[{"id":"ci_e9c6b4d68143fdf31798e739f75c70305f0ace9fb40bc3a7ace7b0ea72268bd3","title":"Getting Started","path":"/pam-technical-documentation/5.3/getting-started","children":[]},{"id":"ci_bdcb73d84779b3dc697eb110be2c5ba53c31ff8b9ef4be17b3927371a4dc6098","title":"Release Notes","path":"/pam-technical-documentation/5.3/release-notes","children":[{"id":"ci_9f1a317b1452797764e0f2eb7004e208a0f96cfd06dd0c99b9560c79170ac4ec","title":"Version 5.3.0","path":"/pam-technical-documentation/5.3/version-5-3-0","children":[]}]},{"id":"ci_b4d57468eaf03854314140b3410bc8c0e1ca29e6aceb1aa1dc8e017d6a39e31a","title":"Installation & Setup","path":"/pam-technical-documentation/5.3/installation-setup","children":[{"id":"ci_1f4f741b737faf580d7e211659bb5e8b07b823c199cac1159327c89ec5bd02a2","title":"Planning to Deploy","path":"/pam-technical-documentation/5.3/planning-to-deploy","children":[{"id":"ci_c4a3c0516e1de1dc95ed80f6da3f5f3ff6b46dac24526829c2c2b990a9857ad8","title":"Service Architecture Overview","path":"/pam-technical-documentation/5.3/service-architecture-overview","children":[]},{"id":"ci_13466671ad522a9895474d5a8ba700eaa5b1d2837f5c927161d1f4c1af2c8371","title":"System Requirements","path":"/pam-technical-documentation/5.3/system-requirements","children":[]},{"id":"ci_493b502345fea0792ee2129031cc626abfd9475a886f1c26aeba926e160e1f9e","title":"Deployment Scenarios","path":"/pam-technical-documentation/5.3/deployment-scenarios","children":[]},{"id":"ci_f3d78ed6b48bb7ca50096037a9547fc6b8368d9082dd03d42754bd98d9e815fa","title":"Setting up test environment","path":"/pam-technical-documentation/5.3/setting-up-test-environment","children":[]},{"id":"ci_9f6b17483d5c088e7f89efc7bffdc3a77b512bd1e4bf205a2ed7f329ebb45b78","title":"Standard Port Requirement for Installation","path":"/pam-technical-documentation/5.3/standard-port-requirement-for-installation","children":[]}]},{"id":"ci_fe847571343b929e221c0d8a790c5744d1090c49111550a80a8e4a1185b284ad","title":"Installing Sectona Components","path":"/pam-technical-documentation/5.3/installing-sectona-components","children":[{"id":"ci_eb4ddbef518629dbc43754330c65f8b60fa04830227a7572939c9146518b7092","title":"Installing Vault Component","path":"/pam-technical-documentation/5.3/installing-vault-component","children":[]},{"id":"ci_8c762d6d59671ae1311db939372725296048a50f02524bd0a241ed42d2d91a9c","title":"Installing Sectona Web Access","path":"/pam-technical-documentation/5.3/installing-sectona-web-access","children":[]},{"id":"ci_250e0853ee5bffb77dd703ff79b70a1efae7d8458dd580e3d2d08fecc8c532a2","title":"Installing Sectona Jump Host Component","path":"/pam-technical-documentation/5.3/installing-sectona-jump-host-component","children":[]},{"id":"ci_0135679e871ff46fb9212053ad35268b9b9f18c82656387fdb2fba0db8794afe","title":"Installing Sectona File Synchronization Component","path":"/pam-technical-documentation/5.3/installing-sectona-file-synchronization-component","children":[]},{"id":"ci_9d75bb7414f22c7dbf8ac0bbc4064a86c59c3f6fff6ab857429a56240dca7803","title":"Installing Session & Web Session Proxy Component","path":"/pam-technical-documentation/5.3/installing-session-web-session-proxy-component","children":[]},{"id":"ci_fa6758508e079f92d2fce2806541b891b8b0b98165ec5fabb098f2d3571ac477","title":"Installing Sectona Satellite Vault Component","path":"/pam-technical-documentation/5.3/installing-sectona-satellite-vault-component","children":[]},{"id":"ci_69f654c219532c75c5bb0987f9520589db1585b41b0a93cd559eaf21075872f7","title":"Installing Sectona Vault API Extension","path":"/pam-technical-documentation/5.3/installing-sectona-vault-api-extension","children":[]},{"id":"ci_7e499f78c55a82f82aca09dd0036373090abfb67d3c5e5e9f3d0a45f4f70741f","title":"Installing Sectona Client App","path":"/pam-technical-documentation/5.3/installing-sectona-client-app","children":[]},{"id":"ci_2bd40f33c2cf82e4f432df9d3b0b2cfd5ba468c39451c38f877ac452781df623","title":"Installing Sectona Windows Monitoring Component","path":"/pam-technical-documentation/5.3/installing-sectona-windows-monitoring-component","children":[]},{"id":"ci_f5b7891063cb9c62e3244c72b4246b76c75625eb3d32bdffc64388851e33199c","title":"Installing Sectona Launcher","path":"/pam-technical-documentation/5.3/installing-sectona-launcher","children":[]},{"id":"ci_0f81d3798613a5d9b62a124084f4da35f0fea7afdbda680b604a49fc7902bda3","title":"Installing Sectona Remote Access Publisher Component","path":"/pam-technical-documentation/5.3/installing-sectona-remote-access-publisher-compone","children":[]},{"id":"ci_4f53b5e018cb2c11fe5a9008a7cc92b0ad92b3b34be64fa2e51ce2bdc46aca17","title":"Installing Sectona Remote Session Host","path":"/pam-technical-documentation/5.3/installing-sectona-remote-session-host","children":[]}]},{"id":"ci_22c8b6f74a2fc04ca8dca4d48660e6e1108bf156851dc3bdacf3a6aee35aeba7","title":"Building a High Availability Setup","path":"/pam-technical-documentation/5.3/building-a-high-availability-setup","children":[{"id":"ci_069f4db7bd62491bb5b9f642aaae26f66f2e5d443df61ace86ebdcd8efcfbbb9","title":"Key Concepts and Components of a High-Availability System","path":"/pam-technical-documentation/5.3/key-concepts-and-components-of-a-high-availability","children":[]},{"id":"ci_463a330bab7724c4e8709691c5f6747e9144e6518c703046984029c49d58b565","title":"Choosing an Architecture for HA & DR Requirements","path":"/pam-technical-documentation/5.3/choosing-an-architecture-for-ha-dr-requirements","children":[]},{"id":"ci_b487c7b6917197d077b4af4894dae7f1504d256a2479df88f300590ab6e3c39f","title":"Configuring Sectona Web Access for High Availability","path":"/pam-technical-documentation/5.3/configuring-sectona-web-access-for-high-availabili","children":[]},{"id":"ci_3e0fef2622b435a8c53b268610c6211fe4af539771987ea5d57b5792df8af5bb","title":"Configuring Vault for High Availability","path":"/pam-technical-documentation/5.3/configuring-vault-for-high-availability","children":[]}]},{"id":"ci_a92aa4788d14a12e7892212f8302cc321940ad109ba7d7260d4a46dc6962f848","title":"Configuring Disaster Recovery Setup","path":"/pam-technical-documentation/5.3/configuring-disaster-recovery-setup","children":[]},{"id":"ci_ddfc38e1e3783f37fb71a549c6769d450152d79f9b4624de545e28069a48905c","title":"Migrating from evaluation to production","path":"/pam-technical-documentation/5.3/migrating-from-evaluation-to-production","children":[]},{"id":"ci_c0e4b41e8ea080a6f45b546d880f6142bf3bc3de2a12b9ed49fcb81437e0c296","title":"Rebuilding your setup","path":"/pam-technical-documentation/5.3/rebuilding-your-setup","children":[]},{"id":"ci_5007e07706d19ffd41cd6207cb44649780837e1b90f92b7ce34676043a7c76d8","title":"Upgrading the System","path":"/pam-technical-documentation/5.3/upgrading-the-system","children":[]}]},{"id":"ci_118bba1a25469aed71fae3d8af253f8b69b111a546bd7f0c0a56cd9497145ed1","title":"Configure & Implement","path":"/pam-technical-documentation/5.3/configure-implement","children":[{"id":"ci_8e32d898d6807001f85b6da09d382030a9bb589ade78b5b222384d44c48b64f7","title":"General Configurations","path":"/pam-technical-documentation/5.3/general-configurations","children":[{"id":"ci_fbb7c5851a53b1b9d70f815b3aaf5fc9de8f0157448def9f97abda1129ad74b3","title":"Customizing web application appearance & site settings","path":"/pam-technical-documentation/5.3/customizing-web-application-appearance-site-settin","children":[]},{"id":"ci_f7acb64e41228645ab37861d412ff5240c4a2c8c9c4b4c09eeadf20b1b161070","title":"Adding new LDAP/LDAPs directory","path":"/pam-technical-documentation/5.3/adding-new-ldap-ldaps-directory","children":[]},{"id":"ci_6f65d6e9c43eb568aac043686532d3c68ea74f91a12d18cb968b8b646f2fcc67","title":"Configuring location tagging","path":"/pam-technical-documentation/5.3/configuring-location-tagging","children":[]},{"id":"ci_abc3921f5bee4f68286126606271edab34ed48af9706707ac22ea522b8eca98b","title":"Defining network zones","path":"/pam-technical-documentation/5.3/defining-network-zones","children":[]},{"id":"ci_d6ddcd9b53a63cdb11d38d63aba3476ba2e4b7ddee88043615355e2b745982f8","title":"Managing video recording settings","path":"/pam-technical-documentation/5.3/managing-video-recording-settings","children":[]},{"id":"ci_6c44897bf61f966c0dcb84f7108042c486098c9a138dcab7cb5bade3a9135bc0","title":"Setting criticality level tags","path":"/pam-technical-documentation/5.3/setting-criticality-level-tags","children":[]},{"id":"ci_6f2bbfbe4811b90873fa7e51eff6b89f856f679a5be36bf2f53c84a5aaabf584","title":"Configure Email settings","path":"/pam-technical-documentation/5.3/configure-email-settings","children":[]},{"id":"ci_7ac21a2f7f3382c5711bb7d328e7b44c371a6aba7d91cd6c8293b68c90c3f2a8","title":"Setting up a network proxy","path":"/pam-technical-documentation/5.3/setting-up-a-network-proxy","children":[]},{"id":"ci_7a536372cc3c7509f73e30be860d472a6f974a1849ab6b68a185d1b294568352","title":"Applying conditions with tags","path":"/pam-technical-documentation/5.3/applying-conditions-with-tags","children":[]},{"id":"ci_eda820686a30c6c74e6a5218f6cdfed0e01563925906fc125937b4d4232aec49","title":"Configuring HTTPs certificate","path":"/pam-technical-documentation/5.3/configuring-https-certificate","children":[]},{"id":"ci_fd251af6d1bd5a0e62ac2f9ae8d64bf6506e343a3c63d6cacac1a2e614c80d97","title":"Updating default system settings","path":"/pam-technical-documentation/5.3/updating-default-system-settings","children":[]}]},{"id":"ci_77871bc7af5c02ccef597cbc4ce8ca6a477333c3612e69e57960cdc846095ab2","title":"Configuring user authentication","path":"/pam-technical-documentation/5.3/configuring-user-authentication","children":[{"id":"ci_fd0f23c034848b50c751afe485967ec3bf6263a24ae346b3686a2869d14e0020","title":"LDAP/LDAPs supported directories","path":"/pam-technical-documentation/5.3/ldap-ldaps-supported-directories","children":[]},{"id":"ci_f2af5ef0fd07f62c2494c43d3fbc769bf26c88614b5982cbd1e5aaac5bd52508","title":"Radius authentication","path":"/pam-technical-documentation/5.3/radius-authentication","children":[]},{"id":"ci_efb659b3356ff6341f2c0f54189dd34b2733ff9d3de0a31e597ce07be9ffc36a","title":"SAML authentication","path":"/pam-technical-documentation/5.3/saml-authentication","children":[{"id":"ci_fc5ac025e80bd75565df989e59bca39257f8536c58f2d11c35cdcb197d1ce01d","title":"OneLogin SAML","path":"/pam-technical-documentation/5.3/onelogin-saml","children":[]},{"id":"ci_d8c6e3673d2d8fff06859649af33d5cea9b2d136dccdd2f82c9964235b67d180","title":"Okta SAML","path":"/pam-technical-documentation/5.3/okta-saml","children":[]},{"id":"ci_dda8e5f90baa3f92e47d39f25a331298af5bcc61b3dd7c329b6bb00d33d4b3b3","title":"Duo SAML","path":"/pam-technical-documentation/5.3/duo-saml","children":[]}]},{"id":"ci_7e27c79d293c5a8a0aaf6cac612f070079f01e21676deeb8a9bc66cbf269da02","title":"Sectona authentication","path":"/pam-technical-documentation/5.3/sectona-authentication","children":[]}]},{"id":"ci_fcb86294e541c04aba57b8f1221610625a631fccac2cad647d2e551ca167f73c","title":"Securing & Monitoring Sessions","path":"/pam-technical-documentation/5.3/securing-monitoring-sessions","children":[{"id":"ci_4e8c799a353e7e2a7868dc0df08efaed7d0f7bfaa4bf9b811e6df554d36beba5","title":"Configuring Jump Host","path":"/pam-technical-documentation/5.3/configuring-jump-host","children":[]},{"id":"ci_e7560f5ce1bcb87e4d410f2cc0b0d1037196904d7a4eeb741e71aa9d05b91308","title":"Configuring SSHD Proxy","path":"/pam-technical-documentation/5.3/configuring-sshd-proxy","children":[]},{"id":"ci_9ea495b3d6256cc3ee6575098d2cbd6ff041ef5bc9a6c75d8d5752c10e68d546","title":"Configuring RDPD Proxy","path":"/pam-technical-documentation/5.3/configuring-rdpd-proxy","children":[]},{"id":"ci_9f336a07fa41a26ed99b3385051e3faf6f785a52f7d665aa9fe16bcdd50398fc","title":"Configuring Remote Session Host","path":"/pam-technical-documentation/5.3/configuring-remote-session-host","children":[]},{"id":"ci_a3c8846da98f051ae537a86868ff3220defe819c6ec1880a4540c0370840bb63","title":"Configuring a Session Proxy & Web Session Proxy","path":"/pam-technical-documentation/5.3/configuring-a-session-proxy-web-session-proxy","children":[]}]},{"id":"ci_9b4f20affeb0d263ba8919ecc0c1fccd59945734f06c60d8c1c7aac4c269e60b","title":"Integrating Ticketing Systems","path":"/pam-technical-documentation/5.3/integrating-ticketing-systems","children":[{"id":"ci_ad80f9c9b4aef0db93e81251b1e5d38ba264153a77d1b3ae477e4e50da472f9c","title":"Jira Cloud","path":"/pam-technical-documentation/5.3/jira-cloud","children":[]}]},{"id":"ci_1c25940afe2fff4cf2e39f9b00bb85024a7971fe377ff8e4b1a5a8a9e7186815","title":"Configuring Multi-factor authentication","path":"/pam-technical-documentation/5.3/configuring-multi-factor-authentication","children":[{"id":"ci_589160f01ae667ba296587b131b344f73940e0e41592206def31dbf72ea5d082","title":"Sectona MFA","path":"/pam-technical-documentation/5.3/sectona-mfa","children":[]},{"id":"ci_b89ac058bf580318a886fe23274ccabec228e8423fb62b8fd633750f8f812117","title":"DUO MFA","path":"/pam-technical-documentation/5.3/duo-mfa","children":[]},{"id":"ci_f7f818543fb2fb705142f25d815839180e6ae604a83799994a90496676e746af","title":"Okta MFA","path":"/pam-technical-documentation/5.3/okta-mfa","children":[]},{"id":"ci_7f7bb6f90e1584b3ef3aff0a3d88d0f8a95f28328f03238fe3ef5d494e3bdbde","title":"OneLogin MFA","path":"/pam-technical-documentation/5.3/onelogin-mfa","children":[]},{"id":"ci_7920b6973d07ec4debb95866c33d33d286e7a498c61d27525d7d9ec087dd209d","title":"Google Authenticator","path":"/pam-technical-documentation/5.3/google-authenticator","children":[]},{"id":"ci_007a4e5cc8e636cd640b0e6af3badc73f5665f36f924b8a1a32dff612eff40a0","title":"RSA SecureID","path":"/pam-technical-documentation/5.3/rsa-secureid","children":[]},{"id":"ci_3fc44cbee017085bbba7834d2168e9b13fb33734a86dd054ce90d9820648ee8d","title":"Vasco","path":"/pam-technical-documentation/5.3/vasco","children":[]},{"id":"ci_c9fc21cd59e77e50afd42c17fd7db836d29e20b0541c4a1387df2da06a8884a2","title":"Generic RADIUS","path":"/pam-technical-documentation/5.3/generic-radius","children":[]},{"id":"ci_b26e9a3ebf67818e06f923d83e3558a6890d2862dec6d87991aa85c1ffdaae2e","title":"Microsoft Authenticator","path":"/pam-technical-documentation/5.3/microsoft-authenticator","children":[]},{"id":"ci_98e99c7d4b5b92e487876f2ce2fee79dbaf61cef16cff5f13235b41836b02f0d","title":"FIDO2","path":"/pam-technical-documentation/5.3/fido2","children":[]},{"id":"ci_4feadc696baa1b57d1422f644678a86627d9a838c23282631c2af3784edac76f","title":"Biometric","path":"/pam-technical-documentation/5.3/biometric-authentication","children":[]}]},{"id":"ci_365586d036162f6d1d3c840cf1cabffc5bd42f62409e5b3276a8c5d158ad1fa3","title":"Working with multi-tenant environment","path":"/pam-technical-documentation/5.3/working-with-multi-tenant-environment","children":[]},{"id":"ci_8feade390c8bee757bf6842d14238df581eaf457bbe24a76c0c51648b0b69d34","title":"Configuring Notifications","path":"/pam-technical-documentation/5.3/configuring-notifications","children":[{"id":"ci_0f935c4cafca122b1f8a73e5b21e61d5a1fadc8e851d95200210bfed012bcc16","title":"Key concepts & Capabilties of Notification Service","path":"/pam-technical-documentation/5.3/key-concepts-capabilties-of-notification-service","children":[]},{"id":"ci_c38d4bb6351e06496a4c176d44fbb7c1e403ddf6d90060018219ff9ad2603f68","title":"Architecture & flow of Notification Service","path":"/pam-technical-documentation/5.3/architecture-flow-of-notification-service","children":[]},{"id":"ci_5fe99280588289ddd36346eb096fdba4fc45f22eb105fe97307362f4aec5973a","title":"Using Notification templates","path":"/pam-technical-documentation/5.3/using-notification-templates","children":[]},{"id":"ci_c34f8aafa99c649d6cb4fe7446e54620a1af908a131e563cb0b0962e2006de4e","title":"Setting up Notifications","path":"/pam-technical-documentation/5.3/setting-up-notifications","children":[]}]},{"id":"ci_af69e805e613eac4103cabbf9b72d0abc3eda5bcaf93acf993bf518edf4e79a4","title":"Backing up, Restoring, and Archival","path":"/pam-technical-documentation/5.3/backing-up-restoring-and-archival","children":[]},{"id":"ci_7c1f572fe9db44e32d590a5b10cff699e54293438b9d22442e8b15b3a95a9278","title":"Configuring Satellite Vault for break glass","path":"/pam-technical-documentation/5.3/configuring-satellite-vault-for-break-glass","children":[{"id":"ci_446e2990923f504bf5a05ecbd0a2a06d8cfd5b131eaba19482d5b173bd3db6cc","title":"Accessing Satellite Vault","path":"/pam-technical-documentation/5.3/accessing-satellite-vault","children":[]}]},{"id":"ci_e66ad683bf9e2a794999f6a000cbd6d9cea879ee0edd2c156d18d938c78516c1","title":"Forwarding Logs","path":"/pam-technical-documentation/5.3/forwarding-logs","children":[]}]},{"id":"ci_6aadb408a0829c2f1dfdb4df766ef04d50cfbb079d2e8dd7428e68c1068471e2","title":"Administer","path":"/pam-technical-documentation/5.3/administer","children":[{"id":"ci_97c86f4c49456ba0bbe6654c9c83c5d2ca3ed2bd48662e20b94ebaf4724bc593","title":"Running discovery","path":"/pam-technical-documentation/5.3/running-discovery","children":[{"id":"ci_4ee99b12369a2b38f9919eb9b4b2596de07cf06754018f8896bf79757533e9a7","title":"Setting up asset discovery","path":"/pam-technical-documentation/5.3/setting-up-asset-discovery","children":[{"id":"ci_16076e47c91eadc71a87123c3e98204c9911985c1780ed2a8620b689c845ca2b","title":"VMware workloads","path":"/pam-technical-documentation/5.3/vmware-workloads","children":[]},{"id":"ci_68de720cf0bfc11a657f9efb2fbb8a66f15acfbb93e8d17794bfbfcb4117291c","title":"Google Cloud","path":"/pam-technical-documentation/5.3/google-cloud","children":[]},{"id":"ci_e8b5599b552b687d69a2f4f903060b5eee5488bdb765795a6b8f6cf23cde18a3","title":"Network scan","path":"/pam-technical-documentation/5.3/network-scan","children":[]},{"id":"ci_73e75f195551df95a4316c154649c6d0f7a498f2f3bcb171fa86766df02a5e2b","title":"SNMP Discovery","path":"/pam-technical-documentation/5.3/snmp-discovery","children":[]},{"id":"ci_87875e4efb425c7bc84a52b7308de4dbf5e807828069e9c999e292a7348e773f","title":"Hyper-V Asset Scan","path":"/pam-technical-documentation/5.3/hyper-v-asset-scan","children":[]},{"id":"ci_4a2c38877eba4fb0a37e171a5996096bf9551bd8cc464aed6d9cffeb703cb060","title":"Active Directory (AD)","path":"/pam-technical-documentation/5.3/active-directory-ad","children":[]},{"id":"ci_4c4c296aa123bfcd7615915a20a6202d26d6c00eb7269043b1e916d794e1d08a","title":"Amazon Web Services (AWS) resources","path":"/pam-technical-documentation/5.3/amazon-web-services-aws-resources","children":[]},{"id":"ci_79100a18e5d60da0bb905bab5cb0d9cddc56aaaabe0e4cebcca5220ee8e8ebdc","title":"Microsoft Azure Resources","path":"/pam-technical-documentation/5.3/microsoft-azure-resources","children":[]}]},{"id":"ci_2fda7df020145370add3eb66d6d65e89e8bbd7878b288d60c2d731029a12ee53","title":"Handling assets and accounts manually from discovery","path":"/pam-technical-documentation/5.3/handling-assets-and-accounts-manually-from-discove","children":[]},{"id":"ci_c28a938a125971603bc8f2033d41c212834761eef31c6defb2b91c21632e8454","title":"Schedule account discovery jobs","path":"/pam-technical-documentation/5.3/schedule-account-discovery-jobs","children":[]},{"id":"ci_71d0163706b25b3bbaa38149fc722f4c6e5188f41484995f50b3f34b47ca8f7c","title":"Configuring credentials","path":"/pam-technical-documentation/5.3/configuring-credentials","children":[]},{"id":"ci_9b48994c929d29c4c127c4e0b4b9f74f4128f37e7f30ca21cba6d986a60d3636","title":"Viewing Discovery Map","path":"/pam-technical-documentation/5.3/viewing-discovery-map","children":[]}]},{"id":"ci_84456e2e71f45774b67ff439157a8ed8c55e07f7bd779fb296f02166baf340cf","title":"Managing assets & access types","path":"/pam-technical-documentation/5.3/managing-assets-access-types","children":[{"id":"ci_c65c05962a512bc71cfbe6977cd7983b38ac1a8a0166380ef6085656010729c0","title":"Adding assets in the system","path":"/pam-technical-documentation/5.3/adding-assets-in-the-system","children":[]},{"id":"ci_38bc2a7b145ddd16e0bbb5e65bf5785b6dc594911b52d4e71357312c989e195f","title":"Managing access types","path":"/pam-technical-documentation/5.3/managing-access-types","children":[]}]},{"id":"ci_404832913e557e7e9340501f6792fb8222b0d326e91ce7800f1ae890912bb52b","title":"Configuring a Kubernetes Cluster","path":"/pam-technical-documentation/5.3/5-configuring-a-kubernetes-cluster","children":[]},{"id":"ci_55e2bb5040db33f3022fb20f26775001542403960c5b30eed716ff4980a45695","title":"Managing accounts & keys","path":"/pam-technical-documentation/5.3/managing-accounts-keys","children":[{"id":"ci_7cf5de64f03e737b6cf6cd953314be6817386e36bbd1a73b254f97ca7a1daa3a","title":"Onboarding accounts in vault","path":"/pam-technical-documentation/5.3/onboarding-accounts-in-vault","children":[]},{"id":"ci_231667f8ef4219f0323d469c04c3f8102a1fb270d67e96efdad8ac76922a67a3","title":"Managing account operations","path":"/pam-technical-documentation/5.3/managing-account-operations","children":[]},{"id":"ci_e2da25bb418d4329db29f2b307d9601fa7f0bbd53760ec42b89819abaec70c55","title":"Working with account groups","path":"/pam-technical-documentation/5.3/working-with-account-groups","children":[{"id":"ci_6dc950806722cdc73c4eb0ef76e1000706d316135da1b11c8084487b132b30df","title":"Account group management","path":"/pam-technical-documentation/5.3/account-group-management","children":[]},{"id":"ci_68f0f3afa45bf67676d1c038ebf20713a0a58de7b8686e1bf4efec79dd759580","title":"Account group operations","path":"/pam-technical-documentation/5.3/account-group-operations","children":[]}]}]},{"id":"ci_1fbad9ef299cd0f34fa10be0f122fcc555ca94c86dec9d47e52ced4b0c81697c","title":"Managing user & authentication","path":"/pam-technical-documentation/5.3/managing-user-authentication","children":[{"id":"ci_9e7169ad26ccdc7f87db6bb5a9b56a938c808aa9e6c01867a1aa293e75a490ce","title":"Assigning policy-based access to users","path":"/pam-technical-documentation/5.3/assigning-policy-based-access-to-users","children":[]},{"id":"ci_84a31e1bc1b7e2828cb4d32edfe5777391a08131af6191ddbc80e958c6553313","title":"Adding users in the system","path":"/pam-technical-documentation/5.3/adding-users-in-the-system","children":[]},{"id":"ci_50e2ac25d4f71ebf02f9ed9d303fc2e8014fe3befcf23fcaf5a6a2c79718061c","title":"Managing user roles","path":"/pam-technical-documentation/5.3/managing-user-roles","children":[]},{"id":"ci_49286338c028d9892a274d9af6e4191ba8a95c6205c4f0956263d57a3b44db09","title":"User authentication settings","path":"/pam-technical-documentation/5.3/user-authentication-settings","children":[]},{"id":"ci_5035deb8b0d3f6eade064e488b0aa7e52918a5bcc2b70fd99d57d026e84649de","title":"Defining user groups","path":"/pam-technical-documentation/5.3/defining-user-groups","children":[]},{"id":"ci_a6099fc4bd26b2d43d60491b2792e078eda646fbba965358ff16d5565171d6ff","title":"Setting up user access policy","path":"/pam-technical-documentation/5.3/setting-up-user-access-policy","children":[]},{"id":"ci_87294aaf7a4138fecdacfa4dd5f6ea00b568a3f2cbd8ea2bf26d7916b82a09d7","title":"Setting up Logon Policy","path":"/pam-technical-documentation/5.3/setting-up-logon-policy","children":[]},{"id":"ci_2f0e708ddc3fe2ed0e26bd255608f257ec2977e4a74c3f191187755b5d80c0ba","title":"Managing user operations","path":"/pam-technical-documentation/5.3/managing-user-operations","children":[]}]},{"id":"ci_ebdf5e29ce05cb61518ce96a2fb8475b7a2c8c9c3d1092e97070d42bb4067ef6","title":"Setting up password management","path":"/pam-technical-documentation/5.3/setting-up-password-management","children":[{"id":"ci_a8fdff9b3906fc8f72f54352f43d8589c6fc9f78b027899acf9dda532d10673a","title":"Configuring password rotation policy","path":"/pam-technical-documentation/5.3/configuring-password-rotation-policy","children":[]},{"id":"ci_ac1ab214f2fdf639a2f08a2ebb9d1d6cd8b2ee5ede8efcae301c7200755f03a1","title":"Configuring reconciliation policy","path":"/pam-technical-documentation/5.3/configuring-reconciliation-policy","children":[]},{"id":"ci_5fb6ca57cc7effd1f907231d932499d7d9ec123de94f64cd3b04450fbcb5d08e","title":"Configuring password checkout policy","path":"/pam-technical-documentation/5.3/configuring-password-checkout-policy","children":[]},{"id":"ci_32eec14b1159b96fb39e325aaabf983fd34e1aa289e2b719cefcd3e6d88a38f6","title":"Configuring password policy","path":"/pam-technical-documentation/5.3/configuring-password-policy","children":[]},{"id":"ci_ef370e5cb785d8967c05fae32697a72766a74c9ebc6e31d67883115c732cdd4f","title":"Configuring management account","path":"/pam-technical-documentation/5.3/configuring-management-account","children":[]}]},{"id":"ci_a2daa551afaf3a359e8601a9ec322081b732957020015396b1352aa3b040f27b","title":"Enabling Just-in-time Access","path":"/pam-technical-documentation/5.3/enabling-just-in-time-access","children":[{"id":"ci_f0dd533d7c6c28e8f3ffc7822b8b9ce05ef1d9862029057cbf2f9bb4c5f38cdb","title":"Windows platforms","path":"/pam-technical-documentation/5.3/windows-platforms","children":[]},{"id":"ci_ff11c3a8e37e95d846d46ba064a524edbcec572878a4a63ea99137e28ae1f1d9","title":"Unix platforms","path":"/pam-technical-documentation/5.3/unix-platforms","children":[]}]},{"id":"ci_5111eae6b9c972801a0b352acb856a4163f49c81ae9453f901a9853e90515924","title":"Workflow-based access","path":"/pam-technical-documentation/5.3/workflow-based-access","children":[{"id":"ci_b4bc67c2a35c80e675a1357f93019fefdaad3f2581d2b8c30954363006c119d9","title":"Enabling Maker Checker","path":"/pam-technical-documentation/5.3/enabling-maker-checker","children":[]}]},{"id":"ci_f4b3d4f19ceed1341c651e367624ea18fd1a12660af5efd910294ecd0162c583","title":"Managing & reviewing session Logs","path":"/pam-technical-documentation/5.3/managing-reviewing-session-logs","children":[{"id":"ci_c0e109e96a59fe40b055cb2d5127667b995dd6967048deb10257f469c14473f3","title":"View Session Recordings","path":"/pam-technical-documentation/5.3/view-session-recordings","children":[]},{"id":"ci_1d5b6403933e9de3543f163f66c5c9a8891943974f9b418fb3c7fb951ca513d7","title":"Viewing password checkout history","path":"/pam-technical-documentation/5.3/viewing-password-checkout-history","children":[]},{"id":"ci_c51952d196dc2b7024f437b4dde5795502b1aae05c5ca17408995390454926ac","title":"Viewing Live Sessions","path":"/pam-technical-documentation/5.3/viewing-live-sessions","children":[]},{"id":"ci_a7691300c821340bb968ed8effe692da26ed90fa31a5416ed5056571e3714bf8","title":"Reviewing sessions","path":"/pam-technical-documentation/5.3/reviewing-sessions","children":[]},{"id":"ci_9d87128e9ad10e7998f236cb6c3c34fc8eed88902069b11801ae32255cc33e56","title":"Monitoring or terminating live sessions","path":"/pam-technical-documentation/5.3/monitoring-or-terminating-live-sessions","children":[]},{"id":"ci_b7297566601a43cafc9fb31512c33fbe281a562d5511bf88fe56a983f4254073","title":"Adjusting session risk scoring & threat analytics parameters","path":"/pam-technical-documentation/5.3/adjusting-session-risk-scoring-threat-analytics-pa","children":[]}]},{"id":"ci_7ed58a2ecba7bae24b2ec0ffba861b13a36952ecc305a7c1e8e9d78cf1a11ce3","title":"Managing server privileges","path":"/pam-technical-documentation/5.3/managing-server-privileges","children":[{"id":"ci_163241ac2c864ebb31bc3281bc4386cf19a738ca3ab4c46993544f9f3371e50b","title":"Command Restriction for SSH","path":"/pam-technical-documentation/5.3/command-restriction-for-ssh","children":[]},{"id":"ci_b2866d7886433ff877c91c5235cca9fae99e386eef5c7d96757d7c7b406bf56d","title":"Application Control for Windows","path":"/pam-technical-documentation/5.3/application-control-for-windows","children":[]},{"id":"ci_3e3151fbe910dd3d89d5b9668b7fe0536a4b04a844de397cdb6962aa43ac9d0d","title":"Database Query Restriction","path":"/pam-technical-documentation/5.3/database-query-restriction","children":[]}]},{"id":"ci_8107f6e029493a4c063f74ec724ce226faacd853649f89e4d2b8e525388125ae","title":"Reporting & analytics","path":"/pam-technical-documentation/5.3/reporting-analytics","children":[{"id":"ci_0e273725a0b75e72222d659a0128fdc776d943565e6e9171828c9c73b4ac6b28","title":"Viewing & exporting reports","path":"/pam-technical-documentation/5.3/viewing-exporting-reports","children":[]},{"id":"ci_1a494d7b2ad3fef22fbc722b22af88eaf896b40861693cb5e49b533796688a2c","title":"Scheduling a Report","path":"/pam-technical-documentation/5.3/scheduling-a-report","children":[]},{"id":"ci_03021cc597dc22ee59119d46af7f52612ab79e293db38aa71443ae38d76cc32f","title":"Designing & customizing reports","path":"/pam-technical-documentation/5.3/designing-customizing-reports","children":[]}]},{"id":"ci_936b81748392425ae1802348d26d9622ee5672c369cad0d002f715512c6a774f","title":"Automating Privileged Tasks","path":"/pam-technical-documentation/5.3/automating-privileged-tasks","children":[{"id":"ci_403aabf601e8e9bc1b61cdddfbd4fb933d02e6a49a60db6411e924463bd8788f","title":"PTM key concepts & capabilities","path":"/pam-technical-documentation/5.3/ptm-key-concepts-capabilities","children":[]},{"id":"ci_17dd86d981203ccfd507d1b58ad469c3f3cade3e4f58806afa77d24700b9807b","title":"Architecture, flow, & advantages of PTM","path":"/pam-technical-documentation/5.3/architecture-flow-advantages-of-ptm","children":[]},{"id":"ci_85e981c64243a72f91d0d71b014252fae0d1a241f516756af241af247c96cd93","title":"PTM Libraries","path":"/pam-technical-documentation/5.3/ptm-libraries","children":[]},{"id":"ci_bf36c89c1d5bffdf36e2c54cbf787288f4ed7358e6b89b0d71369c3cab32ccfa","title":"Configuring Tasks","path":"/pam-technical-documentation/5.3/configuring-tasks","children":[]}]},{"id":"ci_974b37e28fac825cf131f09c84e10401d50c50a730b0e144347c2eeb050406d6","title":"Account Lifecycle Management","path":"/pam-technical-documentation/5.3/account-lifecycle-management","children":[{"id":"ci_361751e03ba4a566d316c88f5daa487dea48ea19a84d791228150d51e49ca3bc","title":"Account Provisioning","path":"/pam-technical-documentation/5.3/account-provisioning","children":[]},{"id":"ci_5e73a48c60d211edcf40b2acd11654d3a43893c38bf12e071867c206b4a4b0fa","title":"Manage Provisioned Accounts","path":"/pam-technical-documentation/5.3/manage-provisioned-accounts","children":[]}]},{"id":"ci_c0d51881f2533fc5f955f8bab1085e81da96bbe172ee5a66265ba0f0543fc58f","title":"Managing the system","path":"/pam-technical-documentation/5.3/managing-the-system","children":[{"id":"ci_e56881b547f0ea773ee4bf02fe3ba32d3790334fbffc54d0a0f5de78956a4808","title":"Auditing system changes","path":"/pam-technical-documentation/5.3/auditing-system-changes","children":[]},{"id":"ci_c5c67254880d51ae106e9785b0e4eb0127bd18aee417a4ea328c57e8a918c27d","title":"Using troubleshooting utilities","path":"/pam-technical-documentation/5.3/using-troubleshooting-utilities","children":[]},{"id":"ci_410bd58b357fc5b32ada3c6684ca4929d3ee74b45a8d7b8718f810c0661fa8d6","title":"Monitoring System Health & Service Status","path":"/pam-technical-documentation/5.3/monitoring-system-health-service-status","children":[]},{"id":"ci_d08603072e0d15c51a628fe0994291ae1589646ca147dbf278d51bc219046e5f","title":"Dashboard","path":"/pam-technical-documentation/5.3/dashboard","children":[]},{"id":"ci_2b5b77419d1ca9564123759f634cde5cdd1777e1006e7a90c2f4ffc044a625d6","title":"Managing Licenses","path":"/pam-technical-documentation/5.3/managing-licenses","children":[]}]},{"id":"ci_c5c541fe08f123443a3120f0b5c56e6638920ab64c891b7454301c88ed541705","title":"Windows Monitoring Agent","path":"/pam-technical-documentation/5.3/windows-monitoring-agent","children":[]}]},{"id":"ci_7b188b9cc179e48b574d113ee7a9205adf40cbbf48c76958d10ee94b8588c5c5","title":"Develop","path":"/pam-technical-documentation/5.3/develop","children":[{"id":"ci_e326f947184f7dc6b7dbb8cdc47cc3985120b0bfd8cf67f780a565512a557feb","title":"HTTP POST Headers","path":"/pam-technical-documentation/5.3/http-post-headers","children":[]},{"id":"ci_cc367a824dec3dcdcf01cd2f46be93633bd200e528409ebb1197ecbdc0785faa","title":"Management APIs","path":"/pam-technical-documentation/5.3/management-apis","children":[{"id":"ci_e182b0df9012ce7fc2604d9d2077af405420689c55f51c2075f5928631a56b9b","title":"API - Manage User","path":"/pam-technical-documentation/5.3/api-manage-user","children":[]},{"id":"ci_71479b71338197a0ed33b70f11603983eaa51aecab99548fe42e12bcc7fed248","title":"API - Manage Asset","path":"/pam-technical-documentation/5.3/api-manage-asset","children":[]},{"id":"ci_06d68937d71984b723599139aa285f39ed4ade0ac9fd320b6a67002b37463c54","title":"API - Manage Account","path":"/pam-technical-documentation/5.3/api-manage-account","children":[]},{"id":"ci_6176ad35884f403951e99ebb451003f6c1aeb2f410723d3278c09b038dc98daf","title":"API - Get Instance Information","path":"/pam-technical-documentation/5.3/api-get-instance-information","children":[]},{"id":"ci_6201909409c86b5349fe5983bd1223f85606a40a5e4e77798fdac5bc666630c7","title":"API - Get User Groups Information","path":"/pam-technical-documentation/5.3/api-get-user-groups-information","children":[]},{"id":"ci_feb5264ad45058d71761630d265c91d7249fbdf30cec91fa7101be0b28fef1cf","title":"API - Get Users by Group","path":"/pam-technical-documentation/5.3/api-get-users-by-group","children":[]},{"id":"ci_2ef48419ac13c5fe4ced2a11d4d5084365f880230dfeb52b960803a07c0fd800","title":"API - Get Users Information","path":"/pam-technical-documentation/5.3/api-get-users-information","children":[]},{"id":"ci_3f0dda7d35fd14bab7ffbf3f969adda6b4c3002162aac573b60aa80fd9ab7271","title":"API - Map, Un-map User with User Group","path":"/pam-technical-documentation/5.3/api-map-un-map-user-with-user-group","children":[]},{"id":"ci_61d2abec394b354222e21e01121d247e812909f98c837190c36244612c82c4fe","title":"API - Get Assets","path":"/pam-technical-documentation/5.3/api-get-assets","children":[]},{"id":"ci_e4447bc92e7685932a24b814444d98cb177a7d3850e510c55722b8bc68396c72","title":"API - Get Account Groups","path":"/pam-technical-documentation/5.3/api-get-account-groups","children":[]},{"id":"ci_1303520f2f2945785a857c6ef6bb868b901d5159a95c0f7a32d42c0d84455b13","title":"API - Get Accounts by Asset","path":"/pam-technical-documentation/5.3/api-get-accounts-by-asset","children":[]},{"id":"ci_b3b01f5e1edf337b81c6259d66d7076f5aa3701ba90aa3389129daacdfd00434","title":"API - Get Accounts by Account Groups","path":"/pam-technical-documentation/5.3/api-get-accounts-by-account-groups","children":[]},{"id":"ci_dcb2cc916c663c816a5c0fd362ad685759bed0e2f3c2e6beac89c54e7746ef40","title":"API - Map Un-map Account with Account Group","path":"/pam-technical-documentation/5.3/api-map-un-map-account-with-account-group","children":[]},{"id":"ci_9c082779d05fae16d61765c2dd897e6b214cc71254c8bf2b53e8a66907ba9046","title":"API - Get Entitlement","path":"/pam-technical-documentation/5.3/api-get-entitlement","children":[]},{"id":"ci_fe52f7287efc5a2ba6baa533471a8e099a585941ffc28c2fff891b719e89d7c4","title":"API - Get Discovered Accounts","path":"/pam-technical-documentation/5.3/api-get-discovered-accounts","children":[]},{"id":"ci_30e1dddf89bddf393742a2204cacb68c1aec8ffa69277fb65e1a3d672b68603a","title":"API - Get Discovered Assets","path":"/pam-technical-documentation/5.3/api-get-discovered-assets","children":[]}]},{"id":"ci_8b6cab21eb0d4d48f801bf0d4ee6a168a4b4ce786d0106eeba3fcc4ed9c27b3c","title":"Vault Password API Headers","path":"/pam-technical-documentation/5.3/vault-password-api-headers","children":[]},{"id":"ci_f327877383d9ed498e40391588abf19103c9cd81c75d6800d675ff3a1e54103d","title":"Password Vault APIs","path":"/pam-technical-documentation/5.3/password-vault-apis","children":[{"id":"ci_751c22c7a2b595de70fb8b3348bf8bc9955576ab27637a73560a10105c8a86db","title":"API - Password Vault","path":"/pam-technical-documentation/5.3/api-password-vault","children":[]}]},{"id":"ci_ba323fbcd2cbb077ad0a49023317c848d78ba9dd1f107d994665975d5b76b7c4","title":"Response Error Codes","path":"/pam-technical-documentation/5.3/response-error-codes","children":[]}]},{"id":"ci_17940358a595f5cf5a6788a06d10f228bfed1bea598525f1b9b2a9adcc993d8f","title":"Use","path":"/pam-technical-documentation/5.3/use","children":[{"id":"ci_131bff2ac81f0ceb4ed62e1829ca413fc6e271451ee8f2d2b916325e1e02e150","title":"Launching the product","path":"/pam-technical-documentation/5.3/launching-the-product","children":[]},{"id":"ci_d289ea4b1fa96e29b598638c3f21d74e42a67c6620731d2eec782731bca95247","title":"Accessing a Target Asset","path":"/pam-technical-documentation/5.3/accessing-a-target-asset","children":[{"id":"ci_0a9092e9bb4944535ad4779bf4b25c7448d74d90ec9befbe46eed94884a8b38c","title":"Working with assets","path":"/pam-technical-documentation/5.3/working-with-assets","children":[]},{"id":"ci_acf6e4acc91c66eccf4806c518dacc198ec4df5219ae304a5b812c975ac68150","title":"Working with accounts","path":"/pam-technical-documentation/5.3/working-with-accounts","children":[]},{"id":"ci_e8ae7dd0b9a3e60cff2fb643b3193ee91ae8ff08608cd6aa61f6d386b1fd7cec","title":"Collaborating session","path":"/pam-technical-documentation/5.3/collaborating-session","children":[]}]},{"id":"ci_e2a2155cc1898e8b762d31dea016fb6fc6ac0e34de4a827941489931c97f2778","title":"Using workflow","path":"/pam-technical-documentation/5.3/using-workflow","children":[{"id":"ci_a37e6d8725cf5a5bfe25f9e515dee43cd62ebec9e4525ed4015242f0f6e6426a","title":"Raising a request","path":"/pam-technical-documentation/5.3/raising-a-request","children":[]},{"id":"ci_28063ca484cbb406971c6b622dc664fa24dd1456392027f3fb56409098bdbe25","title":"Managing approvals","path":"/pam-technical-documentation/5.3/managing-approvals","children":[]}]},{"id":"ci_c6f57ba9c56738bf58fbc6c4d33769dc99aa48d902ed59d16e2c6b370137d8a7","title":"Executing tasks","path":"/pam-technical-documentation/5.3/executing-tasks","children":[]},{"id":"ci_cb632c988dc31e874081ee3a41febbffc096f59af84c3ccabe00cd99ba9517ee","title":"Accessing secrets during break glass","path":"/pam-technical-documentation/5.3/accessing-secrets-during-break-glass","children":[]}]}]