PingOne Privilege

Administrator UI

When an administrator accesses the admin console, PingOne Privilege provides a centralized user interface to manage and monitor privileged access across your organization.

Directory

  • Users: Provides a centralized view to manage users, including Administrator and DevOps roles.

  • Groups: Provides a centralized view to manage groups for organizing collections of users.

  • Service Accounts: Review and approve service account requests for when users need programmatic or automation-based access.

  • Workloads: Create and manage workloads that represent applications or services requiring access.

  • Devices: Enables management of devices registered to particular users, including viewing device details and activating or deactivating an existing device.

  • Identity Providers: Configure and manage identity providers (IdPs) that authenticate users for access to resources.

Cloud

  • Clouds: Onboard cloud accounts from AWS, Azure, and GCP to manage access to cloud resources.

  • Gateways: Configure and manage private gateways that facilitate secure access to resources in private networks.

Access Management

  • Targets: View and manage targets discovered from connected cloud accounts.

  • Resources: View and manage resources discovered from connected cloud accounts.

  • Applications: View and manage internal WebApps and Security Assertion Markup Language (SAML) apps configured for just-in-time (JIT) access.

  • IAM Roles: Import AWS-managed and custom policies for just-in-time (JIT) access.

  • Access Requests: View, approve, or reject access requests submitted by users.

  • Policies: Create and manage access policies that define rules for granting access to resources.

  • Bundles: View and manage bundles that group related resources for simplified access management.

Activity

  • Activity Logs: View comprehensive activity records of all user actions.

  • Session Logs: When enabled, view detailed records of all SSH and database sessions.

Settings

  • Integrations: Configure integrations with third-party applications and services.

  • AD Domain Controllers: Create new controllers for non-domain joined and domain-joined machines

  • Service Controllers: Create and manage service controllers that facilitate access to services running in private networks.

  • Proxy Controllers: Create and manage proxy controllers that enable secure access to resources behind firewalls.