• Votes

    3

    Active user messaging via SSHRelay

    The ability to send messages to active users connecting through relays would be valuable in the instances where people have long running sessions that intersect with ...

  • Votes

    3

    Easier credential checkout

    Currently you need to type in your e-mail address and a reason to checkout credentials. In some cases this might be useful, but for many of the use case of our customers ...

  • Votes

    2

    Filters in PAM Reporting based on contextual information

    The idea is to capture and display in PAM Reporting console additional contextual information and being able to apply filters based on such information. For example, this ...

  • Votes

    1

    Support multitenant environments

    Support multitenant environments

  • Planned

    5

    A single rule for all linux/unit machines using same privilege account ...

    If there is 100 linux/unix machines, all using the same privilege account id, for example: root Then, there is 100 x credential vault configuration for each linux/unix ...

  • Votes

    4

    Display drop down list for device IP/Hostname selection instead of ...

    The emergency request in new GUI (>3.6) allow the requester to manually input the server ip or hostname, that post another issue: 1. Case sensitive - will not match with ...

  • Votes

    3

    Show or Notify user when same RDP session is being used by other user

    Require to show or notify user when same RDP session is being used by other user to prevent disconnect other user RDP session.

  • Votes

    3

    8 second password view

    In PAM User console, for the password Checkout feature, after user checks-out, the credentials are displayed for 8 seconds and then hidden. The user can click 'Show ...

  • Votes

    1

    PowerShell privileged session through SSH relay

    By installing OpenSSH on a Windows host and setting PowerShell as default shell, PAM can do SSH relay to a Windows PowerShell session. However, PowerShell output is not ...

  • Votes

    3

    Emergency credential dump

    Many prospects have asked for the ability to recover/dump registered credentials in PAM so they can keep working outside the framework if something goes wrong with it. ...

  • Votes

    8

    Auditing the "Export Report" function

    Because of certain GDPR requirements my customer needs an enhancement for NPAM logging. They would like to see an audit entry in the "Change Management" report about any ...

  • Votes

    3

    Rest API call to block user account and/or disconnect user session

    Require to call Rest API to block user account and/or disconnect user session after fraud detection by SIEM.

  • Votes

    2

    Remove lsb dependency on Linux Agent

    The installation manual for Linux Agent PAM 3.5 states that "When you are installing PAM agent in SLES 12 or later, ensure that LSB (Linux Standard Base) version 3.0 or ...

  • Votes

    3

    Database monitoring for DB2 thru PAM Proxy

    Database monitoring for DB2 thru PAM Proxy

  • Votes

    2

    Allow per-connection contract configuration for WSFed

    The WSFed connection interface only allows for contract assignment for the protocol, not on a per-connection basis like SAML2. For connections that require different ...

  • Votes

    4

    Recovering all credentials from PAM in a list format

    Let’s suppose a disaster happened and the credentials (e.g. root, administrator) are all stored on PAM. To avoid any dependency of someone knowing each credential, it ...

  • Votes

    7

    PAM appliance

    its very cumbersome to install OS and hardened it, meet the pre-reqs and then install the Software. There must be a PAM Software Appliance.

  • Votes

    1

    Add Account Domain Credential and Host Group Command Control ...

    Have the ability to automate adding local account, domain account and DBMS local account to the credential vault. Have the ability to automate adding host to Host group ...

  • Votes

    5

    Enable input keystrokes but disable output in session recording

    We have an issue where a user of PAM could have PII or PHI data returned in their Unix sessions. We have been rolling out PAM to servers we host in EU. Our legal team ...

  • Votes

    4

    Can we also have risk of host and/or application plus the account ...

    If we have a risk rating of the endpoint being connected to then we can do the following: 1. import risk details from identity governance and other tools. 2. make rules ...