Skip to main content
Question

Managed Accounts Best practices

  • October 11, 2025
  • 1 reply
  • 19 views

What are the best practices for configuring managed accounts for non-privileged access?

For example, 200 developers who need access to multiple servers.

What is the recommended best practice in this scenario?

Specifically: Should each developer have an individual non-privileged domain account?

Is there a better approach for managing a large number of non-privileged users accessing multiple servers (e.g., using groups, role-based access, PAM, etc.)?

Very important: We do not want one developer’s session to be accessible or “stealable” by another developer.

Looking for guidance on how organizations typically handle this setup securely and efficiently.

1 reply

  • BeyondTrust Employee
  • October 13, 2025

Every organization will have its own requirements and process, we don’t have a best practice but there are some smart rules example. You can review the smart rules examples on granting access to assets, Link a Managed Account to a Managed System, Granting access, Granting access to Managed Systems. 

https://beyondtrustcorp.service-now.com/csm?id=kb_article_view&sysparm_article=KB0019021

 

To ensure there’s no session hijacking for RDP session you can configure the access policies to prevent these from happening and limit the number of concurrent session.

https://beyondtrustcorp.service-now.com/csm?id=kb_article_view&sysparm_article=KB0017978