Getting started
(This topic addresses security administrators. For more information, see Roles-and-permissions.)
BMC AMI Security Privileged Access Manager is one of a suite of products that runs under the control of RSS.
Sometimes, application developers require elevated privileges, which are controlled by external security managers (ESM), like IBM Resource Access Control Facility (RACF), CA Access Control Facility 2 (ACF2), and CA Top Secret Security (TSS), to perform specific application or system changes. For certain critical or sensitive systems, having one or more users with permanent access privileges is a potential security risk.
Application developers who do not have system privileges on a permanent basis can use PAM to request a user ID that has elevated privileges when required. All PAM activity is fully audited and can be associated with change control requests.
You can configure multiple methods for accessing and grouping the temporary system privileges that application developers can request.
User IDs
You can create two types of user IDs in PAM:
- Logon user ID—used to log on to PAM (two levels of users—users and managers)
- Project user ID—user ID with elevated privileges to perform specific system changes
Application developers log on to PAM with their logon user IDs. To perform specific system changes, application developers must request and gain approval for a project user ID that is available in a PAM project to which they have access.
User levels
You can create logon user IDs that support the following levels of users:
- User—permitted to receive and request permission to elevate their privileges to perform specific system actions.
- Manager—permitted to authorize requests submitted by users.
User level is decided based on the privileges assigned to the logon user ID. These privileges are controlled by ESM security protections.
Projects
You can add the user IDs that you create into a project, which are called project user IDs. Users can use these project user IDs with elevated privileges to perform system changes. You can create multiple projects in a single PAM instance for multiple requirements.
Access modes for both user ID pools and self-elevation are arranged in projects.
Users authorized to request access must also be authorized for the project. This allows for a high granularity in controlling the level of access users can request, and for what purpose.
Project modes
You can create the following modes of projects in PAM:
- User ID pools
- Self-elevation
You can use both modes in a single instance of PAM.
User ID pools
Users get access to a project user ID from a predefined pool. You create user IDs in the ESM database, each of which is assigned the necessary permissions to perform a specific system maintenance role.
IDs in the pool are kept in a revoked state, with an unknown password. When an authorized user wants to perform a controlled function, they receive access to the appropriate user ID from the pool and can set a temporary password. When the authorized user releases the ID or after a preconfigured time, the user ID permissions are revoked and the password is reset to an unknown value.
Self-elevation
Users and managers can have their logon user ID privileges temporarily elevated. You grant them membership to privileged resources (for example RACF groups), each having the necessary permissions to perform a specific system maintenance role.
After a preconfigured time, the privileges are revoked and the user ID is disconnected from the privileged resources.
Request modes
PAM operates in two request modes:
- Automatic—users are automatically given access to the privileged user IDs without any further authorization.
- Approval—users must wait until their request is approved by a manager.
Request mode is defined in the configuration parameters for each project. You can define a request mode according to the time, day, or week. For example, requests during office hours can be in Approval mode and requests outside of office hours can be in Automatic mode.
Self-managed projects
By default, managers cannot request project user IDs. But in certain cases, you might want to authorize managers to request project user IDs without allowing them to approve their own requests. You can authorize managers to request project user IDs by using one of the following methods:
Using the CSDATAField parameter
By using the CSDATAField parameter, you can link a project user ID to a manager-level logon user ID. A manager can thus request the project user ID linked to their logon user ID only. Managers requesting their linked project user ID cannot approve their own request (which must be approved by another manager who has access to the same project) but can approve all other user ID requests in the same project. This feature helps a project team manage its own project user ID requests. For more information, see CSDATAField.
To link a project user ID to a manager-level logon user ID, follow these steps:
- In the CSDATA segment of the user profile of manager-level logon user ID, create a CSDATA field and specify the project user ID that you want to link in the newly created CSDATA field.
- Specify the CSDATA field as the value for the CSDATAField parameter.
Using the UniversalMode parameter
When you enable the UniversalMode parameter in a PAM project, you authorize managers with access to the project to request project user IDs. Managers with access to a UniversalMode enabled project cannot approve their own project user ID requests; another manager having access to the same project must accept the request.
You can use the CSDATAField parameter in user pool mode projects only. You can use the UniversalMode parameter in both user pool and self-elevation mode projects. If you define CSDATAField and UniversalMode in the same user pool mode project, PAM considers CSDATAField only and ignores UniversalMode.
By using UniversalMode, managers can request any project user ID in a project that they have access. But by using CSDATAField, mangers can request the project user ID that is linked to their logon user ID only.
Where to go from here
If you are a system programmer and want to install and configure PAM, see the following topic branches:
To start using PAM to request and grant elevated privileges, see Using.