PAM Provider Configuration in Keyfactor Command

Any privilege access management (PAM) providers you wish to configure for use with Keyfactor Command must be defined first on the PAM Providers page before they can be assigned to certificate stores (see Certificate Stores), used for explicit credentials on a CAClosed (see HTTPS CAs - Authentication Method Tab or DCOM CAs - Authentication Method Tab), or used to provide authentication in workflowClosed steps (see Invoke REST Request). Keyfactor Command supports local Keyfactor Command PAM databases and provides support for multiple third-party PAM providers with custom-built PAM extensions available on the Keyfactor GitHub:

Third-party PAM providers can either be local (server side) or remote (client side). When configured locally, the configuration information to connect to the PAM provider exists on the Keyfactor Command server and the PAM provider must be routable from the Keyfactor Command server (for example, on the same network) to retrieve secret information. When configured remotely, the configuration information to connect to the PAM provider exists on the Keyfactor Universal OrchestratorClosed managing the certificate stores using the PAM provider and the PAM provider must be routable from the Universal OrchestratorClosed.

Tip:  The following permissions (see Security Roles and Claims) are required to use this feature:

PAM > Modify
PAM > Read
Certificate Stores > Modify

Permissions for certificate stores can be set at either the global or certificate store container level. See Container Permissions for more information about global vs container permissions.