Organizations often operate in complex IT infrastructures spanning multiple locations, secure subnets, diverse platforms, and isolated networks. Managing privileged resources across these varied environments can be challenging when those resources are not directly connected to the network where the PAM360 server is hosted. The PAM360 Application Gateway addresses this challenge, serving as a secure intermediary between the PAM360 server and remote resources, enabling seamless privileged resource management across environments. Whether the resources are deployed in diverse geographical locations, within secure subnets and DMZs, or in isolated networks managed by a service gateway, the Application Gateway ensures that privileged access management remains efficient and secure. It also facilitates cross-platform management by bridging Linux-hosted PAM360 servers with Windows-based resources.
This document explains how the PAM360 Application Gateway enables secure and efficient privileged resource management across distributed IT environments. It covers the gateway's setup, communication workflow with the PAM360 server, supported operations, and how tasks are securely handled, helping administrators manage resources effectively in segmented networks.
The PAM360 Application Gateway is a service designed to run on either Windows or Linux machines. It is specifically designed to execute key resource and password management operations, such as resource discovery, account discovery, password verification, and password reset for privileged resources not directly connected to the network where the PAM360 server is hosted, and facilitate privileged remote connections to remote resources managed via Application Gateways. Currently, RDP, SSH, and VNC sessions are supported. The Application Gateway allows organizations to manage and secure resources across various isolated or segmented networks, ensuring seamless administration despite network constraints.
After deploying an Application Gateway within a secure, isolated, or private network, you can discover the privileged resources and associated accounts that are otherwise inaccessible from the PAM360 server. Post discovery, these privileged resources are added to the PAM360 inventory, where administrators can associate them with the desired Application Gateway in bulk from the PAM360 Application Gateway window for streamlined resource management.
Once the resources are associated with an Application Gateway, any password management operations, such as password verification or reset triggered from the PAM360 interface, are executed by the corresponding Application Gateway to which the selected resources are associated. This comprehensive approach allows for secure and efficient management of privileged resources and accounts across isolated or segmented networks.
This section covers the list of operations supported by PAM360 via the Application Gateways.
PAM360 supports privileged resource discovery via the Application Gateway, enabling the discovery of privileged resources within networks not directly connected to the PAM360 server. With this capability, PAM360 can seamlessly identify Linux endpoints, VMware instances, and network devices in the environment that are part of isolated or secure subnets and discover the associated privileged accounts. Explore the relevant help documents for more details about discovering privileged resources and the associated accounts via the PAM360 Application Gateway.
Caution
Once the privileged resources within your environment are successfully onboarded into the PAM360 inventory, you can proceed with the discovery of the privileged accounts associated with those IT assets. PAM360 supports privileged account discovery via the Application Gateway for Windows, Linux, macOS, VMware devices, database servers, network devices, and privileged accounts associated with any SSH-based devices. Additionally, PAM360 supports the discovery of Service Accounts, Scheduled Tasks, IIS AppPools, and IIS Web.config Credentials via the Application Gateway.
Similarly, PAM360 supports periodic discovery of privileged accounts through schedules via the Application Gateways to discover and add the newly added privileged accounts to the privileged resources in your environment into the PAM360 repository. Explore the provided links for more details about the privileged accounts discovery and periodic discovery of privileged accounts in PAM360.
PAM360 supports various password management operations via the Application Gateway for Windows, Linux, macOS, VMware devices, database servers, network devices, and privileged accounts associated with any SSH-based devices, as well as Service Accounts, Scheduled Tasks, IIS AppPools, and IIS Web.config credentials. The supported password management operations are as listed below:
| Resource Type | Resource Discovery | Account Discovery | Password Management |
|---|---|---|---|
Windows Domain | |||
Windows | |||
Linux | |||
Database Servers | |||
Network Devices | |||
SSH-Based Resources |
PAM360 provides comprehensive support for establishing remote sessions to privileged resources in your environment that are managed through Application Gateways. Currently, only RDP, SSH, and VNC connections are supported. Additionally, PAM360 offers the flexibility to configure a landing server to tunnel the remote session launched to privileged resources managed by the Application Gateway servers.
Caution
If you choose to tunnel remote sessions through a landing server for resources managed by Application Gateways, ensure that the landing server is added as a resource in PAM360 and has connectivity to the PAM360 server.
The Application Gateway communicates with the PAM360 server over port 8288, sending a ping every 5 seconds to maintain a continuous connection. This periodic communication enables PAM360 to monitor the status of the Application Gateway in real-time. On the PAM360 Application Gateway page, the status is shown as either Active or Inactive, allowing administrators to verify its availability and operational state.
When a user initiates an operation, such as password verification or reset, for a resource associated with an Application Gateway, PAM360 notifies the Application Gateway about the task through a secure encrypted channel. The Application Gateway executes the task and notifies the PAM360 server about the status, thereby facilitating seamless task handling and accurate tracking within the environment. All the communication between the PAM360 server and the Application Gateways occurs through a secure encrypted channel.
If the Application Gateway is down or there is a connectivity issue between PAM360 and the Application Gateway at the time of task execution, the task is placed in a queue for up to 3 minutes on the PAM360 server. If the Application Gateway remains unreachable beyond the 3-minute window, the task is marked as failed, and its status is updated on the Application Gateway Task Monitor window and the Resource Audits page.