Custom Role Privileges
This page offers a clear and comprehensive overview of all individual user privileges available in PAM360, allowing administrators to selectively enable them when building custom roles. Each privilege corresponds to a specific capability, such as adding resources, managing accounts, configuring authentication, handling remote access, generating reports, or customizing system behavior, and can be assigned based on operational needs and security policies. By treating these privileges as modular building blocks, administrators can craft precise, policy-aligned roles tailored to their organization’s workflow. Review the privileges listed below and enable the ones required to define the custom role you need.
1. Password Privileges
Resources | - Add Manually - Add the endpoint as a resource in PAM360
- Import - Import multiple resources from CSV or other supported files
- Discover - Scan and detect resources in the provided environment
- Customize - Define and manage custom resource types and attributes
- Generate Reports - Generate reports related to resources
- Edit - Modify the existing resource details
- Delete - Remove the resources from PAM360 inventory
- Transfer - Transfer the ownership of a resource to another user
- Copy - Duplicate a resource entry
- Manage Service Accounts and Scheduled Tasks - Configure and manage service accounts and automate resource-related tasks
|
Account | - Add Manually - Add a new account under a resource
- Discover - Scan and retrieve associated accounts of a resource
- Move - Move accounts between resources
- Edit - Modify the account details in a resource
- Delete - Remove accounts from a resource
- Copy - Duplicate an account entry
- Customize - Modify the account attributes
|
Password Reset | - Individual AccountsOnly - Identify unsynchronized passwords for specific accounts
- Multiple Accounts in Bulk - Identify unsynchronized passwords across accounts
- Local Reset of Individual Passwords - Rotate passwords in PAM360
- Remote Reset of Individual Passwords - Rotate passwords in PAM360 and endpoints remotely
- Remote Reset of Multiple Passwords - Reset multiple endpoints password remotely
- View Commands - View available SSH command sets
- Manage Commands - Configure or modify SSH command lists
|
Resource Groups | - Add - Create a new resource group
- Delete - Remove existing resource group
- Transfer - Transfer the ownership of a resource group to another user
- Edit - Modify the existing resource group details
- Generate Reports - Generate resource group-related reports
|
Access Control | - Configure - Configure access control workflow for a resource or account
- Approve Password Access Requests - Approve or reject user access requests for an account
|
Share Passwords | - Share Accounts / Resources / Resource Groups - Share the specific entities with users and user groups
- With Users - Share the entity with individual users
- With User Groups - Share the entity with predefined user groups
|
SSH Keys | - SSH Keys - Add, edit, or delete the SSH keys
|
Resource Types | - Custom Database Connection Configuration - Set up custom database connections
- Custom Database Connection Management - Modify or manage existing connections
|
2. User Privileges
Users | - Add Users Manually - Create user accounts manually
- Import Users from AD - Import user accounts from AD
- Import Users from LDAP - Import user accounts from LDAP directories
- Import Users from Microsoft Entra ID - Import user accounts from Microsoft Entra ID
- Manage SCIM Provisioning - Configure and manage SCIM-based user provisioning
- Import from File - Import user accounts from a CSV file
- Edit - Modify the existing user details
- Lock / Unlock Users - Lock or unlock PAM360 users
- Manage API Users - Manage API-based user accounts
- Change User Roles - Modify the assigned roles for users
- Transfer Resource Ownership - Reassign resource ownership between users
- Transfer Access Control Privileges - Reassign access control privileges between users
- Generate Reports - Create the reports on user activities
- Transfer User Accountabilities - Transfer the user's complete responsibilities to an other user
|
User Authentication Protocols | - Manage Active Directory - Configure and manage Active Directory authentication
- Manage Microsoft Entra ID - Configure and manage Microsoft Entra ID authentication
- Manage RADIUS Authentication - Configure and manage RADIUS authentication
- Manage Two-Factor Authentication - Enable, disable, or configure Two-Factor Authentication for user accounts
- Manage Browser Extension/Mobile Access for Users - Configure access to users for browser extension or mobile application
- Manage LDAP - Configure and manage LDAP authentication
- Manage SAML Single Sign-on - Configure and manage SAML Single Sign-On authentication
- Manage Smart Card Authentication - Configure and manage Smart Card authentication
- Reset Two-Factor Authentication - Reset Two-Factor Authentication for users
- Manage Remote Connect for Users - Configure access to users for Remote Connect application
|
User Groups | - Add - Create a new user group
- Modify an Existing Group - Edit the existing user group details
- Delete - Remove the user groups
- Manage User Group Settings - Configure user group settings
- Generate Reports - Generate user group-related reports
|
3. Remote Access Privileges
Remote Access | - Show Connections Tab - View the Connections tab
- Manage Auto Logon Helper - Manage Auto Logon Helper functionality
- File Transfer - Perform file transfer operation during remote sessions
- Upload Files - Upload files during remote sessions
- Download Files - Download files during remote sessions
- Secure File Transfer - Transfer files securely between remote machines without remote sessions
- HTTPS Gateway Connection - Establish remote connections through the HTTPS Gateway
- Remote Connection to Resources - Initiate remote connections to resources
- RemoteApp - Access RemoteApp functionality
- RemoteApp AutoLogon - Automatic login for RemoteApp sessions
- Manage RemoteApp - Manage the RemoteApp settings
- Configure Connection Settings - Modify the connection settings of an account
- Configure Remote Session Settings - Configure the remote session settings
|
Remote Session | - Configure Session Recording for Resource Owners - Enable session recording configuration for owned resources
- Configure Session Recording Globally - Enable session recording global configuration
- Join Active Sessions - Join the active remote sessions
- Terminate Active Sessions - Terminate the active remote sessions
- View Recorded Sessions - Access the recorded remote sessions
|
Remote Connect | - Configure SSH Proxy - Configure SSH Proxy settings for Remote Connect application
|
4. Audit Privileges
Audit | - View and Export Audit Records - View and export the audit records
- Terminate User Sessions - Terminate the active user sessions
- Configure Audit Settings - Manage the audit configurations and parameters
|
5. Reports Privileges
Password Reports | - Password Activity Report - Export the password-related activities report
- Policy Compliance Report - Export the password policy compliance report
- Password Out of Sync Report - Export the out-of-sync passwords report
- Ungrouped Passwords Report - Export the ungrouped passwords report
- Password Access Control Report - Export the access control configuration report
- Password Expiry Report - Export the passwords nearing expiration report
- Password Inventory Report - Export the complete inventory of stored passwords
|
User Reports | - Ungrouped Users Report - Export the ungrouped users report
- User Activity Report - Export the user activities report
- User Access Report - Export the user access details report
|
General Reports | - Executive Report - Export the summary and overview report
|
Compliance Reports | - GDPR Compliance Report - Export the GDPR compliance report
- ISO/IEC 27001 Report - Export the ISO/IEC 27001 security compliance report
- NERC-CIP Compliance Report - Export the NERC CIP compliance report
- PCI DSS Compliance Report - Export the PCI DSS security compliance report
- NIS2 - Export the NIS2 Directive compliance report
- LGPD - Export the LGPD compliance report
|
Custom Reports | - Custom Reports - Create and manage customized reports based on organizational requirements
|
Query Reports | - Query Reports - Generate reports using custom database queries
|
Key Reports | - Certificate Report - Export the SSL/TLS certificates report
- SSH Keys Report - Export the SSH keys report
|
6. PAM360 Setting Privileges
PAM360 Settings | - Database Backup - Configure and manage the database backup schedules and retention
- Failover Service - Set up and manage the failover configurations for high availability
- Proxy Settings - Define and maintain proxy configurations
- SSL Settings (Server Settings) - Manage the SSL certificates and server-related configurations
- Privacy Settings - Configure the data privacy parameters of PAM360
- Security Settings - Manage the global security controls
- Remote Host - Configure the remote host parameter
- Manage JDBC Properties - Modify the JDBC connection parameters
- High Availability - Set up and manage the high availability configurations
- Mail Server Settings - Configure the mail servers for alerts and notifications
- Event Logging Settings - Define the event logging preferences
- PAM360 Server Settings (Change Tab Preferences, etc.) - Customize the general settings and other preferences
- Manage Allowed Apps/Scripts - Define the approved applications and scripts
- Security Hardening Dashboard - Access and configure the system hardening settings
- Application Scaling - Configure the application scaling for distributed environments
- HTTPS Gateway Server - Set up and manage the HTTPS Gateway configurations
|
7. Custom Setting Privileges
Custom Settings | - Export Passwords - Export the stored passwords securely
- Manage E-mail Templates - Create and edit email notification templates
- Manage Password Reset Listener - Configure the password reset listeners and related plugins
- Manage Resource Types - Create and manage the custom resource categories
- Manage Landing Server - Configure and manage the landing server
- CI/CD Platform Integration - Integrate PAM360 with CI/CD tools for automated workflows
- SIEM Integration - Set up and manage the integration with SIEM solutions
- Manage License - View and manage the license details
- Create Custom Roles - Define and manage the custom user roles and privileges
- View Support Information - Access and view the support-related information
- SDK Management - Configure and manage the deployed PAM360 SDKs
- Manage Settings for Offline Access - Manage the settings related to offline access
- Manage Password Policies - Create and manage the password policies
- Manage Password Reset Plugin - Configure the password reset plugins
- Password Management APIs - Configure the password management API settings
- Manage Ticketing System Integration - Configure the ticketing system integrations
- ManageEngine Integration - Integrate PAM360 with other ManageEngine products
- Vulnerability Scanner Integration - Configure the vulnerability scanner integrations
- Allow users to manage their personal passwords - Manage their own personal passwords
- Manage Schedules - Configure and manage the scheduled tasks
- Robotic Process Automation - Configure and manage RPA tools
|
Agents | - Download PAM360 Agents - Download the agent installers for endpoints
- Manage Agents - Manage the agents installed and owned
|
8. SSH Keys and Certificate Privileges
SSH Keys | - Add - Add the SSH key
- Key rotation - Rotate the existing SSH keys
- Delete - Delete the SSH key
- Add key command - Add the command restrictions for SSH keys
- Key group management - Manage the SSH key groups
- Key association disassociation - Associate or disassociate SSH keys with accounts
- Create and deploy key - Create new SSH keys in PAM360 and deploy them to remote systems
- Export key - Export the SSH keys for external use
- Push key file - Push the SSH key files to target systems
|
Certificates | - Discover certificates - Discover the SSL certificates from target systems
- Certificates - Completely manage the SSL certificates in PAM360
- CSR - Completely manage the Certificate Signing Requests (CSRs) in PAM360
- ACME - Automate the certificate management using the ACME protocol
- GoDaddy - Request and manage the certificates from the GoDaddy CA
- The SSL Store - Request and manage the certificates from the The SSL Store
- DigiCert - Request and manage the certificates from DigiCert
- AWS - Integrate and manage the SSL certificates with AWS services
- MSCA - Manage the Microsoft Certificate Authority certificates
- Azure - Manage the SSL certificates within Microsoft Azure
- Sectigo - Request and manage the certificates from Sectigo CA
- GlobalSign - Request and manage the certificates from GlobalSign CA
- MDM - Manage the certificates for Mobile Device Management systems
- Kubernetes - Manage the certificates used in Kubernetes clusters
- Private CA - Request and manage the certificates from a private certificate authority
|
SSH Keys & Certificate Settings | - SSH Key & Certificate Settings - Manage the key and certificate-related settings and configurations
|
9. Integration Privileges
Analytics | - ManageEngine Analytics Plus - Integrate PAM360 with ManageEngine Analytics Plus
- ManageEngine Log360 UEBA - Integrate PAM360 with Log360 UEBA
|
Container Platform | - Kubernetes - Integrate PAM360 with Kubernetes environments
- Manage Clusters - Manage Kubernetes clusters within PAM360
- Associate Secrets - Associate secrets with Kubernetes resources in PAM360
|
10. Privilege Elevation Privileges
SSH Command Control | - Associate Command Groups - Associate or dissociate the command groups with accounts, resources, or resource groups, and view commands and command groups from the Manage Command Lists window.
- Manage Command Lists - Create and manage the lists of approved commands and command groups for SSH command control
- Use Command Control - Execute the permitted commands during SSH sessions
|
Self-Service Privilege Elevation | - Self-Service Privilege Elevation - Linux - Configure self-service privilege elevation for resources that require privilege elevation
|
Application Control | - Manage Application Control - Configure and manage the application control in PAM360
|
11. Zero Trust Privileges
Zero Trust | - Configure Zero Trust - Set up and manage the Zero Trust configurations
- Configure Access Policy - Define and manage the access policies for Zero Trust
- Approve Access Policy Requests - Approve or reject access policies configured for Zero Trust
|
12. Cloud Entitlements Privileges
Cloud Entitlements | - Manage Cloud Entitlements - View, modify, and manage cloud entitlements across integrated platforms
|
13. AI-Powered Insight Privileges
AI-Powered Insights | - Manage AI Integrations - Enable, manage and disable the AI integration
- Generate AI-Powered Insight - Generate AI insights for the supported functionalities
|