When using PAM360, you will encounter several terminologies that have unique and specific meanings. It is important to familiarize yourself with these terms before moving forward. The following are some basic terminologies to take note of,
| Term | Description |
|---|---|
Resource | Refers to the server, application, or device whose user accounts and passwords are managed by PAM360 |
Resource Group | A collection of resources categorized for easier management. For example, all Windows XP servers can be grouped together within a larger set of Windows servers. |
Account | Represents the account of a resource, including account name and password, managed under the resource PAM360. |
User | Denotes the accounts created within PAM360 for individuals who manage or use the PAM360 application. |
User Group | A collection of PAM360 users grouped for streamlined management and permission assignment. |
Agent | A software agent installed on a target system that enables PAM360 to securely connect to and manage target remote resources residing in isolated or non-routable network regions. |
Application Gateway | A PAM360 gateway service designed to perform essential resource and password management operations, including resource discovery, account discovery, password verification, and password reset in bulk, for privileged resources that are not directly connected to the network where the PAM360 server is deployed. |
Password Policy | Policies that define the rules and standards for password creation, management, and enforcement within PAM360. |
Audit | PAM360 maintains comprehensive logs of every action performed by users within the application, including the required information such as username, action performed, timestamps and IP addresses. |
Reports | PAM360 generates detailed reports to present the entire password management process within your organization. |
Request | A process where the user submits a request to view a specific password. |
Waiting for Approval | The status indicating that a user's password request is pending approval from the administrator(s). |
Check Out | Indicates that the administrator has approved the request, allowing the user to view the password. |
Approve/Reject | Actions that administrators can take on a password request, either granting or denying access. |
Yet to Use | Indicates that the user has not yet viewed the password released by the administrator. |
In Use | The status showing that a password is currently being used exclusively by a user. |
Check In | The process of revoking or relinquishing access to a password after use. |
| Abbreviation | Expansion |
|---|---|
AD | Active Directory |
LDAP | Lightweight Directory Access Protocol |
RADIUS | Remote Authentication Dial-In User Service |
SSO | Single Sign-On |
SAML | Security Assertion Markup Language |
TFA | Two-Factor Authentication |
MFA | Multi-Factor Authentication |
ADFS | Active Directory Federation Services |
RSA | Rivest-Shamir-Adleman |
SSH | Secure Shell |
SSL | Secure Socket Layer |
CLI | Computing Command-line Interface |
CI/CD | Continuous integration and Continuous Delivery |
DevOps | Development and Operations |
DevSecOps | Development, Security and Operations |
IIS | Internet Information Server |
FQDN | Fully Qualified Domain Name |
HA | High Availability |
CA | Certificate Authority |
RDP | Remote Desktop Protocol |
HSM | Hardware Security Module |
PCIe | Peripheral Component Interconnect Express |
PKI | Public Key Infrastructure |