Permissions allow AD users to open sessions.
| To work with permissions, you should have the PERMISSIONS MANAGEMENT privileges (Permission.Create, Permission.Read, Permission.Revoke, Permission.Suspend). |
Click Create in the Permissions section.
If you need to grant permission to a User group, then go to the User Groups section, select the group and click Add permission |
Select OU the resource is located in. This item will not be displayed when a permission is created by the Local administrator of a particular OU.
Any AD user that is a member of the User Directory can be used for creating a permission.
Any resource added to Indeed Identity PAM can be used for permission.
Select one or more resources.
If more than one resource is selected, domain accounts or a personal user account will be used to access them. |
To access the resource, a local, domain or personal user account can be used.
For permission, you can set the validity period — start date and time, end date and time.
Choose a date and time.
If the Begin and End options are not selected, then the permission will be considered permanent. |
You can also set Access schedule. It is not possible to use the permission outside the schedule.
If options From and To are not selected, then the permission will be valid around the clock. |
When the permission expires or when the time set in the access schedule expires, the session will be terminated. |
Indeed Identity PAM allows the user to view the password of privileged accounts that are used in his permissions.
Indeed Identity PAM allows the user to change the passwords of privileged accounts that are used in his permissions.
Indeed Identity PAM allows you to set restrictions on connections to resources. You can specify the network from which a given connection can be used.
If no Network Locations have been added, the only option in the drop-down menu will be No Restrictions. This means that this permission can be used from any device on the network.
Indeed Identity PAM allows you to set custom permission settings for pamsu.
There are three options:
Managed by policies — access to pamsu will be provided in accordance with the policy selected for the resource for which permission is granted.
Allowed — regardless of policy settings, this permission will provide the access to pamsu.
Denied — regardless of the policy settings in this permission, access to pamsu will be disabled.