{"id":575,"date":"2018-06-18T16:30:07","date_gmt":"2018-06-18T12:00:07","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=575"},"modified":"2019-05-21T12:37:01","modified_gmt":"2019-05-21T08:07:01","slug":"securing-iiq-spadmin-account-using-cyberark-pam","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2018\/06\/18\/securing-iiq-spadmin-account-using-cyberark-pam\/","title":{"rendered":"Securing IIQ SPAdmin Account Using CyberArk PAM"},"content":{"rendered":"<p style=\"text-align: left\">In an enterprise, a large number of privileged accounts are spread over various applications and systems. These accounts have higher authorizations and hence need to be handled with higher security. <a href=\"https:\/\/www.cyberark.com\/\">CyberArk<\/a>&#8216;s Privileged Account Management solution is targeted at achieving this.<\/p>\n<p style=\"text-align: left\">In <a href=\"https:\/\/www.sailpoint.com\">SailPoint<\/a> <a href=\"https:\/\/www.sailpoint.com\/identity-management-software-identityiq\/\">IdentityIQ<\/a>, accounts can have the highest privilege in form of the &#8216;System Administrator&#8217; capability. The &#8216;spadmin&#8217; account that comes out-of-the-box is configured to have this privileged access. This account, if managed by the CyberArk PAM solution, improves safety of the IdentityIQ environment.<\/p>\n<p>&nbsp;<\/p>\n<p>The following presentation discusses this use case and how it can be implemented using CyberArk PAM:<\/p>\n<p><iframe loading=\"lazy\" title=\"ENH iSecure Securing IIQ SPAdmin Account Using CyberArk PAM\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/HRGoTUzsVAs?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>The following video demonstrates the use-case in action for verifying and changing spadmin password from CyberArk and initiating privileged sessions:<\/p>\n<p>https:\/\/www.youtube.com\/watch?v=4qRujyxiUBM<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In an enterprise, a large number of privileged accounts are spread over various applications and systems. These accounts have higher authorizations and hence need to be handled with higher security. CyberArk&#8216;s Privileged Account Management solution is targeted at achieving this. In SailPoint IdentityIQ, accounts can have the highest privilege in form of the &#8216;System Administrator&#8217; [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18,8,14,16],"tags":[84,10,29,11],"class_list":["post-575","post","type-post","status-publish","format-standard","hentry","category-cyberark","category-identity-governance","category-sailpoint","category-technology","tag-cyberark","tag-identity-iq","tag-iiq","tag-sailpoint"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/575","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=575"}],"version-history":[{"count":2,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/575\/revisions"}],"predecessor-version":[{"id":577,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/575\/revisions\/577"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}