PAM
PAM Overview
Privileged Access Management — secure, audit every privileged session
Privileged Access Management
GAccess PAM gives your team complete control over privileged accounts across servers, databases, cloud consoles, and network devices — without the complexity of legacy PAM solutions.
Key capabilities
- Credential vault — centrally store, rotate, and broker passwords and SSH keys so no human ever needs to know a credential directly.
- Session recording — every privileged session is recorded and indexed, giving you a full audit trail for compliance and forensic investigation.
- Just-In-Time access — grant temporary elevated permissions on demand. Access expires automatically, eliminating standing privileges.
- Password verification — confirm that stored credentials still match what is configured on the target system without changing anything.
- Unified audit log — every access request, approval, and action is captured in a tamper-evident log.
Documentation sections
Admin Guide
Everything an administrator needs to deploy, configure, and operate the PAM module.
| Topic | Description |
|---|---|
| Getting Started | Install prerequisites and run your first privileged session |
| Privileged Access | Managing credentials and sessions |
| Just In Time Access | Configuring temporary, on-demand permissions |
| Verify Password | Checking credential validity without rotation |
| API Reference | REST endpoints for automation and integrations |
User Guide
End-user workflows for requesting access and launching sessions.
| Topic | Description |
|---|---|
| Connecting to Remote Targets | Overview of connection methods — browser, SSH client, RDP client |
| Web Connection | Using the browser-based session, clipboard, file transfer, and session controls |