/
Pam Module Implementation

SecHard

Pam Module Implementation

  1. Step: Creation of users;

Determining the people who will access the Pam Module.

Deciding the User types to be opened (Local or AD Account)

Determining whether the Users to be opened will use a System account or AD account when connecting to resources.

Creating users on Sechard.

  1. Step

Creation of Roles

  •   Determining the role matrices for the areas that users will access.

  •   Granting sufficient permissions for the parts that will provide access. (Create/Read/Write/Delete)

  1. Step

Assigning resorces to roles

Associete the resources that people who will be assigned to the Role will have access to,

  1. Step

Assigning resorces to roles

Associete the resources that people who will be assigned to the Role will have access to,

  1. Step

Implementation of White List / Black List structure

If there is a command restriction to be applied to users, creating White list / Black list groups and assigning them to roles.

 

Related content

PAM (SecHard) Yazılımı Kullanım Kılavuzu
PAM (SecHard) Yazılımı Kullanım Kılavuzu
Read with this
PAM (SecHard) Software User's Guide
PAM (SecHard) Software User's Guide
More like this
1.2.2. Privileged Access Management (PAM)
1.2.2. Privileged Access Management (PAM)
More like this
7 PAM
More like this
1.2.2 Privileged Access Management (PAM)
1.2.2 Privileged Access Management (PAM)
More like this
7. PAM
More like this

SecHard