from the application. Users can utilize this feature to access privileged web applications and services seamlessly from the PAM360 interface. To launch a website session:
Notes: (Procedure Applicable from Builds 7400 and Above)3.2 Autofill Support for Websites and ApplicationsPAM360 supports autofill for website sessions launched from the PAM360 web interface via an active browser extension. The credentials must be stored within a resource in PAM360 to autofill them on a website or application. When you attempt to log into a website, click the PAM360 extension icon that appears beside the credentials field on the target site and choose an account. The corresponding username and password will be auto-filled, and you can manually hit enter to log into the website. Notes:
4. Working with Files Present in the Remote MachinesPAM360 allows you to transfer large files between two systems using the SSH File Transfer Protocol (SFTP). To use this feature, the SFTP server must be installed in the target remote systems. Apart from bi-directional file transfer, PAM360 lets you upload and download files between the user's machine and the remote connection they have established, without the need for a remote session. This upload and download mechanism is made possible through the Secure Copy Protocol (SCP). For upload and download mechanisms, there is a file size limit of 6 GB. Note: Starting from build 7500, the maximum file transfer limit via SFTP is set at 2 GB by default. Administrators can adjust this limit within the general settings, increasing it up to 10 GB or reducing it to 50 MB, depending on operational needs. However, for optimal performance, it is recommended to maintain the transfer limit at 2 GB or lower. Additionally, PAM360 allows users to delete files and folders within the remote directory during an SFTP session. Click here to know in detail about how to perform SFTP-based file transfer in PAM360. 5. Requesting Passwords for Accounts with Controlled AccessWhen dealing with accounts that are secured using the password access control workflow, the Connections tab serves as a one-stop place to make all the password request-related options easily accessible. When an account protected by the access control workflow is shared to you, you may gain access to it by requesting for the password and getting it approved by the resource owner/administrator. In case of Domain accounts, the Connections tab helps you send password requests directly from the Domain Accounts view. Click the below links to learn more about the three possible operations you can do: 5.1 Request for the Password
When the password of the account is available for request, you will see the Request option. After you send a request and it is yet to be approved by an admin, the status will change to Waiting.
5.2 Check Out the Password
The green icon indicates that the password request is approved and the password is available for check out.
If a user has checked out the password and is currently using it, other users will not be able to request for access. During this time, you can see the option In Use and a red icon on the thumbnail to indicate that the password is currently in use. 5.3 Check In the PasswordOnce you are done using the password, hover your mouse over the thumbnail of the account and click Check In to check in the password. Now, the password will be available for request again. 6. Accessing RemoteAppsConfigure RemoteApp for Windows and Windows Domain resources to allow access only to specific applications in an account. Click here to learn in detail about how to configure RemoteApp in PAM360. Once you have configured the RemoteApps and associated them with the resources, you will find the option to launch a remote session and open the particular app alone. To launch a RemoteApp:
6.1 Use Case Scenarios
Let's assume that CHNPROD-WIN10 is a Windows resource and CHNWinDom-01 is a Windows Domain resource. The Windows resource is shared to User A with RemoteApp Only access level and the Windows Domain resource is shared with View level access. RemoteApp is configured at a resource-level in CHNPROD-WIN10 for the Notepad application. In this case, if User A tries to log into CHNPROD-WIN10 using the Domain accounts of CHNWinDom-01, PAM360 will allow them to connect to the Notepad application only. Scenario 2: RemoteApp is configured in the Windows Domain resource RemoteApp is configured at a resource-level in CHNWinDom-01 for the Notepad application. If User A tries to log into CHNPROD-WIN10 using the Domain accounts of CHNWinDom-01, PAM360 will allow unrestricted access to the CHNPROD-WIN10 resource. That is because, in this case, User A's target resource is not the Windows Domain resource for which the RemoteApp is configured. The domain accounts belonging to CHNWinDom-01 are only being used to log into the target resource, which is CHNPROD-WIN10 and User A's View level access to CHNPROD-WIN10 will be invoked as it has no RemoteApp configuration to override it. Scenario 3: Windows resource and Windows Domain resource are configured with different RemoteApps. At a resource-level, Notepad is configured as the RemoteApp for CHNPROD-WIN10 and Calculator is configured for CHNWinDom-01. If User A tries to log into CHNPROD-WIN10 using the domain accounts belonging to CHNWinDom-01, they will be able to access only the Notepad application. Similarly, if they try to access CHNWinDom-01 using the domain accounts, they will be able to access the Calculator. To access the Calculator application instead, User A must log into CHNWinDom-01 using one of the domain accounts available. 7. Configuring Connection Settings for AccountsCustomize the accounts added to PAM360 using the advanced configuration settings provided by PAM360. Through this customization, you can optimize SSH, RDP, and VNC connections launched from PAM360 and improve the overall user experience. Please note that all the configuration changes made here will be applied locally to the remote system also. Click here to learn how to configure Connection Settings in detail. 8. Configuring Gateway Settings for Remote SessionsCustomize gateway settings from the Admin tab to set up a different port, customize HTTP header log settings, choose SSL protocols to be used for securing remote connections initiated from the PAM360 interface. Here, you can also edit and control the cipher suites used for SSL communication. Click here to learn how to configure gateway settings in detail. 9. Configuring SSH Command Control (Filtering)SSH command control (filtering) is a feature that allows users to execute a set of predefined commands in remote sessions. In PAM360, this is achieved by configuring command groups at different group levels that include accounts, resources, and resource groups. The entire process minimizes the privilege for highly privileged accounts, thus making them more secure and constrained from internal exploitation. Click here to learn how to configure SSH command control (filtering) in detail. | |