Check-out approvals

Check-out approvals in Devolutions PAM enforce an additional security step by requiring designated personnel to authorize the use of privileged accounts. This process helps organizations maintain oversight and control over sensitive credentials, ensuring that access is granted only when justified and approved.

Typically, approvals are performed by a manager, team lead, or dedicated security team member. When a user initiates a check-out request, the request must be reviewed and explicitly approved before credentials are made available. This mechanism helps prevent unauthorized or unsupervised access and supports compliance with internal security policies.

Check-out approvals are especially useful in high-security environments or for critical systems where accountability and audit trails are essential. By adding this layer of control, Devolutions PAM helps protect privileged assets while streamlining administrative oversight.

Aliases

  • Dual control (CyberArk)

  • Privileged access approval

See also

Devolutions Forum logo Give us Feedback