Privileged access request management and approval workflow
Fálaina’s PAM leverages access request management integrated with workflow technology from ILM. Privileged users can request access to any privileged account on any critical asset based on the policies and rules created.
Rules may be configured to:
- Limit the requestor to request only accounts within the group or set of servers the requestor is allowed to see and request
- Limit day and time of access, especially after office hours access or location of access.
- Configure if concurrent session is allowed
- Require 2FA or second authentications
The access to each of these privilege or shared accounts are based on the policies and integrated as part of the on-line access request form and approvals via workflow.
The approver is allowed to approve, reject or override the request items such as limiting time or locations or even a set of accounts requested. Other features include pre-approved access by systems owner themselves without approval process, but the session will be monitored and recorded.