PAM Overview

Privileged Access Management — secure, audit every privileged session


Privileged Access Management

GAccess PAM gives your team complete control over privileged accounts across servers, databases, cloud consoles, and network devices — without the complexity of legacy PAM solutions.

Key capabilities

  • Credential vault — centrally store, rotate, and broker passwords and SSH keys so no human ever needs to know a credential directly.
  • Session recording — every privileged session is recorded and indexed, giving you a full audit trail for compliance and forensic investigation.
  • Just-In-Time access — grant temporary elevated permissions on demand. Access expires automatically, eliminating standing privileges.
  • Password verification — confirm that stored credentials still match what is configured on the target system without changing anything.
  • Unified audit log — every access request, approval, and action is captured in a tamper-evident log.

Documentation sections

Admin Guide

Everything an administrator needs to deploy, configure, and operate the PAM module.

Topic Description
Getting Started Install prerequisites and run your first privileged session
Privileged Access Managing credentials and sessions
Just In Time Access Configuring temporary, on-demand permissions
Verify Password Checking credential validity without rotation
API Reference REST endpoints for automation and integrations

User Guide

End-user workflows for requesting access and launching sessions.

Topic Description
Connecting to Remote Targets Overview of connection methods — browser, SSH client, RDP client
Web Connection Using the browser-based session, clipboard, file transfer, and session controls