In this demonstration video for IBM Security Privileged Identity Manager, James visits the ISPIM self-service portal to look up what systems he has access to. He sees that he does not have access to a particular Linux® system he needs to work on, so he initiates a request at the self-service portal.
Next, the manager logs in to the self-service portal and sees the request from James. He reviews the request and the instructions for that type of request, and then he approves the request.
Next, James accesses the system using PUTTY. He's asked if he wants to use a shared credential and which credential pool he wants to use. James selects a credential pool that will give him access to the tasks he needs to perform on the system. He is then logged in automatically with the credentials from the shared pool. He can now do his work.
On the ISPIM console, you can see the shared credential pools and who has them checked out. James can also check out additional credentials manually as needed. When done with his work, James can check in his credential.
You might also be interested in.....
Learn how to manage insider threats
In addition to monitoring networks and applications for external threats, enterprises must be able to monitor and ensure separation of duties for their administrators and other privileged users in an IT environment. This webcast shows how your organization can help secure privileged identities across the enterprise, Track and report on privileged account access, and improving control of shared accounts.
Watch the "IBM Security Privileged Identity Manager Webcast."