A privileged account in Devolutions PAM is an account used to perform highly privileged actions. It requires strong protection due to its extensive access. These accounts often have control over sensitive systems, data, or user privileges, making them primary targets for cyber threats. In addition to IT personnel, non-IT users in roles like legal or finance may also hold privileged accounts due to their access to sensitive operations or data.
Using Devolutions PAM, privileged accounts are stored securely in PAM-specific vault, with access managed through role-based access control and multifactor authentication (MFA). This ensures privileged operations are logged, monitored, and compliant with best security practices.
Privileged accounts include various types, each serving a specific purpose:
Application accounts manage background software operations without direct user involvement.
Domain administrator accounts control Active Directory domains and user permissions.
Emergency accounts provide temporary elevated access during emergencies or administrator lockout.
Local administrator accounts oversee individual Windows without Active Directory access.
Root and administrator accounts grant elevated access to systems for software installation and configuration.
Service accounts operate background processes with borad privileged (rarely used by humans).
System accounts manage OS-level operations with limited, predefined roles.
Elevated account
Admin account
Superuser account