{"id":89916,"date":"2023-08-03T13:21:12","date_gmt":"2023-08-03T13:21:12","guid":{"rendered":"https:\/\/www.techopedia.com\/?post_type=definition&p=89916"},"modified":"2023-08-03T13:28:50","modified_gmt":"2023-08-03T13:28:50","slug":"privileged-access-management","status":"publish","type":"definition","link":"https:\/\/www.techopedia.com\/definition\/privileged-access-management","title":{"rendered":"Privileged Access Management"},"content":{"rendered":"

What is Privileged Access Management (PAM)?\u00a0<\/span><\/h2>\n

Privileged Access Management (PAM) is an approach to identity management designed to protect privileged user accounts against unauthorized access and misuse.\u00a0<\/span><\/p>\n

PAM solutions are designed to manage, monitor, and audit privileged accounts, such as domain<\/a>, system admin<\/a>, or root accounts, that can be used to manage or configure other user accounts and IT infrastructure<\/a> or have access credentials, secrets, or tokens.\u00a0<\/span><\/p>\n

According to <\/span>Gartner<\/span>, PAM platforms offer enterprises a number of core capabilities<\/a>, including:\u00a0<\/span><\/p>\n