The Workflow in PAM3604 minutes to read
If you are an administrator engaged in the job of setting up PAM360 in your environment and managing passwords, following is the ideal work flow: 1. Setting up Mail ServerPrior to adding users, the important step to be done is configuring your mail server. Users will be notified of their PAM360 access details through email only, so ensure the Mail Server is setup properly. 2. Adding Users
3. Adding ResourcesThe first step to actual Password Management in PAM360 starts with adding your "resource" to the PAM360 database. Here, resource denotes the server/application/device whose user accounts and passwords are to be managed by PAM360.
3.1 Access Control WorkflowAfter adding the resources, administrators can put in place access control work flow for extra level of security. After successful authentication into PAM360, users get access to the passwords that are owned by them or shared to them. In some cases, administrators wish to give temporary access to passwords for certain users for a specified period of time. In other instances, there would be requirements to give users exclusive privilege to passwords. That means, only one user should be allowed to use a particular password at any point of time. When more than one user is required to work on the same resource, problems of coordination arise. Access control on concurrent usage would help resolve such issues.
4. Setting up Disaster RecoveryIf you are a password user follow the below steps to set up disaster recovery:
If you are a Password user engaged in the job of viewing the passwords allotted to you, there is no need to carry out any configuration. You may directly view the passwords of resources/accounts and edit passwords if you have that permission. | |