Check-out and check-in are processes used to secure and manage privileged accounts. Check-out refers to reserving a privileged account for exclusive use, effectively locking it from access by others. Check-in releases this lock, typically followed by a password rotation to ensure account security. This mechanism ensures that credentials are not reused without oversight.
Check-in can occur manually, automatically at the end of the check-out period, or when a session is closed in Remote Desktop Manager, depending on user configuration. This provides flexibility while helping to enforce secure practices. With just-in-time (JIT) access, group or role memberships of privileged accounts are temporarily modified upon check-out and restored on check-in, limiting access to only what is needed during the session.
This functionality supports secure, time-bound access to sensitive resources, helping organizations control and monitor privileged usage, especially when combined with logging and session auditing features in Devolutions PAM and Devolutions Server.
Account retrieval (CyberArk)
Privileged account reservation