|
Indeed introduces version 2.10 of Indeed Privileged Access Manager (Indeed PAM).
Indeed PAM now supports OpenLDAP and ALD PRO directory services in addition to Active Directory and FreeIPA.
Version 2.10 introduced Ad hoc resources, which allow you to connect to any resource without having to add them to PAM first.
Another improvement is the ability to natively connect PAM to SIEM systems.
We tell you about all the new features implemented in Indeed PAM 2.10 in this article.
OpenLDAP and ALD PRO support
Indeed PAM 2.10 introduces the virtual phone number service ability to select OpenLDAP and ALD PRO as directory services. This innovation expands the possibilities for import substitution of Microsoft's Active Directory directory service. Indeed PAM now supports the following user directories: Active Directory, FreeIPA, OpenLDAP, and ALD PRO.
Blocking a user
Using this function, the PAM system administrator can close the user's access to resources in two clicks.
A blocked user will not be able to:
Open sessions.
View, set, and change your account password.
Access authentication data for Application to Application Password Management (AAPM) applications.
This feature allows you to quickly respond to suspicious user actions, thereby maintaining system security.
Moreover, unblocking a user after clarifying the circumstances is as easy as blocking them.
Possibility to change the key and/or encryption algorithm of the PAM database
Indeed PAM 2.10 introduces the ability to change the database encryption key without stopping PAM. This allows you to quickly respond to cases where the database encryption key is compromised.
Likewise, you can change the encryption algorithm without stopping PAM.
Ability to specify multiple RADIUS servers for PAM user authentication
Now the PAM system administrator can specify several RADIUS servers. This will ensure fault tolerance of the system, since if one of the RADIUS servers fails, the PAM system will try to connect to another RADIUS server.
|
|