We've used it for auto-discovery, and password management on mainframes, networks, applications, and firewalls. We've also used it for password rotation.
We use it for credential management, including rotation for both human and non-human accounts, as well as session monitoring.
Delinea Secret Server supports our remote access needs.
For remote access needs, we have implemented MFA (Multi-Factor Authentication) and SSO (Single Sign-On) across various applications. We use third-party tools like Ping and SailPoint to integrate with the PAM tools.
Moreover, password rotation has been effective in our environment. We weren't rotating many application passwords before, but an audit from the OCC (Office of the Comptroller of the Currency) triggered a change.
We now rotate all non-human accounts except for Active Directory and local accounts. It's a best practice, so we set a 30-day rotation for some applications like mainframes and applications that support direct password changes. For others, we set it to 8 hours.
Initially, the application teams struggled to adapt to the PAM culture. It's an organizational-wide change, so it took some time. We guided the application owners and platform teams on setting password rotation policies and initial password guidelines.
This helped minimize the impact of breaches, especially in Linux and Windows environments. We also have continuous monitoring with Splunk. We integrated the Delinea Secret Server logs into Splunk for centralized log management.