Administering
Administration is the set of tasks by which you prepare and then monitor the IBM® Security Privileged Identity Manager environment.
![]() |
Administrative activities include tasks such as managing credentials, session recordings, AccessProfiles, and generating reports. |
- Appliance Dashboard
The Appliance Dashboard provides important status information, statistics, and quick links to the administrative consoles. - User administration
You can manage people and their built-in system accounts and access in IBM Security Privileged Identity Manager. - Login administration
You can configure system login settings to control the interval at which the password of an account expires. You can configure the number of times that a user can attempt to log in before the account is suspended. - Password administration
IBM Security Privileged Identity Manager controls how passwords can be changed, generated, synchronized, and set throughout the system. - Organization administration
If you are granted the appropriate authority, you can add, delete, and modify elements in the organization tree. You cannot delete an element that has dependent units in it. - Shared access administration
Shared Access Management provides centralized management of shared and privileged accounts. It enables sharing credentials among multiple users. - Session recording administration
The IBM Privileged Session Recorder captures user activity of sessions on managed workstations. - Application identity management
Application administrators can use Privileged Identity Manager for Applications (App ID) to remove hardcoded and unsafely stored credentials from applications, Windows services, and scripts. App ID can also be used to manage the credential entitlements, track the use of each credential, and automate periodic password change. - Services administration
A service can be an identity provider, an identity feed service, or the built-in ISPIM service and TAM/ESSO service. An identity provider represents a user repository for a resource, such as an operating system, a database application, or another application that IBM Security Privileged Identity Manager manages. For example, a managed resource might be a Notes® application, and a service can be defined for a Notes User Repository. - Group administration
IBM Security Privileged Identity Manager provides predefined groups. You can also create and modify customized groups. - Policy administration
For your organization, you can manage policies, which are sets of organizational rules and logic. - Workflow management
Workflows for entitlements to an access can be added, deleted, and modified from the workflow design page. Additionally, you can change workflow properties, escalation, notification, and other workflow activities. - Activity administration
You can manage your activities to view your activities, approve and reject requests, and complete work order activities. You can provide information for a request to proceed, approve and reject recertification requests, complete compliance alerts, and delegate activities to other users. - Requests administration
The View Requests task indicates the progress and completion of submitted changes and requests that you and other users make to the system. - Report administration
The IBM Security Privileged Identity Manager solution supports the IBM Cognos® reporting framework for report generation. - Security administration
After planning system security for IBM Security Privileged Identity Manager, you must take additional steps to implement specific groups, views, and access control items. - Integration with IBM Security Access Manager
This guide provides information about how to configure IBM Security Access Manager virtual appliance as a reverse proxy (WebSEAL) to front the IBM Security Privileged Identity Manager virtual appliance. - Deprecated tasks
Shared access policy and role management tasks are deprecated.
