Privileged Access Management (PAM) systems are generally used to replace static, well-known passwords with frequently changing, cryptographically stored passwords access to which is brokered subject to strong authentication and robust authorization and audit. In short, IT users lose their cherished administrator passwords and must instead request access to systems and applications from the PAM system, possibly subject to workflow approval and session recording.
PAM Software Offers a Friendly User Experience
IT users rarely enjoy losing access. Consequently, it makes sense to offer them a user experience that is friendly, convenient and performant, so that they gain from the PAM system at least as much as they lose when their static, shared passwords are gone.