PingOne Privilege

Administrator UI

When an administrator accesses the admin console, PingOne Privilege provides a centralized user interface to manage and monitor privileged access across your organization.

Directory

  • * Service Accounts: Review and approve service account requests for when users need programmatic or automation-based access.

  • Users: Provides a centralized view to manage users, including Administrator and DevOps roles.

  • Groups: Provides a centralized view to manage groups for organizing collections of users.

  • Devices: Enables management of devices registered to particular users, including viewing device details and activating or deactivating an existing device.

Cloud

  • Clouds: Onboard cloud accounts from AWS, Azure, and GCP to manage access to cloud resources.

  • Gateways: Configure and manage private gateways that facilitate secure access to resources in private networks.

Access Management

  • Targets: View and manage targets discovered from connected cloud accounts.

  • Resources: View and manage resources discovered from connected cloud accounts.

  • Applications: View and manage internal WebApps and Security Assertion Markup Language (SAML) apps configured for just-in-time (JIT) access.

  • IAM Roles: Import AWS-managed and custom policies for just-in-time (JIT) access.

  • Access Requests: View, approve, or reject access requests submitted by users.

  • Policies: Create and manage access policies that define rules for granting access to resources.

  • Bundles: View and manage bundles that group related resources for simplified access management.

  • Tags Policies: View and manage tags policies.

Activity

  • Activity Logs: View comprehensive activity records of all user actions.

  • Session Logs: View your own SSH, database, RDP, Kubernetes, ECS, and MCP session records

Settings

  • Integrations: Configure integrations with third-party applications and services.

  • RDP User Management: Create new RDP users.

  • Service Management: Create and manage service controllers that facilitate access to services running in private networks.

  • Proxy Management: Create and manage proxy controllers that enable secure access to resources behind firewalls.