Basic Requirements
Before installing a product or application in your environment, first, you have to verify if certain requirements are satisfied. This document explains in detail the prerequisites, system requirements, components, ports, other and conditions that are essential for PAM360 to function in your environment. You will also know about the supported operating systems and the recommended hardware requirements for the different types of deployments of the PAM360 installation.
Make sure that your system environment meets all the below requirements, and then begin the installation.
- Prerequisites
- System Requirements
- Components of PAM360
- Ports used by PAM360
- Licensing and User Roles
5.1 License Types
5.2 User Roles
1. Prerequisites
Apart from the standard system requirements (both hardware and software), the following elements are essential for the proper functioning of the PAM360 server:
Note: The following are required, if you're planning to make use of PAM360's account discovery and password reset provisions.
- An external mail server (SMTP server) for the functioning of PAM360 server and to send various notifications to users.
- A service account that has either domain admin rights or local admin rights in the PAM360 server and in the target systems that you would like to manage.
- Microsoft .NET framework.
- Visual C++ Redistributable for Visual Studio 2015 and above (for PAM360's Account Discovery and Password Reset features).
2. System Requirements
The below table provides an overview of the hardware and software configurations required by PAM360:
For the system requirements based on your organization size, refer to our Sizing Guidelines document.
3. Components of PAM360
PAM360 comprises of the following components:
- The PAM360 server
- The PAM360 Agent:
- for establishing connections with the remote resources. - The database PostgreSQL 14.17:
- bundled with PAM360 that runs as a separate process.
- accepts connections only from the host where it is running.
- runs in an invisible mode.
4. Ports used by PAM360
The below table lists the set of all ports used by PAM360 for remote access:
Port Name | Port Number | Direction |
---|---|---|
PostgreSQL port |
3456 |
Outbound |
Web client port |
8282 |
Inbound |
SSH port |
22 |
Outbound |
Telnet port |
23 |
Outbound |
LDAP without SSL port |
389 |
Outbound |
LDAP with SSL port |
636 |
Outbound |
SMTP port |
25 |
Outbound |
MS SQL port |
1433 |
Outbound |
Oracle port |
1521 |
Outbound |
Sybase ASE port |
5000 |
Outbound |
Password Verification port |
Outbound |
|
Auto Logon Spark View Gateway port |
Inbound |
|
RDP |
3389 |
Outbound |
SSH API |
6622 |
Inbound |
REST API |
8282 |
Inbound |
Private CA-OCSP Respoder Server port |
8080 |
Inbound |
5. Licensing and User Roles
5.1 License Types
There are three license types:
- Evaluation download / Trial Version: You can straightaway download and install this trial version. It is fully functional, capable of supporting a maximum of 5 administrators and you can evaluate all the features for 30 days.
- Free Edition: Licensed software that allows you to have 1 administrator and manage up to 10 resources. Valid forever.
- Registered Version: You get the Enterprise edition, and Licensing is based on the Number of Administrators. This is useful if you require more enterprise-class features such as auto discovery of privileged accounts, integration with ticketing systems and SIEM solutions, jump server configuration, application-to-application password management, out-of-the-box compliance reports, SQL server / cluster as backend database, etc.
5.2 User Roles
PAM360 comes with six user roles:
- Privileged Administrator
- Administrator
- Password Administrator
- Password Auditor
- Password User
- Connection User
The term administrator denotes Administrators, Password Administrators and Privileged Administrators. So, licensing restricts the number of administrators as a whole, which includes Administrators, Password Administrators and Privileged Administrators. There is no restriction on the number of Password Users and Password Auditors. To get more details on the user roles, click here.