BeyondTrust Privileged Remote Access Integration with RED IM
You must purchase this integration separately from both your BeyondTrust software and your RED IM solution. For more information, contact BeyondTrust sales.
BeyondTrust's Privileged Remote Access plugin integration with RED IM enables automatic password injection to authorized systems through encrypted BeyondTrust connections, removing the need to share and expose credentials to privileged accounts. In addition to the retrieval and automatic rotation of standard credentials, the integration also has the ability to retrieve shared credential lists, giving domain admins and other privileged users access to those credentials for use on the targeted systems.
Auto-rotation occurs only if configured.
The integration between BeyondTrust PRA and RED IM enables:
- One-click password injection and session spawning
- Credentials never exposed to authorized users of BeyondTrust
- Access to systems on or off the network with no pre-configured VPN or other routing in place
- Passwords always stored securely in the RED IM server
The BeyondTrust Endpoint Credential Manager (ECM) enables the communication between RED IM and BeyondTrust Privileged Remote Access. The ECM is deployed to a hardened Windows Server inside the firewall, typically in the same network as RED IM. Once the ECM is deployed, BeyondTrust users see a list of administrator-defined credentials for the endpoints they are authorized to access. A set of these credentials can be selected when challenged with a login screen during an access session, and the user is automatically logged in, having never seen the username/password combination.
RED IM handles all elements of securing and managing the passwords, so policies that require the password to be rotated after use are supported with additional configuration provided by the plugin. BeyondTrust Privileged Remote Access handles creating and managing access to the endpoint and then recording the session and controlling the level of access granted to the user, including what the user can see and do on that endpoint.