Deploy Privileged Identity
Privileged Identity can be deployed centrally to manage one or more domains, whether trusted or untrusted. It also adds management capabilities to DMZ systems or offline machines across multiple platforms.
- gain control of privileged credentials and sessions
- remove permanent administrative access
- audit when access is granted, and to whom
- audit what a user does with that access
This guide describes some of the key concepts when deploying Privileged Identity, including database, zone processors, high availability, and more.