Saviynt
##
PAM solution
standing access vs JIT access
standard PAM
- password and secrets vault
- check in check out
- password rotation
- policy based
- session recording
- keystroke logging
- full attribution
- in-session monitoring
JIT PAM
- standing privilege reduction
- migration to zero standing access
- JIT role elevation
- time bound access
- application of least privilege
- dynamic risk assessment
- credential-less access
- no jump box or client software required
real time detection and onboarding for identities, assets and workloads
- closure of timing gaps
- workload governance
- application of privilege policy
- retirement of embedded passwords
- data sprawl reduction
High-Level Architecture
microservice-based architecture
Deployment Architecture
to achieve HA: deployment in various AZ and regions assign elastic IP addresses clustering
Saviynt Connect 2.0
SC 2.0 along with VPC Peering and Virtual Private Gateway connects the Saviynt Application with the customer data center
Saviynt 23.1
EIC (Enterprise Identity Cloud)
Customizations
For the customizations that needs to be restarted, click “Restart All Services”
File Directory
Extension upload (restart)
GSP updates (restart)
Schema files
Branding Configuration
Logo
Banner
Favicon
Label management (messages.properties) (restart)
Custom images for emails (restart)
cybersecurity
]