Administrator UI
When an administrator accesses the admin console, PingOne Privilege provides a centralized user interface to manage and monitor privileged access across your organization.
Directory
-
* Service Accounts: Review and approve service account requests for when users need programmatic or automation-based access.
-
Users: Provides a centralized view to manage users, including
AdministratorandDevOpsroles. -
Groups: Provides a centralized view to manage groups for organizing collections of users.
-
Devices: Enables management of devices registered to particular users, including viewing device details and activating or deactivating an existing device.
Cloud
-
Clouds: Onboard cloud accounts from AWS, Azure, and GCP to manage access to cloud resources.
-
Gateways: Configure and manage private gateways that facilitate secure access to resources in private networks.
Access Management
-
Targets: View and manage targets discovered from connected cloud accounts.
-
Resources: View and manage resources discovered from connected cloud accounts.
-
Applications: View and manage internal WebApps and Security Assertion Markup Language (SAML) apps configured for just-in-time (JIT) access.
-
IAM Roles: Import AWS-managed and custom policies for just-in-time (JIT) access.
-
Access Requests: View, approve, or reject access requests submitted by users.
-
Policies: Create and manage access policies that define rules for granting access to resources.
-
Bundles: View and manage bundles that group related resources for simplified access management.
-
Tags Policies: View and manage tags policies.
Activity
-
Activity Logs: View comprehensive activity records of all user actions.
-
Session Logs: View your own SSH, database, RDP, Kubernetes, ECS, and MCP session records
Settings
-
Integrations: Configure integrations with third-party applications and services.
-
RDP User Management: Create new RDP users.
-
Service Management: Create and manage service controllers that facilitate access to services running in private networks.
-
Proxy Management: Create and manage proxy controllers that enable secure access to resources behind firewalls.