Administrator UI
When an administrator accesses the admin console, PingOne Privilege provides a centralized user interface to manage and monitor privileged access across your organization.
Directory
-
Users: Provides a centralized view to manage users, including
AdministratorandDevOpsroles. -
Groups: Provides a centralized view to manage groups for organizing collections of users.
-
Service Accounts: Review and approve service account requests for when users need programmatic or automation-based access.
-
Workloads: Create and manage workloads that represent applications or services requiring access.
-
Devices: Enables management of devices registered to particular users, including viewing device details and activating or deactivating an existing device.
-
Identity Providers: Configure and manage identity providers (IdPs) that authenticate users for access to resources.
Cloud
-
Clouds: Onboard cloud accounts from AWS, Azure, and GCP to manage access to cloud resources.
-
Gateways: Configure and manage private gateways that facilitate secure access to resources in private networks.
Access Management
-
Targets: View and manage targets discovered from connected cloud accounts.
-
Resources: View and manage resources discovered from connected cloud accounts.
-
Applications: View and manage internal WebApps and Security Assertion Markup Language (SAML) apps configured for just-in-time (JIT) access.
-
IAM Roles: Import AWS-managed and custom policies for just-in-time (JIT) access.
-
Access Requests: View, approve, or reject access requests submitted by users.
-
Policies: Create and manage access policies that define rules for granting access to resources.
-
Bundles: View and manage bundles that group related resources for simplified access management.
Activity
-
Activity Logs: View comprehensive activity records of all user actions.
-
Session Logs: When enabled, view detailed records of all SSH and database sessions.
Settings
-
Integrations: Configure integrations with third-party applications and services.
-
AD Domain Controllers: Create new controllers for non-domain joined and domain-joined machines
-
Service Controllers: Create and manage service controllers that facilitate access to services running in private networks.
-
Proxy Controllers: Create and manage proxy controllers that enable secure access to resources behind firewalls.