PAM360 is a unified privileged access management solution designed to manage and monitor privileged accounts in IT environments. Now that you have a grasp of the fundamental modules of PAM360, it is time to explore its architecture, functionality, and process flow. This document provides a detailed overview of the PAM360 architecture.
The diagram illustrates the various components, their interactions, and the flow of data within the system.
PAM360 comprises multiple components that work in hand with each other to protect your privileged accounts and strengthen security in your environment.
PAM360 can be installed on Windows and Unix-based machines as a web application configurable according to user requirements. It is accessible via web clients and mobile applications, providing a web-based or mobile interface for users to interact with PAM360. It also supports remote desktop and SSH sessions via the web-based interface. Additionally, PAM360 communicates with applications through REST APIs and SSH APIs.
PAM360 supports several databases, including PostgreSQL, MS SQL, Amazon RDS MS SQL, Amazon RDS PgSQL, and MS Azure SQL as the backend database. By default, it comes bundled with PostgreSQL but allows migration between databases for flexibility and convenience. This database is integral to the storage and retrieval of data within the PAM360 ecosystem.
Users in PAM360 are identified by their user ID or username and gain access to the application through a network service, either on a computer or mobile device. Users can be imported using Active Directory, Microsoft Entra ID, and LDAP or added manually via API or file imports. Once added, users can be assigned appropriate access roles and password policies. Custom user roles with specific permissions can also be created to meet organizational needs.
Resources in PAM360 encompass any server, application, network device, or appliance with authentication credentials that need securing. PAM360 supports various resource types including:
The primary server/central server is responsible for executing the core operations of PAM360. The secondary or configured servers act as backup nodes that ensure service continuity and high availability in case of a failure. These secondary servers stay synchronized with the primary server, depending on the chosen high-availability architecture.
PAM360 supports the following high-availability architectures:
| Port Name | Port Number | Purpose | Direction |
|---|---|---|---|
Web Client | 8282 | For PAM360 web application | Inbound |
SMTP | 25 | For sending emails between mail servers | Outbound |
SSH | Telnet | 22 | 23 | For Unix and network device management | Outbound |
RDP | 3389 | For remote desktop connections to Windows devices | Outbound |
WMI | 135, 139, 445 | For managing Windows services and devices | Outbound |
LDAP, LDAPS | 389, 636 | For standard and secure directory communication | Outbound |
REST API | 8282 | For application interactions through RESTful services | Inbound |
SSH API | 6622 | For secure shell API interactions | Inbound |
Session Gateway | 8283 | For remote desktop and SSH sessions through the web client or mobile application | Inbound |
PostgreSQL | MS SQL | 3456 | 1433 | For database operations between servers | Outbound |
Application Gateway | 8288, 8289 | For communication between the PAM360 Application Gateway and PAM360 | Outbound |
Private CA-OCSP Respoder Server port | 8080 | OCSP responder endpoint for certificate status checking | Inbound |
Oracle | 1521 | For Oracle Database Servers communication | Outbound |
Sybase ASE | 5000 | For Sybase listener communication | Outbound |