Skip to content

Access

Access refers to the authorization framework that governs how users interact with remote endpoints through privileged remote access sessions. Within the PAM module, Access defines the permissions, controls, and methods by which an authorized user may initiate, monitor, or terminate remote sessions to managed assets.

Each access event is governed by a predefined Access Profile, which outlines the permitted protocols, session behavior, session recording, approval requirements, and available in-session tools. These profiles are centrally managed and applied to users or groups, ensuring consistent enforcement of session-level policies across the environment.

Access can be configured at the asset, container, or site level, allowing policies to inherit through a hierarchical model. This inheritance ensures scalable access management while enabling fine-grained overrides where exceptions are necessary.

In addition to defining interactive session behavior, Remote Access Sessions also supports just-in-time elevation, temporary access windows, and session restrictions based on roles or time, all critical elements in enforcing least privilege principles across distributed environments.