Fidar Pam: Privileged Access Management
Fidar Pam, Privilege Access Management is a very effective solution that helps manage, control and monitor user activities. The solution provides a centralized policy framework for the IT security team to authorize role-based and responsibility-based privileges and provide law-restricted access to privileged accounts. The system architecture is layered and decentralized, and JAVA, C++ and JavaScript programming languages have been used in the development of this product. In order to increase productivity and respond to the high number of users, the emerging Docker technology has been used in product development. The database used in the product is MySQL and the product can run on any operating system.
- Support for common remote access protocols
- User interface based on HTML5 and WebSocket technology
- Possibility of two-way file transfer
- AAA based safe design
- Recording all events and reporting
- Support for authentication protocols such as LADP, RADIUS and TACACS
- Sending warning messages and reporting via email and SMS
- The central point of implementing security policies: A central point of enforcement of security policies where administrators can restrict user activity to the level of command execution based on predefined policies.
- Integration point for multiple tools: An integration point for multiple authentication tools including password management and multi-factor authentication tools.
- Real-time monitoring: Real-time monitoring enables security teams to monitor and monitor the activity of privileged users live.
- Recording sessions: Recording the meetings provides the opportunity to check the footprints to answer the question "Who did what?" in times of crisis. specified
- Four eyes licensing system: Two-way control, which goes back to the authorization system known as "four eyes" in which performing some actions and executing some special commands requires real-time permission from the supervisor.
- Responding to security breaches: Warning and destruction of sessions in case of violation of security policies by the user.
- Multi-factor authentication
- Full reports
- Centralized control of system administrators
- High granularity access control
- Monitoring and recording meetings
- Password safe storage of sensitive information