[{"id":"ci_f5b9802a0595fcc179a49a5083eee155ecb7606dab04965a9c20484d00874e36","title":"Getting Started","path":"/pam-technical-documentation/5.4/getting-started","children":[]},{"id":"ci_d5013352f47c8e80dbe494699b2c7c4bc29a20b4e685ec01fe52ce481889b719","title":"Release Notes","path":"/pam-technical-documentation/5.4/release-notes","children":[{"id":"ci_79320784f14dfb2cd5dae30229b406e1e5a535fb3da0d889e37ad3888a7d3f34","title":"Version 5.4.0","path":"/pam-technical-documentation/5.4/version-5-4-0","children":[]}]},{"id":"ci_f224abbeb08afe62a2461bf00a267c563d85cc8f7c9642a1c1d9393100a55223","title":"Installation & Setup","path":"/pam-technical-documentation/5.4/installation-setup","children":[{"id":"ci_cbd0b97ec97cf0677ff74a07f308dfe1eb9f8ab309767ff661e5e98cb264b285","title":"Planning to Deploy","path":"/pam-technical-documentation/5.4/planning-to-deploy","children":[{"id":"ci_8bc7108220acf0b192fdc4f67cddac89ca8d7d26f659cc9dd968f7f71c1e8e90","title":"Service Architecture Overview","path":"/pam-technical-documentation/5.4/service-architecture-overview","children":[]},{"id":"ci_974e0792a8c5555142e23cc90641f56900e0758022bf4a71e78732a9fff01f1f","title":"System Requirements","path":"/pam-technical-documentation/5.4/system-requirements","children":[]},{"id":"ci_7656d987c8cdd117be9533fb252a9b5a90ca57bb4aabe84c14e3c121fc19eaee","title":"Deployment Scenarios","path":"/pam-technical-documentation/5.4/deployment-scenarios","children":[]},{"id":"ci_fcf9a08fdaad8d3a4325ba88841042a5ca81b7f28e38f7c5d91837d69b1dbbfa","title":"Setting up test environment","path":"/pam-technical-documentation/5.4/setting-up-test-environment","children":[]},{"id":"ci_89365e4f318773a599dc2f8b74f860dc2d611e1070ac8df263a7ad507fc0913f","title":"Standard Port Requirement for Installation","path":"/pam-technical-documentation/5.4/standard-port-requirement-for-installation","children":[]}]},{"id":"ci_6ef61e0434ace727349ad7f38e397614ff660b2bd522154b5921313837a677e8","title":"Installing Sectona Components","path":"/pam-technical-documentation/5.4/installing-sectona-components","children":[{"id":"ci_bfd51ba3b07171ceea3c65e79c51345bf9a7ab56f3590e4cbc4bb047d91dc6e0","title":"Installing Vault Component","path":"/pam-technical-documentation/5.4/installing-vault-component","children":[]},{"id":"ci_16b2618637b2578658ba95f8c8f2fbf5b9cbf4ebd949ef835725e9e8381d326c","title":"Installing Sectona Web Access","path":"/pam-technical-documentation/5.4/installing-sectona-web-access","children":[]},{"id":"ci_73e564f2bf0a6f982326a8123eda1e666f217cdbfd5db56eaf68a9505890cf9c","title":"Installing Sectona Jump Host Component","path":"/pam-technical-documentation/5.4/installing-sectona-jump-host-component","children":[]},{"id":"ci_5ec32b8ddd2ec1902d5a8ec3b5769425a6d9e3c12db98e6f1c20e2a33f52cac3","title":"Installing Sectona File Synchronization Component","path":"/pam-technical-documentation/5.4/installing-sectona-file-synchronization-component","children":[]},{"id":"ci_61ca72510d19fca1eade18f4adeca8c1567ee0bbc9f390abd6237620acdace73","title":"Installing Session & Web Session Proxy Component","path":"/pam-technical-documentation/5.4/installing-session-web-session-proxy-component","children":[]},{"id":"ci_87249e41facca7ef98b4e3eb17868b12ce07a3c2fd5eef4de8b7d9b413742b14","title":"Installing Sectona Satellite Vault Component","path":"/pam-technical-documentation/5.4/installing-sectona-satellite-vault-component","children":[]},{"id":"ci_f28ccf9bdca89ac9dc0cd21d0bd7f4a744bde21f786c31d0efa877a574b4175b","title":"Installing Sectona Vault API Extension","path":"/pam-technical-documentation/5.4/installing-sectona-vault-api-extension","children":[]},{"id":"ci_9d412a92143df96ef14454831f9f6705cbdc6c68179ddef342ad4f162bd0e093","title":"Installing Sectona Client App","path":"/pam-technical-documentation/5.4/installing-sectona-client-app","children":[]},{"id":"ci_ad1451978b3e10d3a7df68164299059ae70035b8d9641316c0dee96d192d4762","title":"Installing Sectona Windows Monitoring Component","path":"/pam-technical-documentation/5.4/installing-sectona-windows-monitoring-component","children":[]},{"id":"ci_f709f8e7b4a67313d5598dec391b3f13f64f5df61c599dc7d892a21f4cec6b18","title":"Installing Sectona Launcher","path":"/pam-technical-documentation/5.4/installing-sectona-launcher","children":[]},{"id":"ci_d2a428ae858fb78c9a6362bbc1b341786b28621458493692cecd7beafffedb0c","title":"Installing Sectona Remote Access Publisher Component","path":"/pam-technical-documentation/5.4/installing-sectona-remote-access-publisher-compone","children":[]},{"id":"ci_798e4dc8ff7248724c076639d08e4bee016f251b5495a325e7f86e6d7ef505b3","title":"Installing Sectona Remote Session Host","path":"/pam-technical-documentation/5.4/installing-sectona-remote-session-host","children":[]},{"id":"ci_64289217550e2336e9114700f117e15a7fcdcb03b889a6685598556ad2e5d54c","title":"Install and Setup WSSL Proxy","path":"/pam-technical-documentation/5.4/install-and-setup-the-wssl-proxy","children":[]}]},{"id":"ci_6eaceda9ce6fd751909baa6d9bad4fcfe075268b8d4f2ef2044532f68e8e63e5","title":"Building a High Availability Setup","path":"/pam-technical-documentation/5.4/building-a-high-availability-setup","children":[{"id":"ci_d373c38503314a5eea2d346201b23eb0d552b9f09bd344cb1ce3d3c9c97d7718","title":"Key Concepts and Components of a High-Availability System","path":"/pam-technical-documentation/5.4/key-concepts-and-components-of-a-high-availability","children":[]},{"id":"ci_3570cb18ab92b41b314d537e99cfb1b63f8dba9f15119fd322b32301aed072ca","title":"Availability Consideration for Platform Components","path":"/pam-technical-documentation/5.4/choosing-an-architecture-for-ha-dr-requirements","children":[]},{"id":"ci_69bbe8142c0009bff20c6ffa6f4303e74e106facc3f5c47d481d45e2bd8107ca","title":"Configuring Sectona Web Access for High Availability","path":"/pam-technical-documentation/5.4/configuring-sectona-web-access-for-high-availabili","children":[]},{"id":"ci_b6bd5a8b5980b2c70da36a755dfd7415d4ad39e6bc5dbcf2943523ddaef1f41f","title":"Configuring Vault for High Availability","path":"/pam-technical-documentation/5.4/configuring-vault-for-high-availability","children":[]}]},{"id":"ci_15e33d5f1096eac61e9cd4fdbf077a3a2713537dca26a365363c37d3f7c34a5f","title":"Configuring Disaster Recovery Setup","path":"/pam-technical-documentation/5.4/configuring-disaster-recovery-setup","children":[]},{"id":"ci_a93a631470c805a9e625cd56f159901aa93e930f7763568928a70302099f9324","title":"Migrating from evaluation to production","path":"/pam-technical-documentation/5.4/migrating-from-evaluation-to-production","children":[]},{"id":"ci_3bb5d0021c6e72f70e34515f323d66b6e4ee1bf07c6f13924dd5876db901e771","title":"Rebuilding your setup","path":"/pam-technical-documentation/5.4/rebuilding-your-setup","children":[]},{"id":"ci_ac0ef4589353e2697eb9a05363a59ec547584584b0bd33fd9c1475db4ea2ee0b","title":"Upgrading the System","path":"/pam-technical-documentation/5.4/upgrading-the-system","children":[]}]},{"id":"ci_c77c8e55032c2b44aa7e9b20983b225cd835cb53cf4bd5827208c89c6e8d2e13","title":"Configure & Implement","path":"/pam-technical-documentation/5.4/configure-implement","children":[{"id":"ci_9249f9e7e38991e61d50fee13e546553d9c709310348d966e1ce794b0549a7d1","title":"General Configurations","path":"/pam-technical-documentation/5.4/general-configurations","children":[{"id":"ci_cb27fad87e6e92d85cbe17fa0aed5419c97967140d2887500105dc73cf3b7ad4","title":"Setting up a network proxy","path":"/pam-technical-documentation/5.4/setting-up-a-network-proxy","children":[]},{"id":"ci_44e89f5dca7fc7a9dff0fca6f8b769b151c028a21ba7a2b0e60153e506ac4afb","title":"Applying conditions with tags","path":"/pam-technical-documentation/5.4/applying-conditions-with-tags","children":[]},{"id":"ci_eb1d50e047a29c9468e5da0c1868ac0c12daa40b7ffc383a3c9cc259b9c193ea","title":"Configuring HTTPs certificate","path":"/pam-technical-documentation/5.4/configuring-https-certificate","children":[]},{"id":"ci_669ccaf658f5974b3c72c790ff1159c20f4a555fb06cb554594969b026a69834","title":"Updating default system settings","path":"/pam-technical-documentation/5.4/updating-default-system-settings","children":[]},{"id":"ci_8ee256a6e7ad847968ddd1aae125fe269c832d90f1e87754818f868f05ac63c5","title":"Customizing web application appearance & site settings","path":"/pam-technical-documentation/5.4/customizing-web-application-appearance-site-settin","children":[]},{"id":"ci_3130dc12fc58fb70884a55dc16c65e050f772399b61db164a6fb66c532f2b3bb","title":"Defining network zones","path":"/pam-technical-documentation/5.4/defining-network-zones","children":[]},{"id":"ci_ee5c72ad0d2bcf8a2cce9f9a9d9137f23888ded482803daa2da57b3a8e2ab4e6","title":"Configuring location tagging","path":"/pam-technical-documentation/5.4/configuring-location-tagging","children":[]},{"id":"ci_393bac16e2b8931d185d2e5569cd6ca52ab0071d93ebb6cc179c8f1ff4fadbe6","title":"Setting criticality level tags","path":"/pam-technical-documentation/5.4/setting-criticality-level-tags","children":[]},{"id":"ci_72c54d999ba5fc8ff46e3e8d7a97818e35c84b7b97f0279f5f8e11f9337d16a0","title":"Managing video recording settings","path":"/pam-technical-documentation/5.4/managing-video-recording-settings","children":[]},{"id":"ci_ddebb07b7502ea0e9ff56b558f35d8b0b8327d72d8a3beddf6db874c2bdd9023","title":"Configure Email settings","path":"/pam-technical-documentation/5.4/configure-email-settings","children":[]},{"id":"ci_c0d004b7d589cabf424b4e17f36611715820d3955572527268f5a5cd807131e1","title":"Adding new LDAP/LDAPs directory","path":"/pam-technical-documentation/5.4/adding-new-ldap-ldaps-directory","children":[]}]},{"id":"ci_3508e06e9577fd32440ca2e6a399b1e1351de042b9808d1ed4835ebc42415281","title":"Configuring user authentication","path":"/pam-technical-documentation/5.4/configuring-user-authentication","children":[{"id":"ci_dcd507a3680cae683a013b138ea70791fbcf027ed66472a425668e20bf8e6c9e","title":"LDAP/LDAPs supported directories","path":"/pam-technical-documentation/5.4/ldap-ldaps-supported-directories","children":[]},{"id":"ci_37676697b748f41afa2568804e13154c2981230a78c7992a9cb6b8521b34e55a","title":"SAML authentication","path":"/pam-technical-documentation/5.4/saml-authentication","children":[{"id":"ci_bfa2e1ed65cc7558a3c3c9efdca9ad434e09f983ebc319097a64d989d6083383","title":"OneLogin SAML","path":"/pam-technical-documentation/5.4/onelogin-saml","children":[]},{"id":"ci_5306f33c1bbf53d00b4946de16ed5ac76eba73cf3d71b8c89538ac0707264678","title":"Okta SAML","path":"/pam-technical-documentation/5.4/okta-saml","children":[]},{"id":"ci_e55f9cc82ffd2c780e73e7909901440402ce7418fd06367df1f639b50f78c859","title":"Duo SAML","path":"/pam-technical-documentation/5.4/duo-saml","children":[]}]},{"id":"ci_8cc6a6c1a4be5ad9cb54162ca35aac1ba765cfd4b9104a70fede54e8d6f769a3","title":"Radius authentication","path":"/pam-technical-documentation/5.4/radius-authentication","children":[]},{"id":"ci_9e233f76dcd56ef75da04d029281825dda04f94bf1158c965fd6d6f12628f717","title":"Sectona authentication","path":"/pam-technical-documentation/5.4/sectona-authentication","children":[]}]},{"id":"ci_143f389cae74b928cdee351ceec844fd51af8456cae972b9878c92c9abe27527","title":"Configuring the setup for Password Rotation in Windows and Unix Privilege Account","path":"/pam-technical-documentation/5.4/configuring-the-setup-for-password-rotation-in-win","children":[]},{"id":"ci_3d63ac9de4a06463c9c271974c5df00baa8cf77d9af8572bd77e282d9e2d29cb","title":"Securing & Monitoring Sessions","path":"/pam-technical-documentation/5.4/securing-monitoring-sessions","children":[{"id":"ci_788e7580fe8c2520c6df484f8a3b91782dfa890bf4a752f56fd5872262a6c1f0","title":"Configuring RDPD Proxy","path":"/pam-technical-documentation/5.4/configuring-rdpd-proxy","children":[]},{"id":"ci_0579cc42bb8ac5c0d758471244b873b9a9ccd57addb385314d9523c0d6a784fa","title":"Configuring Remote Session Host","path":"/pam-technical-documentation/5.4/configuring-remote-session-host","children":[]},{"id":"ci_5693fd49b87337e425ca4b8c08bfaacefddd6547f6ecb6d6b5c343663377d7ed","title":"Configuring a Session Proxy & Web Session Proxy","path":"/pam-technical-documentation/5.4/configuring-a-session-proxy-web-session-proxy","children":[]},{"id":"ci_0165a6fcd49fff2f22c0afd4f57ca9775cf16166c6bc2b0b0d9e821a30a5fe4b","title":"Configuring Jump Host","path":"/pam-technical-documentation/5.4/configuring-jump-host","children":[]},{"id":"ci_e5dc5e34eea96b2d97659657e625c277d535c08018e270ab49bf15d5af1d0d5e","title":"Configuring SSHD Proxy","path":"/pam-technical-documentation/5.4/configuring-sshd-proxy","children":[]}]},{"id":"ci_7f6a2828dd54a179b87358d0673f9881496bacc4666f58a49a3136dd1ab56f1c","title":"Integrating Ticketing Systems","path":"/pam-technical-documentation/5.4/integrating-ticketing-systems","children":[{"id":"ci_a8ca2af5b52d912d7335a3c7e62d19b3e58c821319643a6fad874a2971886bb3","title":"Jira Cloud","path":"/pam-technical-documentation/5.4/jira-cloud","children":[]}]},{"id":"ci_5404d98d247aa65ad5f2590772ad9638b7b84beb8f2024c295daf76aba828bfe","title":"Configuring Multi-factor authentication","path":"/pam-technical-documentation/5.4/configuring-multi-factor-authentication","children":[{"id":"ci_79352ecfacbca92f32561820cf285e589a7ca9b0aea8fbb45ae23d7b3e4871ab","title":"Sectona MFA","path":"/pam-technical-documentation/5.4/sectona-mfa","children":[]},{"id":"ci_ba962a16c63f82358d0b58adc411054886ffe9e29f4c64bf08ee3669d84bae03","title":"DUO MFA","path":"/pam-technical-documentation/5.4/duo-mfa","children":[]},{"id":"ci_79301e8f267509385cb3510eae6991b7a8db3c5afd691af7075d6851fd631642","title":"Okta MFA","path":"/pam-technical-documentation/5.4/okta-mfa","children":[]},{"id":"ci_11c631c4a95b391f34abc64fe7c42f8ef4a5d137e0a222fc5cb17c47a4d80a38","title":"OneLogin MFA","path":"/pam-technical-documentation/5.4/onelogin-mfa","children":[]},{"id":"ci_021856b02162868235315817b88c598e0119f96227fb9229ec1dfa109f2209b8","title":"Google Authenticator","path":"/pam-technical-documentation/5.4/google-authenticator","children":[]},{"id":"ci_9f5fc7cb51af6c7fab19f0ec4f4022f5a4b37f5e85158e1989cae7f485a70116","title":"RSA SecureID","path":"/pam-technical-documentation/5.4/rsa-secureid","children":[]},{"id":"ci_0b7d23da2b481fa2355d356fcda270ee5fcade5e9949656a5f9deaf6e3346a29","title":"Vasco","path":"/pam-technical-documentation/5.4/vasco","children":[]},{"id":"ci_86f9e78741579fb5d7a5fc80ad65a9c795f4bcbe5973768d224654edd4a8df8d","title":"Generic RADIUS","path":"/pam-technical-documentation/5.4/generic-radius","children":[]},{"id":"ci_0905e6599e62c3f19524d63bd112c03df20ccc25e49aa525ee0766e9ba8bc507","title":"Microsoft Authenticator","path":"/pam-technical-documentation/5.4/microsoft-authenticator","children":[]},{"id":"ci_4d25298759c1575ffcf628eb1542ef5c28f4c93fc40c01daf4eb0f8249c1fe9c","title":"FIDO2","path":"/pam-technical-documentation/5.4/fido2","children":[]},{"id":"ci_45302aad290ea57b041bd6e71b995c6145932fecf60288ce5038f75d4625490c","title":"Biometric","path":"/pam-technical-documentation/5.4/biometric-authentication","children":[]}]},{"id":"ci_2f568adf06f547333c3f6333d92f91530cddc13f7eb612e1b22174c3609d8118","title":"Working with multi-tenant environment","path":"/pam-technical-documentation/5.4/working-with-multi-tenant-environment","children":[]},{"id":"ci_3336ab623ea20f166d9f60a95ad1f42b791604192aa50fe8bdd77efe03fbc38f","title":"Backing up, Restoring, and Archival","path":"/pam-technical-documentation/5.4/backing-up-restoring-and-archival","children":[]},{"id":"ci_ee90db453416df14dd9a1b738f4c72dc10613b085546fd8a062b8e74d32ae8fb","title":"Configuring Notifications","path":"/pam-technical-documentation/5.4/configuring-notifications","children":[{"id":"ci_c3ef9e90cd6251a8da5a57da18bc007b9d56d15745613fbac9669c16ed45ac12","title":"Key concepts & Capabilties of Notification Service","path":"/pam-technical-documentation/5.4/key-concepts-capabilties-of-notification-service","children":[]},{"id":"ci_0a40ea13a91af06756de5dfc04e53ec6caa84f5b3490b7acd3e336617c595138","title":"Architecture & flow of Notification Service","path":"/pam-technical-documentation/5.4/architecture-flow-of-notification-service","children":[]},{"id":"ci_c59a260a6706632aef81bd8280cf76c734ce4e3a7bae5297cb8987faebacc986","title":"Using Notification templates","path":"/pam-technical-documentation/5.4/using-notification-templates","children":[]},{"id":"ci_80cc385339b6066272d37a03b8e58d6bfd0b1cb153b42a9220eb4306a4ade6bc","title":"Setting up Notifications","path":"/pam-technical-documentation/5.4/setting-up-notifications","children":[]}]},{"id":"ci_7c97272eb3bddd5a9935e1e5b89468a9300c50405f7edcab20e92e0e76050160","title":"Configuring Satellite Vault for break glass","path":"/pam-technical-documentation/5.4/configuring-satellite-vault-for-break-glass","children":[{"id":"ci_532329ab5ccf91f4e43fe84ad11aa4ae5b2ff7e55922e61c753655fffb6c1432","title":"Accessing Satellite Vault","path":"/pam-technical-documentation/5.4/accessing-satellite-vault","children":[]}]},{"id":"ci_39f5217eba465672d87b4e73a260ff547e195e24a8a0459d70f3708a8967972f","title":"Forwarding Logs","path":"/pam-technical-documentation/5.4/forwarding-logs","children":[]},{"id":"ci_7cd8df6d1683e11299e8b01ca86d34a7a98dc38962553dae9a5e3bc0ffae87e0","title":"IBM QRadar Integration","path":"/pam-technical-documentation/5.4/ibm-qradar-integration","children":[]}]},{"id":"ci_39c50bede6d69e2b99dc80952a6697eadca0a50f1ba1af3560c0e02e31577379","title":"Administer","path":"/pam-technical-documentation/5.4/administer","children":[{"id":"ci_ac12538ed9fcc0ffd4a4d2f2e4ba389ebf4426d6a601a08d046be2ba111bb3db","title":"Managing assets & access types","path":"/pam-technical-documentation/5.4/managing-assets-access-types","children":[{"id":"ci_f48f4921f40c56987db544595e4d9f577d526ecab7d7a535def9b77bd840a3ae","title":"Adding assets in the system","path":"/pam-technical-documentation/5.4/adding-assets-in-the-system","children":[]},{"id":"ci_9df678c9fdcba03e2becc30b6edcc3e9d2198aeebe44859da66e0470e7194827","title":"Managing access types","path":"/pam-technical-documentation/5.4/managing-access-types","children":[]}]},{"id":"ci_a7ced4ad2df114fdaa0093fd16b6d21816401bbacbf2e4169a08416983e832a1","title":"Configuring a Kubernetes Cluster","path":"/pam-technical-documentation/5.4/5-configuring-a-kubernetes-cluster","children":[]},{"id":"ci_3858703e5c7ac2e5456b5c2a3bf8df98809449bdd8b230c547c0d0171693456e","title":"Managing accounts & keys","path":"/pam-technical-documentation/5.4/managing-accounts-keys","children":[{"id":"ci_f71b1e6b7b7d24f3afd8887726ea058b5e5aabf2e07d8684a9003a847bd61ddb","title":"Onboarding accounts in vault","path":"/pam-technical-documentation/5.4/onboarding-accounts-in-vault","children":[]},{"id":"ci_8bf33ecd07816754e43df137cfc67804147c5fdcbeb6ceab2870f78c063ba25e","title":"Managing account operations","path":"/pam-technical-documentation/5.4/managing-account-operations","children":[]},{"id":"ci_4e907d241ab00f6de2eae9ad3542c3d646288700cfaa286d6ae1826c0a5aa496","title":"Working with account groups","path":"/pam-technical-documentation/5.4/working-with-account-groups","children":[{"id":"ci_fed79354c9dc0a842b2b340d4cfe2eb72890d3298389d677e27d5f734c5a73a0","title":"Account group management","path":"/pam-technical-documentation/5.4/account-group-management","children":[]},{"id":"ci_d4aee73ac3fe48c9643d0dbfe2ad42e90e26d30d24b0ba4acdce45f92722d5e1","title":"Account group operations","path":"/pam-technical-documentation/5.4/account-group-operations","children":[]}]}]},{"id":"ci_ba76b1711c32de514438de265807eba3f2edc0c668d53330b4dc4baf60e69be1","title":"Managing user & authentication","path":"/pam-technical-documentation/5.4/managing-user-authentication","children":[{"id":"ci_996f5f68288d8923330317e70d0e443dcb892c6538c3814ca3f2212d7d63c099","title":"Adding users in the system","path":"/pam-technical-documentation/5.4/adding-users-in-the-system","children":[]},{"id":"ci_ae6535ad9a276e2228ab70b5b6ead4c884f745e7e50c657100ad94c8a760a86e","title":"Managing user roles","path":"/pam-technical-documentation/5.4/managing-user-roles","children":[]},{"id":"ci_144e2138496675b20aadb24eebebee3ea2bae14563fc1b7bd4d00e3bf2cf215b","title":"User authentication settings","path":"/pam-technical-documentation/5.4/user-authentication-settings","children":[]},{"id":"ci_19be020a30bf1986cd742d353e482b0d7e14bb60fa5856304288423b26aedb7f","title":"Defining user groups","path":"/pam-technical-documentation/5.4/defining-user-groups","children":[]},{"id":"ci_334be527d1aa73fd85cf89ce3b3fe57ce50d24685f141095914be9d9e10247d4","title":"Setting up user access policy","path":"/pam-technical-documentation/5.4/setting-up-user-access-policy","children":[]},{"id":"ci_a742cd6396c605cf90648e8de2d0bbb85391fbd22bf30d28b3335b1dcd7ec2c7","title":"Setting up Logon Policy","path":"/pam-technical-documentation/5.4/setting-up-logon-policy","children":[]},{"id":"ci_f511d5bd2a8468aac1d8a1dbca470dbaab032e8b3e5a62bdd980822bc4697f44","title":"Assigning policy-based access to users","path":"/pam-technical-documentation/5.4/assigning-policy-based-access-to-users","children":[]},{"id":"ci_08744ea53b4726a3e2fc971ee376a12022cd638bbe6f91136417e99455fd7664","title":"Managing user operations","path":"/pam-technical-documentation/5.4/managing-user-operations","children":[]}]},{"id":"ci_fc2562bb2e756f1a3348a223a7acb2647fd33ddfa436e12027c46ab3a3d2d7a8","title":"Setting up password management","path":"/pam-technical-documentation/5.4/setting-up-password-management","children":[{"id":"ci_50b7dd2296f22b6c7ffda36d2d97155ca37ccc87d5bc3ebe9901e3f55547bce7","title":"Configuring password rotation policy","path":"/pam-technical-documentation/5.4/configuring-password-rotation-policy","children":[]},{"id":"ci_f8f5069fef4f0e8949687742cb48b35adf7c2f8f364d3310a198abf6817d89d1","title":"Configuring reconciliation policy","path":"/pam-technical-documentation/5.4/configuring-reconciliation-policy","children":[]},{"id":"ci_6921167ab07a685b4d93e03afb33a1a8a786387ee62358ed09d94494e12fa629","title":"Configuring password checkout policy","path":"/pam-technical-documentation/5.4/configuring-password-checkout-policy","children":[]},{"id":"ci_fc62fad9bb9f631b2933eeec76e11dc14325f59b6d52d95c203bfaa50f589c07","title":"Configuring password policy","path":"/pam-technical-documentation/5.4/configuring-password-policy","children":[]},{"id":"ci_fed932d42fd4a5c0ad7f08e780d3e5b936d1c20f67ae23ea90dac5452f0f1234","title":"Configuring management account","path":"/pam-technical-documentation/5.4/configuring-management-account","children":[]}]},{"id":"ci_5e954dcab19b8ef12ae1881098ff262bc3bc9c282578beae1cf4d7113bf2a67a","title":"Enabling Just-in-time Access","path":"/pam-technical-documentation/5.4/enabling-just-in-time-access","children":[{"id":"ci_bcb68813d277ffaafb70158aff2dc0431ead1337d2f968e3b1454dda41221763","title":"Windows platforms","path":"/pam-technical-documentation/5.4/windows-platforms","children":[]},{"id":"ci_4737b31b89a813bff37c1985de53b401e88367161896dcd1d8a7ba4c2446004c","title":"Unix platforms","path":"/pam-technical-documentation/5.4/unix-platforms","children":[]}]},{"id":"ci_a9fb954f47044032307aebd508fa315b4bfd20805219c86f3dbd55e5d1e923ad","title":"Workflow-based access","path":"/pam-technical-documentation/5.4/workflow-based-access","children":[{"id":"ci_bf7fc8b3fe95f2eca8c4430b5bb5d913068934a52f831bad077e9d93ff72cf27","title":"Enabling Maker Checker","path":"/pam-technical-documentation/5.4/enabling-maker-checker","children":[]}]},{"id":"ci_bbd24293730b0bfd15679603a68849a6ab0960915380c0027c272b9cabb4c808","title":"Managing & reviewing session Logs","path":"/pam-technical-documentation/5.4/managing-reviewing-session-logs","children":[{"id":"ci_3ac432ea34a5fe8bfb123ef19e21725fd76917c1c6ffce67d367d5f0efeb3beb","title":"View Session Recordings","path":"/pam-technical-documentation/5.4/view-session-recordings","children":[]},{"id":"ci_aed1805ab143bda2686a26bcc9ec6d54aea34ea25818cca72a1e6a923ad2cd43","title":"Viewing password checkout history","path":"/pam-technical-documentation/5.4/viewing-password-checkout-history","children":[]},{"id":"ci_d83e156e0cb31a0fe3debd7b157ffa5f0407f368e089d3cbb047e765acb8cdb2","title":"Viewing Live Sessions","path":"/pam-technical-documentation/5.4/viewing-live-sessions","children":[]},{"id":"ci_550ce1993867ce52a368c51e6f75424fd9dacccafd2dda22d091d9609e6dbc28","title":"Reviewing sessions","path":"/pam-technical-documentation/5.4/reviewing-sessions","children":[]},{"id":"ci_8b37e88fc17ecd91556d42853031c8b5c1538935ca31589a3e317cf5de243c64","title":"Monitoring or terminating live sessions","path":"/pam-technical-documentation/5.4/monitoring-or-terminating-live-sessions","children":[]},{"id":"ci_262d75c59b367a26c4bb8c5afed642a4d8075bb5fa8a5a79732fdccef317adfd","title":"Adjusting session risk scoring & threat analytics parameters","path":"/pam-technical-documentation/5.4/adjusting-session-risk-scoring-threat-analytics-pa","children":[]}]},{"id":"ci_6882ba943ca9532db1c2731c4816a6fda694255cffde8d07fb98400eb23aa2a9","title":"Managing server privileges","path":"/pam-technical-documentation/5.4/managing-server-privileges","children":[{"id":"ci_bb610d6f16898b31f549bafc643e287ec539c8dafc90c53a815871262df9ffb5","title":"Command Restriction for SSH","path":"/pam-technical-documentation/5.4/command-restriction-for-ssh","children":[]},{"id":"ci_757f6d56b980de1976a84ea19ecb815e57563b06032c39132976d7015a628927","title":"Database Query Restriction","path":"/pam-technical-documentation/5.4/database-query-restriction","children":[]},{"id":"ci_ad69f3ae0f574246b23e1b32d0a49ebf6f32b3b1bc3b83219ff713b8b400646d","title":"Application Control for Windows","path":"/pam-technical-documentation/5.4/application-control-for-windows","children":[]}]},{"id":"ci_996725d108204ec20d41ec111399e2a8301677e44009ee2d0fcdf6145af6c1fc","title":"Reporting & analytics","path":"/pam-technical-documentation/5.4/reporting-analytics","children":[{"id":"ci_61fc11f341449456d4bc7885b6b21dd93cdad56447768e7d31b6528d855c2187","title":"Viewing & exporting reports","path":"/pam-technical-documentation/5.4/viewing-exporting-reports","children":[]},{"id":"ci_ecdb32c52d79f31235e6e99f33be580c65abc68cc3bf1dc1c5f126996991e157","title":"Scheduling a Report","path":"/pam-technical-documentation/5.4/scheduling-a-report","children":[]},{"id":"ci_ca51c940a48087f217860836159631bff622fd4a83adf75e84c0f5d1e6651a13","title":"Designing & customizing reports","path":"/pam-technical-documentation/5.4/designing-customizing-reports","children":[]}]},{"id":"ci_2725824fadc9fc33fb91f48172e8cf489b34e555734cb7e896e2fa37610738a5","title":"Automating Privileged Tasks","path":"/pam-technical-documentation/5.4/automating-privileged-tasks","children":[{"id":"ci_263dc76cae97f06f37878aa0ec860752f4a5800be48472fa910e65c82dc241e9","title":"PTM key concepts & capabilities","path":"/pam-technical-documentation/5.4/ptm-key-concepts-capabilities","children":[]},{"id":"ci_516d8e4576d4cfe868141d97d321902c9e93486834bb23365538252f0223bc02","title":"Architecture, flow, & advantages of PTM","path":"/pam-technical-documentation/5.4/architecture-flow-advantages-of-ptm","children":[]},{"id":"ci_53ea41b82c8b7181f0e94c4592b07f7e610f75c8a9c0b94201a4e60ab9ee6018","title":"PTM Libraries","path":"/pam-technical-documentation/5.4/ptm-libraries","children":[]},{"id":"ci_23484a51f2b2833e14740ef126136c52cf768aeaf862ef1ede26a0b599a0e218","title":"Configuring Tasks","path":"/pam-technical-documentation/5.4/configuring-tasks","children":[]}]},{"id":"ci_ada89b5d8a871fbae4cac1e69716ab8c819c4d886d1828dd25c994d396e30bc1","title":"Account Lifecycle Management","path":"/pam-technical-documentation/5.4/account-lifecycle-management","children":[{"id":"ci_5cefcc9f88990b814a9dce402fb403a2597adc269492fd8434d009581e66a4d8","title":"Account Provisioning","path":"/pam-technical-documentation/5.4/account-provisioning","children":[]},{"id":"ci_76d737f99e34b80513f83931d1a5ad8a43e58e0bece5933f4308a72f1eaa5a16","title":"Manage Provisioned Accounts","path":"/pam-technical-documentation/5.4/manage-provisioned-accounts","children":[]}]},{"id":"ci_9292912a0510af40667bc0c0a8c9116615c33febc62f93111e4883478334dca0","title":"Windows Monitoring Agent","path":"/pam-technical-documentation/5.4/windows-monitoring-agent","children":[]},{"id":"ci_b1a1e111fc8bd7a6214dbf26f447d74fcf804da3925c03a2715269476f805980","title":"Managing the system","path":"/pam-technical-documentation/5.4/managing-the-system","children":[{"id":"ci_8bccb70f4154616d13fc9d8b6e6539696a9d7bf11f4ff0c3c307cc4e643aa408","title":"Monitoring System Health & Service Status","path":"/pam-technical-documentation/5.4/monitoring-system-health-service-status","children":[]},{"id":"ci_c2954bf9d83fccf88572588a1ca04533832cc21502925a58d92a57d6d0a09f76","title":"Dashboard","path":"/pam-technical-documentation/5.4/dashboard","children":[]},{"id":"ci_244fdb655a067433788fad7d1e2348e9c432dee523992f682596479ec808f5b0","title":"Managing Licenses","path":"/pam-technical-documentation/5.4/managing-licenses","children":[]},{"id":"ci_ee087569e1c87a6ffef4be641c0b233650a6b05f7cac2f29fb2313ea1f84487f","title":"Using troubleshooting utilities","path":"/pam-technical-documentation/5.4/using-troubleshooting-utilities","children":[]},{"id":"ci_4c4b7b3a02c51e1c503a3a2a14205ed48f58cd30ac9ae8f6a42b64dbeb0e57d4","title":"Auditing system changes","path":"/pam-technical-documentation/5.4/auditing-system-changes","children":[]}]},{"id":"ci_8faee29a29cc47b7796d5c105738b64acff8af6b7cf385cf77aa79d4dd73dce1","title":"Running discovery","path":"/pam-technical-documentation/5.4/running-discovery","children":[{"id":"ci_8dd931516142d2d89885a51a3416a087459c13049d30dffc67f38578881c1105","title":"Viewing Discovery Map","path":"/pam-technical-documentation/5.4/viewing-discovery-map","children":[]},{"id":"ci_c4d38b2656d05af61685c725128945a703bc8a0b2d30aa9c0f4f2ad8524cde4a","title":"Handling assets and accounts manually from discovery","path":"/pam-technical-documentation/5.4/handling-assets-and-accounts-manually-from-discove","children":[]},{"id":"ci_0b3738e9b20288ce4a0e6e536288456a2878e543a053cd8c36aaeac91ba942fc","title":"Schedule account discovery jobs","path":"/pam-technical-documentation/5.4/schedule-account-discovery-jobs","children":[]},{"id":"ci_1499255b072a35940f239a4d5f075798ccaeac47d84ef3cdc865f5a1cb796780","title":"Configuring credentials","path":"/pam-technical-documentation/5.4/configuring-credentials","children":[{"id":"ci_1d4bd47824a19f3e831fd700ca957ae8c25ecde749724177909803fc36410e09","title":"Sectona Vault Credential Resolver for ServiceNow","path":"/pam-technical-documentation/5.4/sectona-vault-credential-resolver-for-servicenow","children":[]}]},{"id":"ci_1c8eefe2dd6b055a2c8c4284f02a6f2319d0b86e407c43797f0fb4dda78a362c","title":"Setting up asset discovery","path":"/pam-technical-documentation/5.4/setting-up-asset-discovery","children":[{"id":"ci_6d69a6df1e81b49792eb4514dd851c0127e63c881561d78b0ff3d7cbb3cad77c","title":"Microsoft Azure Resources","path":"/pam-technical-documentation/5.4/microsoft-azure-resources","children":[]},{"id":"ci_8cc8daafa033d0f29d4db8b90edb331c3f6142336612d38ac1a72a8bfa8c77a7","title":"Amazon Web Services (AWS) resources","path":"/pam-technical-documentation/5.4/amazon-web-services-aws-resources","children":[]},{"id":"ci_8893e682f6018633fcdd8be57a213d1067ccdb5d4bfc2e0c68d41e0d72dc33b2","title":"Network scan","path":"/pam-technical-documentation/5.4/network-scan","children":[]},{"id":"ci_1885615425e24219604ae45611d1e164508dba234873e2a0aeb2f4fb791b032d","title":"Google Cloud","path":"/pam-technical-documentation/5.4/google-cloud","children":[]},{"id":"ci_c15654a36a3c98f0d80b0b95037cb6eea5edadb13adb96ed065333a2e140299d","title":"SNMP Discovery","path":"/pam-technical-documentation/5.4/snmp-discovery","children":[]},{"id":"ci_19c3f9d34649f3c249c75b0bbaedb96a3aa67b8cabc72a6fdc916815039098fd","title":"VMware workloads","path":"/pam-technical-documentation/5.4/vmware-workloads","children":[]},{"id":"ci_895083992efc0b9d9ae501188b0d259fb868a6879b7314ec42cd8dc75831ccd7","title":"Hyper-V Asset Scan","path":"/pam-technical-documentation/5.4/hyper-v-asset-scan","children":[]},{"id":"ci_1331d77dbb7af693d8e55d3fa540217c041593d0121b9b484fc7037732ccbab6","title":"Active Directory (AD)","path":"/pam-technical-documentation/5.4/active-directory-ad","children":[]}]}]}]},{"id":"ci_b890cf98f4c20525a9dacf1aaedae851e09a1c82f384183862aae457aa8836ac","title":"Develop","path":"/pam-technical-documentation/5.4/develop","children":[{"id":"ci_ee2d6781bf074a8188a5bb3b719349dd9a459da131938230e3b50ff7fd92f939","title":"Vault API Registration","path":"/pam-technical-documentation/5.4/vault-api-registration","children":[]},{"id":"ci_8af949d7765756c648b776333123efc3d6aaaa6b77903ada8d6764bbb7cb598a","title":"HTTP POST Headers","path":"/pam-technical-documentation/5.4/http-post-headers","children":[]},{"id":"ci_c65cc2b59906de12c5cc41baf0d54c5d8beb9fb9828cccec1f0f4d97f9e69c3b","title":"Management APIs","path":"/pam-technical-documentation/5.4/management-apis","children":[{"id":"ci_7225a07ae77b5635f2b2f4b93c740a6cf8f58d18f50bfa750f2aec7f21e06b97","title":"API - Manage User","path":"/pam-technical-documentation/5.4/api-manage-user","children":[]},{"id":"ci_e69ea1ecadb3e324763501ee4c509a5e371c08ccbde0c8f9bcbe63ac3d3b2c6c","title":"API - Manage Asset","path":"/pam-technical-documentation/5.4/api-manage-asset","children":[]},{"id":"ci_8ac592b66527e91b218d4782b4ed55ec2a8202532111edd660eb896e789424e1","title":"API - Manage Account","path":"/pam-technical-documentation/5.4/api-manage-account","children":[]},{"id":"ci_63846a6a6e554d98f42554af023f23717ace8de238028c115384a685f2de1985","title":"API - Get Instance Information","path":"/pam-technical-documentation/5.4/api-get-instance-information","children":[]},{"id":"ci_eb2eaa79605ce9741b11f4e9159377777e2c876833a210dad43b24798398099b","title":"API - Get User Groups Information","path":"/pam-technical-documentation/5.4/api-get-user-groups-information","children":[]},{"id":"ci_87789021be2c0b9581db9aa4b3cf279c3c73d59c0bb6ab3a42b07349bb04511b","title":"API - Get Users by Group","path":"/pam-technical-documentation/5.4/api-get-users-by-group","children":[]},{"id":"ci_41c019da3c624eed7e50bad94d7005083484691035a49a5e6a817ac4914fb3af","title":"API - Get Users Information","path":"/pam-technical-documentation/5.4/api-get-users-information","children":[]},{"id":"ci_3e5f961f1637281ffe2529eb50a5ba750eca65f2e0c7b4f80eb7abf4afbb0e93","title":"API - Map, Un-map User with User Group","path":"/pam-technical-documentation/5.4/api-map-un-map-user-with-user-group","children":[]},{"id":"ci_6e7f608eb3d04e91d732037de09a698e7eec777d119cb1a22471a7aa1a29c27a","title":"API - Get Assets","path":"/pam-technical-documentation/5.4/api-get-assets","children":[]},{"id":"ci_b73dc1f04628049d729cc2fa01d44a7b8b748e33bbd6010243124ca29587246c","title":"API - Get Account Groups","path":"/pam-technical-documentation/5.4/api-get-account-groups","children":[]},{"id":"ci_9da14e32e2962dd5c179c53a23e1af0198b68ef8d8f215639ebc82fe8865f2fe","title":"API - Get Accounts by Asset","path":"/pam-technical-documentation/5.4/api-get-accounts-by-asset","children":[]},{"id":"ci_6b5d3cff7e01cf74109075cd02ff6db2ec4421de411cf4d87c5e6eb11d3c107e","title":"API - Get Accounts by Account Groups","path":"/pam-technical-documentation/5.4/api-get-accounts-by-account-groups","children":[]},{"id":"ci_12d793294f099311174011340185e4bce3c936a8d3815c82be3cea3f0b6a305c","title":"API - Map Un-map Account with Account Group","path":"/pam-technical-documentation/5.4/api-map-un-map-account-with-account-group","children":[]},{"id":"ci_d2f0e39076ec8e4b1ffdde3c27225d1c4551bfb8e1a360fa26aa5f5e163b83da","title":"API - Get Entitlement","path":"/pam-technical-documentation/5.4/api-get-entitlement","children":[]},{"id":"ci_08114651475fb48326e3d8d2e85ef85dd2864e1f3408c1dc292e93a2b8605c09","title":"API - Get Discovered Accounts","path":"/pam-technical-documentation/5.4/api-get-discovered-accounts","children":[]},{"id":"ci_16543a050bab549e7bdb04af9eed7f113e3b71a44308fa92ca1bbdcf3af8a247","title":"API - Get Discovered Assets","path":"/pam-technical-documentation/5.4/api-get-discovered-assets","children":[]},{"id":"ci_c388923a2fd8190797c20233a5559081a6cf63e742b4d01ea2f7bc3fff862f86","title":"SCIM API - User Creation","path":"/pam-technical-documentation/5.4/scim-api-user-creation","children":[]},{"id":"ci_b7a745271a4b561734fa3de21f50bf62702d2cd9ea7fa41e414345b7b2b142de","title":"SCIM API - User Modification","path":"/pam-technical-documentation/5.4/scim-api-user-modification","children":[]}]},{"id":"ci_24f565237da58b0764cece0a9eec581fadad32d86336c00ffc17e4f750779fec","title":"Vault Password API Headers","path":"/pam-technical-documentation/5.4/vault-password-api-headers","children":[]},{"id":"ci_d217a36c490f0f02ef574d4232a6756ffab7a5e038733d4e69308ca5e33d3c67","title":"Password Vault APIs","path":"/pam-technical-documentation/5.4/password-vault-apis","children":[{"id":"ci_c55521881cb401bbaa212a3448e4dcbd2f95272bbf4ec92607ae7a4451e8164d","title":"API - Password Vault","path":"/pam-technical-documentation/5.4/api-password-vault","children":[]}]},{"id":"ci_caadf9ad770e319a5982201aa6a7db3c49b0fed643e2dc0eeb787dd8195a83bd","title":"Response Error Codes","path":"/pam-technical-documentation/5.4/response-error-codes","children":[]}]},{"id":"ci_c66c297c985f814cde686aaaed18b7e075ea9d949665d890c1aed5da43ef60a4","title":"Use","path":"/pam-technical-documentation/5.4/use","children":[{"id":"ci_527fee57dfa1f89ec3a409261aa5ef57836092ded04516279408300964f09cb9","title":"Launching the product","path":"/pam-technical-documentation/5.4/launching-the-product","children":[]},{"id":"ci_2781c7956b9f7def4925dfd434d277618759766d71cd6bb1535ac1df75b3102f","title":"Accessing a Target Asset","path":"/pam-technical-documentation/5.4/accessing-a-target-asset","children":[{"id":"ci_a8ab981e744a75582f63e67d26d9650117f6a5a4c29ce6e14ed8a6c524120c38","title":"Collaborating session","path":"/pam-technical-documentation/5.4/collaborating-session","children":[]},{"id":"ci_8e00696d2e094b41a465183759f0c82b04be05bdb9bbe7c2ee4b1f83d08bd3e9","title":"Working with assets","path":"/pam-technical-documentation/5.4/working-with-assets","children":[]}]},{"id":"ci_6b700101fbd08f588dd2368eaa9bd1e184c2eef807802b56ed2f9942ae746958","title":"Using workflow","path":"/pam-technical-documentation/5.4/using-workflow","children":[{"id":"ci_5c7a1936cda3caf9dfdb01765b02c87202c744218a20e14cdc4721e8067b32db","title":"Raising a request","path":"/pam-technical-documentation/5.4/raising-a-request","children":[]},{"id":"ci_bb28e6afe07657ace9b1aed8410c0795ec8b9e005c91ef70a8c5d299ab3bd98f","title":"Managing approvals","path":"/pam-technical-documentation/5.4/managing-approvals","children":[]}]},{"id":"ci_877ef0ccf6a737876fe4a83c2ba8d6cc030c99871d5ba9fc7228050b7addee82","title":"Executing tasks","path":"/pam-technical-documentation/5.4/executing-tasks","children":[]},{"id":"ci_b9ba26acfec6ad2bda23a4528896a05072aeafd3f9a1d053d72ff16eacdf4d62","title":"Accessing secrets during break glass","path":"/pam-technical-documentation/5.4/accessing-secrets-during-break-glass","children":[]}]}]