How to implement privilege elevation with PAM360

Learn how PAM360 enables secure privilege elevation with just-in-time access, least-privilege policies, and offers complete visibility into privileged activity.

Last updated date : 20 Jan 2026

Privilege elevation emphasizes on enabling secure access to privileged operations, only when needed. With PAM360, this process is automated, policy-aligned, and easy to implement—ensuring control without slowing down users or teams.

Privilege elevation is where the risk of privilege abuse and the consequential unauthorized lateral entry propagates, and where access control should also expand. PAM360 offers a streamlined process to elevate user privileges in a secure and accountable manner. By implementing just-in-time privilege elevation and granular access controls, organizations have complete control over who accesses critical resources, when, and for how long.

  • 01.

    Onboard privileged users and target resources

    Start by onboarding both the target resources and the users who are eligible for privilege elevation onto the active directory. After adding the desired endpoints onto the platform, PAM360 automatically fetches the accounts associated with each device, enabling users to view the resources to which they want to request access.

  • 02.

    Password request-release workflows

    PAM360 releases passwords to users only after their access request has been approved by one or multiple administrators. Admins can configure these workflows so that the access request sent must include the reason for which users require privilege elevation and the duration for which they require it.

  • 03.

    Create custom access policies

    All users can't be treated the same. Using PAM360, administrators can create customized policies that state which user roles can elevate their privileges, when, and how. They can include time-based access controls, application- or command-specific access, and so on.

  • 04.

    Set up just-in-time (JIT) access control

    PAM360 allows for approval workflows that grant access to privileged endpoints. Upon approval, users are allowed to check out the password for a limited period of time, after which the password is hidden and subsequently rotated. This ensures that users are granted access strictly for the duration of their task.

  • 05.

    Set up privilege elevation

    Privilege elevation allows users to run programs as administrators of the network their account is located in. Based on the nature of their accounts (Windows domain, local, or Linux), the range of applications or files they have access to varies. For example, Windows domain users with elevated privileges can access applications across the network, while local users can only access applications on the endpoint their account is native to.

    Using PAM360, it is also possible for users to elevate their own accounts in-line with defined access policies. Users can perform self-service privilege elevation, and access a predefined set of applications as administrators, without having to wait for admin approval.

  • 06.

    Enable application and command control

    Restricting users to only the applications that they need access to, or a certain set of commands that they require for their task, helps maintain least privileges. With PAM360, organizations can implement granular access controls without affecting workflow efficiency.

  • 07.

    Session recording and auditing

    An important part of privilege elevation is to keep track of who does what, both for incident response as well as compliance purposes. PAM360 maintains credible audit logs that track all privileged sessions, recording user activity for later use. It is also important that these privileged sessions are monitored and recorded in real time, so that admins can terminate the session in case they see any suspicious activity.

PAM360 offers organizations a unified solution for privileged access management. From credential vaulting and privilege elevation to secure remote access and user behavior analytics, it secures privileged access through the entire IT environment.

FAQs

  • How is access revoked in PAM360?

    Access through PAM360 is automatically revoked once the task is completed or the specified time window expires. This ensures that permissions are only active for as long as needed.

  • Does PAM360 support endpoint privilege elevation?

    PAM360 supports endpoint privilege elevation, allowing users to elevate privileges right on their device. This gives full control while maintaining security.

  • Can privilege elevation be granted at application and command execution levels?

    Yes, PAM360 offers self-service privilege elevation to run applications and execute mission-critical commands with administrative privileges.