Pular para o conteúdo principal
Version: 3.21

All Credentials

The Credentials report is accessed in the PAM ➔ Credentials ➔ All menu. This report shows credentials subdivided by the devices to which it belongs.

info

Only Credentials which the current User has permission to see will be listed on this screen. You can check how Access Groups work to manage these permissions - link.

Each Credential record in the list has actions for maintaining or using the credential.

  • Details: You can access more information about the credential like settings, device attached, operations, and others.;

  • History: Have access to the password history of the credential, and you will be able to access all old values of this password. This action uses the access workflow;

  • Clone: Allows you to clone the credential completely. Use as a facilitator when similar credentials in their characteristics are to be created. You will save time by changing only the username and password values;

  • View password: Have access to the currently credential password. This action might use the access workflow;

  • Start session: Present only when the device has some protocol that allows proxy sessions. Delivers a proxy web session to the requester;

  • Start session on another device: Allows proxy access to another device from the same domain. The credential must be a domain user and have a domain configured;

info

View password and Start session action can use the Access Workflow.

By inactivating a credential, all users will lost access for that inactivated credential so not being possible use through the proxy (Start Session), Automatic password change, even View Password and history access will be inacesiable.

When you deactivate a device, all credentials linked to the device will be inactivated. When you activate a device, only the device will be activated. Credentials must be activated one by one manually. This allows the review and assurance that credentials are not improperly activated.