Skip to main content
Question

How to map non-shared manage accounts to User Group

  • January 5, 2025
  • 5 replies
  • 175 views

Forum|alt.badge.img+3

Hi Guys, How can we achieve below use case ?

"There are four members in the firewall team have their own manage accounts(Non-AD Accounts). Customer want to create one user group to grouping these members. When one member login to the PAM ,he should be able to view hist credential/manage account only." 

5 replies

Forum|alt.badge.img+3
  • Apprentice
  • January 6, 2025

For this you can utilize the dedicated accounts mapping option for local privileged accounts.

For this you need below things:

  1. Dedicated local privileged accounts. ex. Amila_admin
  2. User accounts: Amila

Create a dedicated account mapping smart rule, to map _admin prefix with the users group.

Then the user will only able to see their own dedicated accounts.


GloriaB
BeyondTrust Employee
  • BeyondTrust Employee
  • January 6, 2025

 

Here is a kb article regarding setup:

How to setup dedicated accounts


Forum|alt.badge.img+3
  • Author
  • Trailblazer
  • January 7, 2025

@RahulB  ​@GloriaB

Can this dedicated accounts works for firewall accounts ? Each user has their own firewall local account. 


Forum|alt.badge.img+3
  • Apprentice
  • January 7, 2025

Yes it will work, as long as you have dedicated accounts, but make sure that in the privileged accounts there is a prefix or postfix so that the dedicated mapping can work with the users group.


rhagerm
Forum|alt.badge.img
  • Rising Star
  • January 13, 2025

When setting these up, spelling is everything. We have accounts and privileged accounts. I had a few users where their primary account was something like msmith for Mike Smith and an elevated account of msmit.priv. I was mapping on .priv so msmith does not match msmit

I had these handful of anomalies renamed to include the full spelling of the primary account. (added the h to smit in the privileged account).