About the PAM Resources Page
To use PAM, you interact with the PAM Resources Page. To access the page, select Privileged Access > Request Access from the navbar.
This takes you to the PAM Resources page. This page is comprised of a number of tabs and Action links for accessing and working with PAM resources. The number of resources you see will vary according to the access given to you by your administrator.
The tabs available on this page include:
Computers – Displays computers with vaulted credentials to which you can request access. Provides two views to allow you to view all computers with vaulted credentials and those currently checked out. For information on how to request access to computers, see Request Computer Sessions.
Credentials – Displays a list of non-computer vaulted credentials to which you can request access. Provides two views to allow you to view all non-computer vaulted credentials and those currently checked out. Non-computer credentials include those used for accessing applications. For information on requesting access to credentials, see Request Shared Credentials.
Check-Out Records – Displays a history of checked-out credentials, including those currently checked out by users.
Secrets – Display a list of secrets to which you have access. For information on how to create a secret, see Create Secrets.
Depending on the tab selected and the amount of access you have, you may or may not see Action links. When clicked, Action links initiate a workflow in EmpowerID. In the below image, the logged-in user sees the Create Master Password Action link on the Secrets tab. A master password is used by EmpowerID to create a PKI (Public and Private) key that is linked to your person. This key is used to encrypt and decrypt data on your behalf. When you create a secret or use PAM for the first time, you will need to create a master password. Then each time you check out a credential, create or view a secret or password, you use your master password to unlock the credential or secret.Â