Check-out/Check-in

Check-out and check-in are processes used to secure and manage privileged accounts. Check-out refers to reserving a privileged account for exclusive use, effectively locking it from access by others. Check-in releases this lock, typically followed by a password rotation to ensure account security. This mechanism ensures that credentials are not reused without oversight.

Check-in can occur manually, automatically at the end of the check-out period, or when a session is closed in Remote Desktop Manager, depending on user configuration. This provides flexibility while helping to enforce secure practices. With just-in-time (JIT) access, group or role memberships of privileged accounts are temporarily modified upon check-out and restored on check-in, limiting access to only what is needed during the session.

This functionality supports secure, time-bound access to sensitive resources, helping organizations control and monitor privileged usage, especially when combined with logging and session auditing features in Devolutions PAM and Devolutions Server.

Aliases

  • Account retrieval (CyberArk)

  • Privileged account reservation

See also

Devolutions Forum logo Give us Feedback