[{"id":"ci_c6cf1f01e7ff04f11e1d56c4b646a439e620c7bd37ee3dc93959d92e39ea0aeb","title":"Getting Started","path":"/pam-technical-documentation/5.2/getting-started","children":[]},{"id":"ci_4291fa3cf7dc295200e817d923a5ccc0e68c7b2743bdc1a98c9b35c04c139851","title":"Release Notes","path":"/pam-technical-documentation/5.2/release-notes","children":[{"id":"ci_dc936647819d33551e70793534e1be45bc790581e4b266db31f682dcce60fcee","title":"Version 5.2.0","path":"/pam-technical-documentation/5.2/version-5-2-0","children":[]}]},{"id":"ci_5e38a380a6aeeb1a4248b1699f4fe63aac8c76ff559767ded103c515fc2b98cf","title":"Installation & Setup","path":"/pam-technical-documentation/5.2/installation-setup","children":[{"id":"ci_c326bf1b5c49cfddb8b010e7e296a88004bfc0415bea57bc2d28e372860f0669","title":"(5.2.1) Planning to Deploy","path":"/pam-technical-documentation/5.2/planning-to-deploy","children":[{"id":"ci_e19f95ba8a12ae7d934a356725c5e5f88442e41b9c0eabd8078c8b03eeb0a9cf","title":"Service Architecture Overview","path":"/pam-technical-documentation/5.2/service-architecture-overview","children":[]},{"id":"ci_c646f7982a16b6b58097204d42a5b1c57246007fba9bff5078be6ad0708f13c1","title":"System Requirements","path":"/pam-technical-documentation/5.2/system-requirements","children":[]},{"id":"ci_c8509b48dd79a61c9a50045230d2609a8a8ee7b3f9cd5f111bffacbe5f9d225d","title":"Deployment Scenarios","path":"/pam-technical-documentation/5.2/deployment-scenarios","children":[]},{"id":"ci_533f83dd98ceeda449c346888a8ac5612c4ab77c59018a4993189162ee218a77","title":"Setting up test environment","path":"/pam-technical-documentation/5.2/setting-up-test-environment","children":[]},{"id":"ci_8097f67f034156bdd4fef477b4f91e3a0024e449edd715b8523f3f8bf4045147","title":"Standard Port Requirement for Installation","path":"/pam-technical-documentation/5.2/standard-port-requirement-for-installation","children":[]}]},{"id":"ci_5445fcf9aa58e6372a71051c0b5a144714b95bc1ba0800ca3feb8c034b094781","title":"Installing Sectona Components","path":"/pam-technical-documentation/5.2/installing-sectona-components","children":[{"id":"ci_696b678e1af778108e98ed4ac4c7b81f57e58dcd447fa4fc5eabdd84c7815c1e","title":"Installing Vault Component","path":"/pam-technical-documentation/5.2/installing-vault-component","children":[]},{"id":"ci_590be678e9b82ab10b1a66644f77c27a2e14f54f002055ba0dd4ef55ccd0f690","title":"Installing Sectona Web Access","path":"/pam-technical-documentation/5.2/installing-sectona-web-access","children":[]},{"id":"ci_b6fbb62f2790cc96bf1e76a8dec6a6182f5e749592ffb6b84fb956a3f60419ad","title":"Installing Sectona Jump Host Component","path":"/pam-technical-documentation/5.2/installing-sectona-jump-host-component","children":[]},{"id":"ci_2f0d1c00389c2f070f2c4a364a8c758c030a5efbedb60049612144f39f01c6b6","title":"Installing Sectona File Synchronization Component","path":"/pam-technical-documentation/5.2/installing-sectona-file-synchronization-component","children":[]},{"id":"ci_fa7455fd8713d8bb12a9e7821a4666fa7186e4814202a8fb84f35c6559fc2785","title":"Installing Session & Web Session Proxy Component","path":"/pam-technical-documentation/5.2/installing-session-web-session-proxy-component","children":[]},{"id":"ci_8efb1cf70995a2208c961f8e8b5706649d1d8cebf7c023601d7b9b8052484cbc","title":"Installing Sectona Satellite Vault Component","path":"/pam-technical-documentation/5.2/installing-sectona-satellite-vault-component","children":[]},{"id":"ci_5c484997358cb011aac20109f04e012d08ef8e449c943ce1808e329724e343d4","title":"Installing Sectona Vault API Extension","path":"/pam-technical-documentation/5.2/installing-sectona-vault-api-extension","children":[]},{"id":"ci_fdd424c543ac6bd7ccc400192784a39ff6464399ec593cd9b4bde6cb0f91127b","title":"Installing Sectona Client App","path":"/pam-technical-documentation/5.2/installing-sectona-client-app","children":[]},{"id":"ci_164e3f6e3ea9d695a2832b083a01bf4cb63d184d93d02e48c12c35f7a1108503","title":"Installing Sectona Windows Monitoring Component","path":"/pam-technical-documentation/5.2/installing-sectona-windows-monitoring-component","children":[]},{"id":"ci_a78adbb5b77e3bc8eab63cc011bd3d16e718d21dbc68fdc000f4053272018282","title":"Installing Sectona Launcher","path":"/pam-technical-documentation/5.2/installing-sectona-launcher","children":[]},{"id":"ci_00ccace55ba1a4ec4cc805fa40746e5628ee1aee56bfbb6ce07e02c67addd137","title":"Installing Sectona Remote Access Publisher Component","path":"/pam-technical-documentation/5.2/installing-sectona-remote-access-publisher-compone","children":[]},{"id":"ci_e04a8d7da01a148be25c75dc7addcd95d043c15108eaf56eac04ab23a03cd21f","title":"Installing Sectona Remote Session Host","path":"/pam-technical-documentation/5.2/installing-sectona-remote-session-host","children":[]}]},{"id":"ci_8093ce5bb165a30696a3cda6e139841e6577210999c7f7f13c074dc28f2b84d7","title":"Building a High Availability Setup","path":"/pam-technical-documentation/5.2/building-a-high-availability-setup","children":[{"id":"ci_0cbe4c2e5d7fa45aa12a6d666fbdae51849444fe77e1f598088bb413695bfd39","title":"Key Concepts and Components of a High-Availability System","path":"/pam-technical-documentation/5.2/key-concepts-and-components-of-a-high-availability","children":[]},{"id":"ci_30526f75ae6bb8f23e7183bae0befd093fa95579f9375e5894355ec2f0f68b7c","title":"Choosing an Architecture for HA & DR Requirements","path":"/pam-technical-documentation/5.2/choosing-an-architecture-for-ha-dr-requirements","children":[]},{"id":"ci_6dd70857619bb6e44743c63878722f539b3735a439816ac9e0cb82610fc6859a","title":"Configuring Sectona Web Access for High Availability","path":"/pam-technical-documentation/5.2/configuring-sectona-web-access-for-high-availabili","children":[]},{"id":"ci_58f314a65c415d7829bb984aad276e029152dbf5fd5855feed027a90904f1b4b","title":"Configuring Vault for High Availability","path":"/pam-technical-documentation/5.2/configuring-vault-for-high-availability","children":[]}]},{"id":"ci_16f7c18b34d2a96199b771df416c197eac8b3f24b78f755ac0ea33254954ec22","title":"Configuring Disaster Recovery Setup","path":"/pam-technical-documentation/5.2/configuring-disaster-recovery-setup","children":[]},{"id":"ci_4a83b29fbad505e5d7de3c31ed32aba8a27ed733db27295a4b6109ee4d14fe31","title":"Migrating from evaluation to production","path":"/pam-technical-documentation/5.2/migrating-from-evaluation-to-production","children":[]},{"id":"ci_7cf54d5351cc88242f46ebba576da9e2f9923002308035478542ee51919d0637","title":"Rebuilding your setup","path":"/pam-technical-documentation/5.2/rebuilding-your-setup","children":[]},{"id":"ci_f8e47434cd3d12f23a8bc2243600d3e8d1d0a68cd6e55b9eab6b957509c6bde8","title":"Upgrading the System","path":"/pam-technical-documentation/5.2/upgrading-the-system","children":[]}]},{"id":"ci_50cf31321477e794a81fe86097c4929a061345bddfc007a60f67c14f8068321d","title":"Configure & Implement","path":"/pam-technical-documentation/5.2/configure-implement","children":[{"id":"ci_c3eae6e9379a869dd0e2615da3c9609706aab719f48f533d7847e961a47b583a","title":"General Configurations","path":"/pam-technical-documentation/5.2/general-configurations","children":[{"id":"ci_502f973d789f06ec61dcb62f223780fccf78e71dcc218f21e30ab02423672b4c","title":"Customizing web application appearance & site settings","path":"/pam-technical-documentation/5.2/customizing-web-application-appearance-site-settin","children":[]},{"id":"ci_5693a408e3f189485ee5dbd09078fda7c23485f81671e2b09b40b9371f5cc2a1","title":"Adding new LDAP/LDAPs directory","path":"/pam-technical-documentation/5.2/adding-new-ldap-ldaps-directory","children":[]},{"id":"ci_25033e249470c2ed26ffa379baaa885933ece3f6266f27206a47ecfc01253073","title":"Configuring location tagging","path":"/pam-technical-documentation/5.2/configuring-location-tagging","children":[]},{"id":"ci_360186fdc96ec5dc48e72c691d9cf7f2418f4a93568868548f42712a95ae709f","title":"Defining network zones","path":"/pam-technical-documentation/5.2/defining-network-zones","children":[]},{"id":"ci_2b7986f208e9f3db1ef0f8a7a9d7ea934359004916fe027e6b6e67a1153cb183","title":"Managing video recording settings","path":"/pam-technical-documentation/5.2/managing-video-recording-settings","children":[]},{"id":"ci_874615578cbb1bb6c4aeb4c04729775e65638b667e7a1920a156242e2beb0998","title":"Setting criticality level tags","path":"/pam-technical-documentation/5.2/setting-criticality-level-tags","children":[]},{"id":"ci_2217177c767f05cf67d1d59450a6cf6025db34bb6f8b2d92cc7761cca089a110","title":"Configure Email settings","path":"/pam-technical-documentation/5.2/configure-email-settings","children":[]},{"id":"ci_d78ddce915dcf23d5530a4ed2000dbf814ad9fb62a72e77f748e7e4379da28bf","title":"Setting up a network proxy","path":"/pam-technical-documentation/5.2/setting-up-a-network-proxy","children":[]},{"id":"ci_e326e8d5e19ddea814fa2dc4c9538b85f34abf840f66fe5e2766741dfbe017a7","title":"Applying conditions with tags","path":"/pam-technical-documentation/5.2/applying-conditions-with-tags","children":[]},{"id":"ci_3bb6959bde48f90305c962095eca3c03c4d156e5d1665d4857db377b870be414","title":"Configuring HTTPs certificate","path":"/pam-technical-documentation/5.2/configuring-https-certificate","children":[]},{"id":"ci_505b69022d11a6f6747752a14b834c2d4ed9d4faf3a77c76eb22687619a4ff9c","title":"Updating default system settings","path":"/pam-technical-documentation/5.2/updating-default-system-settings","children":[]}]},{"id":"ci_2f461a680f298f9966ddae05e449a8f0c986190d11157495d26e9a529becf02c","title":"Configuring user authentication","path":"/pam-technical-documentation/5.2/configuring-user-authentication","children":[{"id":"ci_39daa02bb240cfed7d0a247e709c947fa7276d22f358fb0cdfe589f047831000","title":"LDAP/LDAPs supported directories","path":"/pam-technical-documentation/5.2/ldap-ldaps-supported-directories","children":[]},{"id":"ci_bd51d505841a8093dd8c41433c2023ea97f16a2fd8e9350d0af871d0a1237504","title":"Radius authentication","path":"/pam-technical-documentation/5.2/radius-authentication","children":[]},{"id":"ci_c2fe4abd2fd6bdb666fdbfade3afc6b3b5baf0a765d6835133f438bcb7a8d9ef","title":"Sectona authentication","path":"/pam-technical-documentation/5.2/sectona-authentication","children":[]},{"id":"ci_56f68dc0c71e3204414e09dd93b9e7b5136146f477b4e1a939d4ad2562ddb9ac","title":"SAML authentication","path":"/pam-technical-documentation/5.2/saml-authentication","children":[{"id":"ci_8a593bb088a76325b36b9bcd101edb025612c5c89043fab1052cebeb23e7c3f8","title":"OneLogin SAML","path":"/pam-technical-documentation/5.2/onelogin-saml","children":[]},{"id":"ci_e445306ce4af119a917f56421d5378a40a169dfd7fc0505747c717432ec467bd","title":"Okta SAML","path":"/pam-technical-documentation/5.2/okta-saml","children":[]},{"id":"ci_54ab51c0a225d5953e94d35a5020e63b8df6c171a1e6b8045b4c9eabdc62fb9e","title":"Duo SAML","path":"/pam-technical-documentation/5.2/duo-saml","children":[]}]}]},{"id":"ci_a7baeb891f1cfdfa438f6fc61deab892bc5d14b555aa80075bee9ef6738fa093","title":"Securing & Monitoring Sessions","path":"/pam-technical-documentation/5.2/securing-monitoring-sessions","children":[{"id":"ci_1a8118f6971715f8d1131bf09685b0ec49f04efbd542a043494d40a7d70b1d52","title":"Configuring a Session Proxy & Web Session Proxy","path":"/pam-technical-documentation/5.2/configuring-a-session-proxy-web-session-proxy","children":[]},{"id":"ci_7e1d6a02b32317f53ddea93dfa5aa428f272a834ab77bb162c0ec69543044ffa","title":"Configuring Jump Host","path":"/pam-technical-documentation/5.2/configuring-jump-host","children":[]},{"id":"ci_ea7b2d6cd60aa6737ede98ac95c6e4a64cebccbda538a6b9c9a217d95ead9edb","title":"Configuring SSHD Proxy","path":"/pam-technical-documentation/5.2/configuring-sshd-proxy","children":[]},{"id":"ci_64ba9aaf68c34c2ebe0b80d8d71136bacad24359bf647a75393d3973367e98a3","title":"Configuring RDPD Proxy","path":"/pam-technical-documentation/5.2/configuring-rdpd-proxy","children":[]},{"id":"ci_f495b2764c1e24ac540498a0ae472b0f6b912f91c57517f03c1ea80e4cd30d48","title":"Configuring Remote Session Host","path":"/pam-technical-documentation/5.2/configuring-remote-session-host","children":[]}]},{"id":"ci_5d0f29f2eb74c57b8e6ad783d5645a4ea41ea8b8868f6a0055718a9d8b9fe683","title":"Integrating Ticketing Systems","path":"/pam-technical-documentation/5.2/integrating-ticketing-systems","children":[{"id":"ci_fff2abab121102a45c44a9e335df903a5a3966214c22e14d5679fe81963168ae","title":"Jira Cloud","path":"/pam-technical-documentation/5.2/jira-cloud","children":[]}]},{"id":"ci_a3c8eaab780ae9a80cda28bc6b2e57d31021458e1071e6a32ccbe013697f36b8","title":"Configuring Multi-factor authentication","path":"/pam-technical-documentation/5.2/configuring-multi-factor-authentication","children":[{"id":"ci_9a89c3bf41ae218cb471aa18ffa6ceec0acb5cc3ce3e5e1db129419000711d5f","title":"Sectona MFA","path":"/pam-technical-documentation/5.2/sectona-mfa","children":[]},{"id":"ci_4fcba168818e9df2a77f18397aea96580fada5c4bbd7a70cfc4dd3d035ccb0a6","title":"DUO MFA","path":"/pam-technical-documentation/5.2/duo-mfa","children":[]},{"id":"ci_36ee5b4ae36d98504ba94b0fe5996ff9793ff317d537f90c2ea1944985da993f","title":"Okta MFA","path":"/pam-technical-documentation/5.2/okta-mfa","children":[]},{"id":"ci_96c2506c913ebe6f8480fa510ad9148f21f8e5f1a191b000b6edf1257c0e3806","title":"OneLogin MFA","path":"/pam-technical-documentation/5.2/onelogin-mfa","children":[]},{"id":"ci_99cf42042b1b2e3fb1c13f4421705753dd5cf767033244946afb3f459f955af6","title":"Google Authenticator","path":"/pam-technical-documentation/5.2/google-authenticator","children":[]},{"id":"ci_220b5de37356ff34f02951258c0a2744abc6b03a3c50b7de51a3fa632f02c858","title":"RSA SecureID","path":"/pam-technical-documentation/5.2/rsa-secureid","children":[]},{"id":"ci_2833942eb12aee9c75bb5773e939184cc1f27d6cc708484ec7951f664b20514a","title":"Vasco","path":"/pam-technical-documentation/5.2/vasco","children":[]},{"id":"ci_65e6b77fd9cd4a124d73069319b67a0da371052e353cc40db48383b591ade3af","title":"Generic RADIUS","path":"/pam-technical-documentation/5.2/generic-radius","children":[]},{"id":"ci_788a2e72f45579903b2ee0ed5a6ffcd3880400612b9f5d3810dbf7db75a1c810","title":"Microsoft Authenticator","path":"/pam-technical-documentation/5.2/microsoft-authenticator","children":[]},{"id":"ci_db748226863e6084dbbd5b9bead8a539a733594727bfc06eb69fbfb3251f29cc","title":"FIDO2","path":"/pam-technical-documentation/5.2/fido2","children":[]},{"id":"ci_9205f2eafd96ffb93507e17368487f512a396c1d43f609ec4736b860f3550395","title":"Biometric","path":"/pam-technical-documentation/5.2/biometric-authentication","children":[]}]},{"id":"ci_2ddd405839b68f9b731f828f5109f9abd5a56d9c9c63defb52dc1a483e5ec37a","title":"Working with multi-tenant environment","path":"/pam-technical-documentation/5.2/working-with-multi-tenant-environment","children":[]},{"id":"ci_713fb2ca1d42090db6fd0893757aedda130b2360f31b5adb6a9fd896fc1061ff","title":"Configuring Satellite Vault for break glass","path":"/pam-technical-documentation/5.2/configuring-satellite-vault-for-break-glass","children":[{"id":"ci_0e0dfe377df9f9dbc259230b0dd1cbd05d05faaf014582d944dea841eb634a43","title":"Accessing Satellite Vault","path":"/pam-technical-documentation/5.2/accessing-satellite-vault","children":[]}]},{"id":"ci_1112ee4a410fc0d081b960cb6eb491caa6f8bce9b12ccb6e17a5236f00621a5b","title":"Backing up, Restoring, and Archival","path":"/pam-technical-documentation/5.2/backing-up-restoring-and-archival","children":[]},{"id":"ci_153b5d758f35df5a0c957638ae1d1a8fd58bda32e3ffb7be35b62ecdcca4e76b","title":"Configuring Notifications","path":"/pam-technical-documentation/5.2/configuring-notifications","children":[{"id":"ci_57c8aadba4ffe60904ae167ea7b5cba16e23831bbbe2191e45caeca27dd010fc","title":"Key concepts & Capabilties of Notification Service","path":"/pam-technical-documentation/5.2/key-concepts-capabilties-of-notification-service","children":[]},{"id":"ci_387f2650420c825419a07cb46a71674dfec4b37cf6c58779636c8b1f7fb24c28","title":"Architecture & flow of Notification Service","path":"/pam-technical-documentation/5.2/architecture-flow-of-notification-service","children":[]},{"id":"ci_5ddcd7d0f3af10034db01ae84a71c896f0ec016fbaaea4d4b1163fd0c0d2c598","title":"Using Notification templates","path":"/pam-technical-documentation/5.2/using-notification-templates","children":[]},{"id":"ci_c00d869b3e66044f9563b770066e45dc0e8002c8e891bf88d208363ad386fdad","title":"Setting up Notifications","path":"/pam-technical-documentation/5.2/setting-up-notifications","children":[]}]},{"id":"ci_d381f91b905572feaccfacf44c9db08665028b8fcb12d7ab4c331001807107e7","title":"Forwarding Logs","path":"/pam-technical-documentation/5.2/forwarding-logs","children":[]}]},{"id":"ci_9002119b01cbc42f90c595509154aa5ba10d9ea6dca1ebc0c089fc8b7a682160","title":"Administer","path":"/pam-technical-documentation/5.2/administer","children":[{"id":"ci_e4bab54b2929c8ce93281c507a2d449536b99fefa6d2910936302ea8cc81bd07","title":"Running discovery","path":"/pam-technical-documentation/5.2/running-discovery","children":[{"id":"ci_7fe59f74b61ac62da5aaa09ef31f4ab8c7a25d96e1c6da68c4ce002e5d95414f","title":"Setting up asset discovery","path":"/pam-technical-documentation/5.2/setting-up-asset-discovery","children":[{"id":"ci_a4802aa80506f482b66d77a991b0eaf964bd000f4e56f7ded81869d0fc845db0","title":"VMware workloads","path":"/pam-technical-documentation/5.2/vmware-workloads","children":[]},{"id":"ci_ecb57fc83aa3dad8a3210de81012cadde471e3969d110648ee974981a5ce39d3","title":"Google Cloud","path":"/pam-technical-documentation/5.2/google-cloud","children":[]},{"id":"ci_3b85655c1b8c49cfca54fa1a1abc0092f272f298fea13453fabeba72a596491a","title":"Active Directory (AD)","path":"/pam-technical-documentation/5.2/active-directory-ad","children":[]},{"id":"ci_2add5acd60aa57082c1bb0214a54266f385af24671695068f1bdebde34a86ae4","title":"Network scan","path":"/pam-technical-documentation/5.2/network-scan","children":[]},{"id":"ci_719538b3b3c004e3905a7813498b2fdf8a1a777ccf634adcbf356b237a1f8bc2","title":"Amazon Web Services (AWS) resources","path":"/pam-technical-documentation/5.2/amazon-web-services-aws-resources","children":[]},{"id":"ci_d9d568ef1842a57550d03619c5e4e29d294b9e1234840ddc6d7ba07c871ca25e","title":"SNMP Discovery","path":"/pam-technical-documentation/5.2/snmp-discovery","children":[]},{"id":"ci_1840ed813da4f18ea4ed52ff038567bec399e2cb76e45a096da191cc74d537ae","title":"Hyper-V Asset Scan","path":"/pam-technical-documentation/5.2/hyper-v-asset-scan","children":[]},{"id":"ci_78f057a84ce4eb0cc4f120cb33388a2f5a3e32a796c22490cb18142f84638f63","title":"Microsoft Azure Resources","path":"/pam-technical-documentation/5.2/microsoft-azure-resources","children":[]}]},{"id":"ci_21ca5ed79c4275b1ebfbb08d5cb8bd4e88f3c9e419b6ef83636844c6c89e40fc","title":"Handling assets and accounts manually from discovery","path":"/pam-technical-documentation/5.2/handling-assets-and-accounts-manually-from-discove","children":[]},{"id":"ci_59cdacbc331cf4d7f50d5826e1789096201a56d3832b5488fe731fcc9f6b15aa","title":"Schedule account discovery jobs","path":"/pam-technical-documentation/5.2/schedule-account-discovery-jobs","children":[]},{"id":"ci_a9dca8780e2af2a5c5ea2fc407ab3d854eff6fcafd76b89d72e5567e3e491a2b","title":"Configuring credentials","path":"/pam-technical-documentation/5.2/configuring-credentials","children":[]},{"id":"ci_b075f1fe11265d7e15a2a7b41039c3d5e6ef7bad43eec2438e8fb0e69cc181fe","title":"Viewing Discovery Map","path":"/pam-technical-documentation/5.2/viewing-discovery-map","children":[]}]},{"id":"ci_ffd800c2b818fa5be17fcef85354b5f76c16b512397c4ee617cbafb1c86ad2e5","title":"Managing assets & access types","path":"/pam-technical-documentation/5.2/managing-assets-access-types","children":[{"id":"ci_9ced11f2df95e1cb06545027eddbe6d2c4a4751a565a5c1197fc1e53ed8c3c54","title":"Adding assets in the system","path":"/pam-technical-documentation/5.2/adding-assets-in-the-system","children":[]},{"id":"ci_2860b7fb43af7ea3f621bf63eb1deb283a1cb03d0f53b80f7a148beda105c786","title":"Managing access types","path":"/pam-technical-documentation/5.2/managing-access-types","children":[]}]},{"id":"ci_e1554a14cff5882823507ad6e73e0de0e6faf75d8a928ea997eb9a9c5ee8f98d","title":"Configuring a Kubernetes Cluster","path":"/pam-technical-documentation/5.2/5-configuring-a-kubernetes-cluster","children":[]},{"id":"ci_7a3ed3a13e432b35c49d09c9a4c62862490ae2a0a3fc89e229bff961bc10cd1f","title":"Managing accounts & keys","path":"/pam-technical-documentation/5.2/managing-accounts-keys","children":[{"id":"ci_b404bcd329b63ff5f909370e648f3a48f6466b4c98b3d3b2fd69f9ff5ace3785","title":"Onboarding accounts in vault","path":"/pam-technical-documentation/5.2/onboarding-accounts-in-vault","children":[]},{"id":"ci_e0db4f3a361ec1414340b70e8aac119cf0e6c7da84c8d6816186ccd706ec34c1","title":"Managing account operations","path":"/pam-technical-documentation/5.2/managing-account-operations","children":[]},{"id":"ci_d20b477772d8ab3bb9f9337b41953086a9ec9549fb6a2c633a317fe24a2e4682","title":"Working with account groups","path":"/pam-technical-documentation/5.2/working-with-account-groups","children":[{"id":"ci_5f5b41ffd5c00862ec3cf724325dd99e748e2bb21f206caabeda898fd61bc467","title":"Account group management","path":"/pam-technical-documentation/5.2/account-group-management","children":[]},{"id":"ci_789de10b71dac95b4e864c7c7c566501f55a0fa072f4ba6e8e46a14b3089af2d","title":"Account group operations","path":"/pam-technical-documentation/5.2/account-group-operations","children":[]}]}]},{"id":"ci_7f8cdaf86fe803a8982c055a2df74e5293836a4d637b8a345b99a35fecb1b5ec","title":"Managing user & authentication","path":"/pam-technical-documentation/5.2/managing-user-authentication","children":[{"id":"ci_aca4c66f6c184e8d3a55e3aac55170bc0d3246be2f00630e8fd2cda6747b7803","title":"Assigning policy-based access to users","path":"/pam-technical-documentation/5.2/assigning-policy-based-access-to-users","children":[]},{"id":"ci_48fe059213e3472310fca64544e92f99d777a3a17b86c0379f26dacddd4e5f3d","title":"Adding users in the system","path":"/pam-technical-documentation/5.2/adding-users-in-the-system","children":[]},{"id":"ci_4f3ec8c7872fdde234bacf79674bc04c304d2563d456472d912152f0c60dd129","title":"Managing user roles","path":"/pam-technical-documentation/5.2/managing-user-roles","children":[]},{"id":"ci_e4a7bfb9f837cf2d70bcafc3dd59c1fa7a953673eb9f47bff8b9a789dbf1b3b4","title":"User authentication settings","path":"/pam-technical-documentation/5.2/user-authentication-settings","children":[]},{"id":"ci_3411974cf301339880b84548586cb6229d7a84581ad08ddb852353de29374700","title":"Defining user groups","path":"/pam-technical-documentation/5.2/defining-user-groups","children":[]},{"id":"ci_4630209650aaf8d1b45ca0720e278100d005e9cba5fefef37321457446b9fe87","title":"Setting up user access policy","path":"/pam-technical-documentation/5.2/setting-up-user-access-policy","children":[]},{"id":"ci_3ade2ad2ad400bf44913f2ad14153bdd22442afc7cd3246d3aa2a33d68d01d62","title":"Setting up Logon Policy","path":"/pam-technical-documentation/5.2/setting-up-logon-policy","children":[]},{"id":"ci_13ba0522c03222b587ff0eb2b50664209ef0e5d0249ccbbd56b2a7a832747315","title":"Managing user operations","path":"/pam-technical-documentation/5.2/managing-user-operations","children":[]}]},{"id":"ci_781c85d9d604c99fd84868888996775fb8ea28fb9f40545f9bb8b0e818051366","title":"Setting up password management","path":"/pam-technical-documentation/5.2/setting-up-password-management","children":[{"id":"ci_fc7a847e4f1529674e4e31888ca2e34681227411847b3db7ef0d0151665152b5","title":"Configuring password rotation policy","path":"/pam-technical-documentation/5.2/configuring-password-rotation-policy","children":[]},{"id":"ci_4cf005c81eaea5d78ff0edf225432fcca4f4f76b667bb4729b98cb663b0d963d","title":"Configuring reconciliation policy","path":"/pam-technical-documentation/5.2/configuring-reconciliation-policy","children":[]},{"id":"ci_77a1c3e9d322026e1874919af15f489c7beaf724bc674a70476568c6d3827fd9","title":"Configuring password checkout policy","path":"/pam-technical-documentation/5.2/configuring-password-checkout-policy","children":[]},{"id":"ci_e37abd8cd71881cfce9c817f1f0b6444baff41e4697215aec7bb12c3e7210aae","title":"Configuring password policy","path":"/pam-technical-documentation/5.2/configuring-password-policy","children":[]},{"id":"ci_2e7e42d643a91e49660f08543de2e1fa89d09588e1ec9d354b653c656411bb5a","title":"Configuring management account","path":"/pam-technical-documentation/5.2/configuring-management-account","children":[]}]},{"id":"ci_297dc4253a009dfbd132bf553ca8bc35fe00692b93f82df98037736363f8e816","title":"Enabling Just-in-time Access","path":"/pam-technical-documentation/5.2/enabling-just-in-time-access","children":[{"id":"ci_aa155d05a7abaa6589a4e6109051a5629dfd8dcd2bf86c4da01f098b83dcd763","title":"Windows platforms","path":"/pam-technical-documentation/5.2/windows-platforms","children":[]},{"id":"ci_661878dd1370ec25449ae7d5226731fd6b08bee27b08111db8268c92f6501c20","title":"Unix platforms","path":"/pam-technical-documentation/5.2/unix-platforms","children":[]}]},{"id":"ci_ceb51248a39ed832008e6313963568b6dff7b6702800a79fffc944a7a5761999","title":"Workflow-based access","path":"/pam-technical-documentation/5.2/workflow-based-access","children":[{"id":"ci_13568877ea534f5a069c5f4c697e77d219467537644cb143bc3c1b0fccbd44d3","title":"Enabling Maker Checker","path":"/pam-technical-documentation/5.2/enabling-maker-checker","children":[]}]},{"id":"ci_714cc43a84e3aba2138cd07e31ef4f401644e0e386db8503cf9876911fb984c4","title":"Managing & reviewing session Logs","path":"/pam-technical-documentation/5.2/managing-reviewing-session-logs","children":[{"id":"ci_8960dc334c0deffc6bcd133b29708de315489476fec06a8f61cbe25506664b1a","title":"View Session Recordings","path":"/pam-technical-documentation/5.2/view-session-recordings","children":[]},{"id":"ci_f203a684c5f3bf713cc2cf1d957bcb73948b209244a713dc212ba0db9726370d","title":"Viewing password checkout history","path":"/pam-technical-documentation/5.2/viewing-password-checkout-history","children":[]},{"id":"ci_1004f0b5045dd504d39c64ffe2e7b3d4fe8a8190e7bc8feb312ff3eb5fe7ddd4","title":"Viewing Live Sessions","path":"/pam-technical-documentation/5.2/viewing-live-sessions","children":[]},{"id":"ci_0405841bb9a9c20217ddc1ba6a0a06a5ce4e2044bed4ce54d3a33f238038deea","title":"Reviewing sessions","path":"/pam-technical-documentation/5.2/reviewing-sessions","children":[]},{"id":"ci_7a9deed16f3d9238049d11890014fd65d37642db0b1dc51e5edd4e2300020ccf","title":"Monitoring or terminating live sessions","path":"/pam-technical-documentation/5.2/monitoring-or-terminating-live-sessions","children":[]},{"id":"ci_11bf4dbd76bddacfca81bd3f0811b7e8980cead1ae5cf782733773a8aaa99222","title":"Adjusting session risk scoring & threat analytics parameters","path":"/pam-technical-documentation/5.2/adjusting-session-risk-scoring-threat-analytics-pa","children":[]}]},{"id":"ci_1ec2bf2bb2083edb000af65e03ed4dc071398e34a6c8597682c5c1b950e13651","title":"Managing server privileges","path":"/pam-technical-documentation/5.2/managing-server-privileges","children":[{"id":"ci_a3cf958d2e5620eea4fd257e227491b355e9b694d447a11473e47a62507802b6","title":"Command Restriction for SSH","path":"/pam-technical-documentation/5.2/command-restriction-for-ssh","children":[]},{"id":"ci_2cf4d21d131a2a0445c0d8362456d71ef4e2a48da4343c02e4e9665f768c0e9e","title":"Application Control for Windows","path":"/pam-technical-documentation/5.2/application-control-for-windows","children":[]},{"id":"ci_1376284d61ce725d9823701c99129e0e05e14e92f8a16d986a1b919da5a7fdec","title":"Database Query Restriction","path":"/pam-technical-documentation/5.2/database-query-restriction","children":[]}]},{"id":"ci_c973e95d1979483b1a0fd93303a48aac2fc39201811e88ed90ae4cfb5a8e36f9","title":"Reporting & analytics","path":"/pam-technical-documentation/5.2/reporting-analytics","children":[{"id":"ci_a4c62e2531ba2a9cdf88d3c3e2d378684287395058a8c0e92ca0138d48fb348c","title":"Viewing & exporting reports","path":"/pam-technical-documentation/5.2/viewing-exporting-reports","children":[]},{"id":"ci_ebf57c4a256e7b5b30f44fae6dc641c54c2adfc3b4cd98420a34f953e4a7d385","title":"Scheduling a Report","path":"/pam-technical-documentation/5.2/scheduling-a-report","children":[]},{"id":"ci_21715e1b446c68abab141780d59e063c4d41c47e0321f275e5a0941491459d2c","title":"Designing & customizing reports","path":"/pam-technical-documentation/5.2/designing-customizing-reports","children":[]}]},{"id":"ci_71fff3eb8b47fb7e1f9b970b22e2603a9becf4f7c3be132aac1c86de3d76cfdb","title":"Automating Privileged Tasks","path":"/pam-technical-documentation/5.2/automating-privileged-tasks","children":[{"id":"ci_82f3c455d5e630ea0220ec64141f2f03b18db3b057ae34b5a4d96c3a440f176b","title":"PTM key concepts & capabilities","path":"/pam-technical-documentation/5.2/ptm-key-concepts-capabilities","children":[]},{"id":"ci_e3dd41bfbaeae4fef72dfa0a31131d1f2cbcfceb9c5d048038dfdc5564bef611","title":"Architecture, flow, & advantages of PTM","path":"/pam-technical-documentation/5.2/architecture-flow-advantages-of-ptm","children":[]},{"id":"ci_10b66c8d5fe41f9ef68d987f5461f1c1e13559b25567e10ceb6de1985632ddb3","title":"PTM Libraries","path":"/pam-technical-documentation/5.2/ptm-libraries","children":[]},{"id":"ci_ba1a208e520cf24679f2eec6f1c8a220b56ea0988405fdf8dea7aa0b1b74fea3","title":"Configuring Tasks","path":"/pam-technical-documentation/5.2/configuring-tasks","children":[]}]},{"id":"ci_ba32610b28cfdbdc121286f4524e72ad295f175063fc1262b5e18577c434d31e","title":"Account Lifecycle Management","path":"/pam-technical-documentation/5.2/account-lifecycle-management","children":[{"id":"ci_bae2fccbb2169cad191076a8121c0786f1e12c922a85152b72668d6ed5889373","title":"Account Provisioning","path":"/pam-technical-documentation/5.2/account-provisioning","children":[]},{"id":"ci_d8f2eb45aa9713b957ea1c06f7704bf1412ff2585d03736f531893a8bde4dd31","title":"Manage Provisioned Accounts","path":"/pam-technical-documentation/5.2/manage-provisioned-accounts","children":[]}]},{"id":"ci_16024879e3cb1cd31036f7867992dc706058d5d2246c743d1c73daad1c2343ba","title":"Managing the system","path":"/pam-technical-documentation/5.2/managing-the-system","children":[{"id":"ci_ddf9d330dc53f1eb071f79dbff795b8f0177d05cc936f392307b8a953afbdbe7","title":"Auditing system changes","path":"/pam-technical-documentation/5.2/auditing-system-changes","children":[]},{"id":"ci_ca4dae648050ce68d7edd63ae9c4cc0eb84740d4fe3ef5dae2d103c9c631046c","title":"Using troubleshooting utilities","path":"/pam-technical-documentation/5.2/using-troubleshooting-utilities","children":[]},{"id":"ci_fb23174deb93a046cdb4946fc2da39f49a85574c15d8631fcbdaf51f096cb417","title":"Monitoring System Health & Service Status","path":"/pam-technical-documentation/5.2/monitoring-system-health-service-status","children":[]},{"id":"ci_bfe6a11fb732db0ba22385b843850f52f8b9086df20c4c84b64b2694fbfc378e","title":"Dashboard","path":"/pam-technical-documentation/5.2/dashboard","children":[]},{"id":"ci_4795f2ec644ecf514488a6c5c174bb7da0fc56cb24a5d4b74da415acb80556dc","title":"Managing Licenses","path":"/pam-technical-documentation/5.2/managing-licenses","children":[]}]},{"id":"ci_735093bf9b93f9848de632813519dbc617bcfb40f014b6b1f5df2e0411137675","title":"Integrating HTTP/s Applications","path":"/pam-technical-documentation/5.2/integrating-http-s-applications","children":[]},{"id":"ci_ab543cb1578c6acdfedfdb442dcf1c54ba0071356e4a08d55fdffac21229be15","title":"Windows Monitoring Agent","path":"/pam-technical-documentation/5.2/windows-monitoring-agent","children":[]}]},{"id":"ci_94ae5fcec191d225d0d9ed833f5d924afd635aaa84106f93b97795fb4586ead3","title":"Develop","path":"/pam-technical-documentation/5.2/develop","children":[{"id":"ci_a08b17ca22f9a438f764703f340c16160eadc9682fb6eef97fa52b8c0fd24563","title":"HTTP POST Headers","path":"/pam-technical-documentation/5.2/http-post-headers","children":[]},{"id":"ci_fb6d13c0e2935a28b53a0550747b40c0cbaec1e88868fe30da38ffeeecbecc59","title":"Management APIs","path":"/pam-technical-documentation/5.2/management-apis","children":[{"id":"ci_e5bce4df7023d7853967cf0afc7293cf02385830376e3208218591d70362927e","title":"API - Manage User","path":"/pam-technical-documentation/5.2/api-manage-user","children":[]},{"id":"ci_6d75f7e945ac1b7f7b973becd4ce03b94e64d2da69484bd214ea027edb539a32","title":"API - Manage Asset","path":"/pam-technical-documentation/5.2/api-manage-asset","children":[]},{"id":"ci_c26d2983874bdaf9fb6a61ba189bed881fe954ff6426f50b86010e6088b111a4","title":"API - Manage Account","path":"/pam-technical-documentation/5.2/api-manage-account","children":[]},{"id":"ci_12c6041f7c801c326785f22b2c909e391aa0301b28d93b1e4724b794f81e2aca","title":"API - Get Instance Information","path":"/pam-technical-documentation/5.2/api-get-instance-information","children":[]},{"id":"ci_82b38f9b5dae46a244b9a82a3946501c6a840783a39111417e169d8e07dc7c3d","title":"API - Get User Groups Information","path":"/pam-technical-documentation/5.2/api-get-user-groups-information","children":[]},{"id":"ci_709bd15e493e8a579bf567d1f9229830bab711f149bf06a831eb868bbca4b4a2","title":"API - Get Users by Group","path":"/pam-technical-documentation/5.2/api-get-users-by-group","children":[]},{"id":"ci_13509e2cee2174be8afbe7bdcc7343fb1ad5e9291365468d0e0f5f05eb855700","title":"API - Get Users Information","path":"/pam-technical-documentation/5.2/api-get-users-information","children":[]},{"id":"ci_a5644dc8b6b3bf272c6d107f22ab5830b1113ff61cc093c5d047af88d0e19ce6","title":"API - Map, Un-map User with User Group","path":"/pam-technical-documentation/5.2/api-map-un-map-user-with-user-group","children":[]},{"id":"ci_883b0d898c0cdeb9abf3dcf0e35cff57a4db270e5eb9538b8ca2ffdd924e29ef","title":"API - Get Assets","path":"/pam-technical-documentation/5.2/api-get-assets","children":[]},{"id":"ci_07deb9b4f9ac8b5e9fe9e03cf3c7eac9ffd6ca582e1be15bff38353650d56e4a","title":"API - Get Account Groups","path":"/pam-technical-documentation/5.2/api-get-account-groups","children":[]},{"id":"ci_bcaef5323f31a7e2725c54fec3977a8b786199a226282a7280eb46436b925ff0","title":"API - Get Accounts by Asset","path":"/pam-technical-documentation/5.2/api-get-accounts-by-asset","children":[]},{"id":"ci_0942c31117d120ed1aaa196dffb031bb4cdc4be8ee4b1b693dbf2d201d90a66d","title":"API - Get Accounts by Account Groups","path":"/pam-technical-documentation/5.2/api-get-accounts-by-account-groups","children":[]},{"id":"ci_4e0f407e46cc72881453262aa2938491995fe9bc32b4ff4bac937888fa0932ed","title":"API - Map Un-map Account with Account Group","path":"/pam-technical-documentation/5.2/api-map-un-map-account-with-account-group","children":[]},{"id":"ci_35df1ffe5f343f25a0fbcb7a0b933038f0201480c5443cc4ae886a4f71718587","title":"API - Get Entitlement","path":"/pam-technical-documentation/5.2/api-get-entitlement","children":[]},{"id":"ci_9db9cb73e3cb3313553883bbf530d96df99abcd652232e3b9fac16495551260e","title":"API - Get Discovered Accounts","path":"/pam-technical-documentation/5.2/api-get-discovered-accounts","children":[]},{"id":"ci_fbf45afc59d2e1b20f36369ba47401d44eaa5b9b47b9d5bc7d2d274b4239eafd","title":"API - Get Discovered Assets","path":"/pam-technical-documentation/5.2/api-get-discovered-assets","children":[]}]},{"id":"ci_1018cbb88150459e96770f17cdd6edc7216ebfe34cca2c4572a33f54b32b8877","title":"Vault Password API Headers","path":"/pam-technical-documentation/5.2/vault-password-api-headers","children":[]},{"id":"ci_2de968935fba556d105851f6a3c74c30624648a1e24d2e7d9cee2e328b753bcf","title":"Password Vault APIs","path":"/pam-technical-documentation/5.2/password-vault-apis","children":[{"id":"ci_be19862d655d724e2c83923c1f814d5165fb0344b58eff385c40d19a7aea09b3","title":"API - Password Vault","path":"/pam-technical-documentation/5.2/api-password-vault","children":[]}]},{"id":"ci_39814b881c8a8861c4f4720883f6a1047aaccf24379ccc1e44d98d084b6d54e3","title":"Response Error Codes","path":"/pam-technical-documentation/5.2/response-error-codes","children":[]}]},{"id":"ci_3a48cbc031dd41e5dc8511df48646bfc7a7ea8a4ed28a5080fc0420579f3a131","title":"Use","path":"/pam-technical-documentation/5.2/use","children":[{"id":"ci_11269758469c66d3ea52bf497855b11001c83da33a5fee2e4c6f83a6335c3f79","title":"Launching the product","path":"/pam-technical-documentation/5.2/launching-the-product","children":[]},{"id":"ci_6047d78b269b78e3706d6b772e0e2ff2c662e0612faf2e44aa06574c78621b08","title":"Accessing a Target Asset","path":"/pam-technical-documentation/5.2/accessing-a-target-asset","children":[{"id":"ci_a705ded9180460fb72f8df415505dc8c5dacbc4b7e06db54a0fcd69445c14c60","title":"Working with assets","path":"/pam-technical-documentation/5.2/working-with-assets","children":[]},{"id":"ci_17320c2e43dbb50aefb6ec1800f6d96864a776e09170490cd8e13e21d319e6be","title":"Working with accounts","path":"/pam-technical-documentation/5.2/working-with-accounts","children":[]},{"id":"ci_c6bed5e241fde073016c40ea39520489e8c3b3844accf72ae6799fff01419072","title":"Collaborating session","path":"/pam-technical-documentation/5.2/collaborating-session","children":[]}]},{"id":"ci_9a298d8b8f4d4d71c338d15e39fb6470f54feb5a0668953fd5f0d113449f6591","title":"Using workflow","path":"/pam-technical-documentation/5.2/using-workflow","children":[{"id":"ci_a05fbd6ecae5cb415416b558adc4f0e4270bc9352b5550807b113d6744230acd","title":"Raising a request","path":"/pam-technical-documentation/5.2/raising-a-request","children":[]},{"id":"ci_0e908d02cc029cc108cd0d8e8421f2d38a0af5596dbb84489ef74818fe77ec5a","title":"Managing approvals","path":"/pam-technical-documentation/5.2/managing-approvals","children":[]}]},{"id":"ci_7c2dadc8f549e9d89950843c801873aa98d6dc8d08655f411b4364d39cc90b8e","title":"Executing tasks","path":"/pam-technical-documentation/5.2/executing-tasks","children":[]},{"id":"ci_551d68752791a3fe4e36ae5a393e7ef209042a6a2ced87dc14dd5a43a2d31d5d","title":"Accessing secrets during break glass","path":"/pam-technical-documentation/5.2/accessing-secrets-during-break-glass","children":[]}]}]