Recommended Steps for Implementing BeyondTrust Jump Technology

When working with Jump Technology, there are a lot of moving parts. Here is the recommended order of implementation to make full use of your software.

  1. Add Jump Item Roles. Jump Item Roles determine how users are allowed to interact with Jump Items. These roles are applied to users by means of individual account settings, group policies, or when added to Jump Groups.

For more information about Jump Item Roles, please see Use Jump Item Roles to Create Permission Sets for Jump Clients.

  1. Add Jump Policies. Jump Policies are used to control when certain Jump Items can be accessed by implementing schedules. Jump Policies are applied to Jump Items upon creation and can be modified from the representative console.

For more information about Jump Policies, please see Create Jump Policies to Apply to Jump Clients.

  1. Add Jump Groups. A Jump Group is a way to organize Jump Items, granting members varying levels of access to those items. Users are assigned to Jump Groups either individually or by means of group policy.

For more information about Jump Groups, please see Use Jump Groups to Determine Which Users Can Access Which Jump Clients.

  1. Deploy Jump Clients. Jump Clients can be deployed to Windows, Mac, Linux, and Raspberry Pi systems and do not require those systems to be on a network. Jump Clients are deployed from /login > Jump > Jump Clients or from the representative console during a customer-initiated session. When creating the installer in the mass deployment wizard or during a session, be sure to set the Jump Group and Jump Policy to determine who can access the Jump Client and with what restrictions.

For more information about Jump Clients, please see Deploy Jump Clients During a Support Session or Prior to Support.