Snow

Iraje Privileged Identity Management™

Iraje Privileged Identity Management™

Product Focus:

Privileged Identity Management (PIM). PIM Manages Privileged Accounts within an organization to ensure every action/activity of these users is auditable.

Product Description:

Iraje Privileged Identity Management (PIM) provides the following capabilities:

  • Shared Account Password Management
  • Privileged Session Management
  • Super User Privilege Management
  • Application to Application Management
  • Integration with AD Bridging Tools
  • Executive Reporting
  • Benefits:


    Product Architecture:

    The solution architecture is highly scalable. It can support hundreds of users and thousands of devices. It has multiple options to support active-active or active-passive architectures.

    Iraje PIM supports Single Sign On to


    Key Features:

    • Enterprise Single Sign On
    • Agentless & Clientless solution
    • Secure browser (https) access to PIM
    • Supports Virtualization (Microsoft Hypervisor, VMware etc)
    • One Time Access
    • Time Restricted Access
    • Multiple AD integration
    • Command Level Controls (non-windows)
    • Standard Compliance Reports
    • SMS & Email alerts for defined events
    • Group based password changes
    • Maker-checker process for approvals
    • Script management with scheduler
    • Password stored encrypted in a secure vault
    • Change password of Windows, AIX, Unix, Linux, Sun Solaris, Databases, Network devices
    • Change password of services, IIS, webconfig files in applications
    • Manage hardcoded passwords
    • Highly scalable with redundant architecture
    • Highly secure format for video recordings
    • Multi Factor Authentication including centralized biometrics/OTP/Tokens
    • Role Based Access
    • 2 Factor Authentication on PIM Portal
    • i-RSA [2 Factor on target devices]
    • Auto Change Password
    • Alerts on defined events
    • Admin Discovery
    • Port Discovery
    • Command Restrictions on ssh sessions
    • Text logs and Video logs
    • Advanced Video on Demand with Active Mirror technology
    • Enterprise Password Management
    • Highly Scalable and Secure Architecture
    • i-DLP [Ability to restrict data transfer between target device and user desktops]
    • Auto Sync Password
    • Maker-checker process for approvals
    • Device Discovery
    • Active Connection Discovery
    • Blacklisting and whitelisting of commands on ssh sessions
    • Live Sessions and Recorded Sessions
    • Search commands within Videos
    • Element Management System