PAM360 enables users to initiate remote sessions using the SSH protocol to perform specific operations through command execution. With the SSH Command Control Filtering feature, administrators can define and enforce a set of pre-approved command lists by associating command groups with relevant accounts, resources, or resource groups. This feature ensures that users with access to SSH-enabled resources are restricted to executing only those commands explicitly permitted within the assigned command groups. This granular level of access control significantly enhances security by preventing unauthorized or unintended command executions during SSH sessions.
All actions involving commands and command groups, such as creation, modification, association, and execution, are fully audited and logged under the resource audit section, complete with operation types and user-provided reasons for traceability and compliance.
By the end of this document you will have learned the following topics relevant to SSH Command Control Filtering in PAM360:
By default, users with roles such as Administrator, Privileged Administrator, Password Administrator, and Cloud Administrator are granted permissions to manage or use SSH Command Control in PAM360. Additionally, administrators can configure custom roles with the following privileges to manage and use SSH command control effectively:
The Manage Commands section in PAM360 allows users to create, import, edit, delete, and export commands used in SSH command control. This helps enforce fine-grained access control by limiting users to a predefined set of commands during remote SSH sessions.
Caution
Before managing commands, users must have the Manage Command Lists and Associate Command Groups privileges. Additionally, ensure the following prerequisites are met to avoid execution errors in the SSH launch console:
To begin, navigate to Admin >> Privilege Elevation >> Manage Commands. From the Commands tab in the Manage Commands window, you can perform the following operations:
You can add commands to PAM360 in two ways. Follow the below steps to add the commands manually


To import the commands via CSV, follow these steps:
Additional Details
Additional Detail
To understand the correct CSV format, manually add a few sample commands and export them. Use the exported CSV as a template.

Click on the desired command from the command list. From the Command Details window that opens, you will get the command information, and you can also perform operations that include Edit and Delete.
Caution
Deleting a command will permanently remove it from the command list and dissociate it from any associated command groups.
You can export all commands listed in the Commands tab as a CSV file:
Once you have created and configured the necessary commands, you can begin managing the command groups through the Command Groups tab in the Manage Commands window. This section outlines the key operations you can perform such as Add, Edit, Associate, Dissociate, and Delete, with step-by-step instructions for each.
Additional Detail
Before confirming the addition, you can associate commands with this new command group by selecting them from the list displayed below. Once added, click on the desired command group in the Command Groups tab to open the Command Group Details window. Here, you can view the group’s information, its associated commands, and perform further actions such as Edit or Delete.

To delete an individual command group:
To delete multiple command groups at once:
Caution
Deleting a command group is a permanent action. However, the individual commands associated with it will remain intact and will not be deleted.

Additional Detail
You can also associate commands while creating a new command group by selecting them during the initial setup.
Once the desired command groups are created, you can begin configuring SSH Command Control at the account, resource, and resource group levels. The following sub-sections outline the step-by-step process to configure SSH Command Control at each of these levels.
Best Practice
We strongly recommend using command control (filtering) in conjunction with access control. This ensures that users do not gain access to shared account passwords. If passwords are available in plain text, users could bypass command restrictions by connecting through third-party SSH clients.
To configure SSH Command Control for an account, follow these steps:

Additional Detail
To dissociate command groups, deselect the desired command groups or click Dissociate to remove command control from the account.
The same can be configured in bulk for accounts by selecting the desired accounts, clicking the More Actions drop-down, choosing Configure SSH Command Control, selecting the desired command groups in the pop-up window, and clicking Associate.
To configure SSH Command Control for a resource, follow these steps:


Additional Detail
To dissociate command groups, deselect the desired command groups or click Dissociate to remove command control from the resource.
The same can be configured in bulk for resources by selecting the desired resources, clicking the Resource Actions drop-down, choosing Configure SSH Command Control, selecting the desired command groups in the pop-up window, and clicking Associate.
To configure SSH Command Control for a resource group, follow these steps:
Additional Detail
To dissociate command groups, deselect the desired command groups or click Dissociate to remove command control from the resource groups.
The same can be configured in bulk for resources by selecting the desired resources, clicking the Bulk Configuration drop-down, choosing Configure >> SSH Command Control, selecting the desired command groups in the pop-up window, and clicking Associate.
Users assigned the Use Command Control role can only execute the commands defined in the associated command groups at the configured levels. To execute allowed commands:


Caution
The following cases describe how command control configurations are prioritized when applied at multiple levels:
Case 1: Account + Resource + Resource Group - If an SSH session is governed by configurations at all three levels (account, resource, and resource group), account-level configurations take precedence.
Precedence Order: Account << Resource << Resource Group
Case 2: Resource + Resource Group - If configurations exist at both the resource and resource group levels, the resource-level configuration takes precedence.
Case 3: Multiple Resource Groups - If configurations are applied via multiple resource groups, the authorized SSH session will use the combined set of commands from all associated command groups.