Core Privileged Access Manager (BoKS)’s main strength is its ability to create a single security domain of your IT assets, with a single policy set. There are, however, valid reasons to segregate networks, and infrastructure due to:
- Differing IT governance, often due to historical M&A activities
- The need to report to multiple market regulators or compliance regimes
- Public internet-facing IT with extreme access control risk (i.e., DMZs)
- Extreme geographical distance tied to parallel operation of legal entities
With Tier 2 or Tier 3 platform or application support teams it may be necessary to provision the same person’s identity and access requirements into multiple BoKS domains. The BoKS Web Services Interface (WSI) allows secure validated creation or manipulation of:
- User accounts
- User roles
- Host definitions
- Host groups
- Granular access control routes
Web Services Interface allows the same identity to be provisioned across domains, allowing later correlation analysis of log messages and a view into what staff members are doing in separate security zones.
How We Help You Gain Control
Create BoKS Data Types
Support Parallel Provisioning
Implement Incremental Data Change Control
What This Means to You
Meet Compliance Requirements
Reduce Admin Overhead
Ease the burden on your team with common SOAP calls that can be targeted at multiple security domains.
Prevent Breaches
BoKS Web Service Interface enforces commonality of identity across zones, and where appropriate can relocate users as they move to a different operating unit’s infrastructure.
Get Started
Ready to gain control with Web Services Interface from Core Privileged Access Manager (BoKS)?