<img src="https://ws.zoominfo.com/pixel/6169bf9791429100154fc0a2" width="1" height="1" style="display: none;">

We're blowing the whistle on Legacy PAM 🏀 Join us for an Access Madness Webinar on March 28

Search
Close icon
Search bar icon
strongDM logo

University

How to Implement Least Privilege Permissions

How to Implement Least Privilege Permissions

Read the full post at https://www.strongdm.com/blog/getting-started-role-access-discovery
How to Answer Auditor's Questions

How to Answer Auditor's Questions

StrongDM can assist your organization in preparation for compliance audits with a variety of learning tools and examples. The process can be broken down into learning about objectives for the audit, preparing for the audit, and gathering the required technical information from StrongDM for the audit.
How to Configure Log Storage
How to Configure Log Storage
Logging and audit are critical to StrongDM’s operational and design principles. StrongDM is designed to protect user logs in transit and at rest and allows you to configure logging according to your business and operational requirements.
Define How to Request/Approve Privileged Access
Define How to Request/Approve Privileged Access
In StrongDM, access to resources (i.e., Datasources, Servers, Clusters, Clouds, and Websites) is granted to Users through Role Membership, via the Static and Dynamic Access Rules that have been defined for that Role.
How to Choose Your First Team
How to Choose Your First Team
Now you’ve enabled SSO and User Provisioning with your IdP, it’s time to select the first team you want to onboard to StrongDM. In order to make the process repeatable and scalable for the rest of your organization, we recommend you start by picking a single team to onboard first.
How to Integrate Single-Sign-On (SSO)
How to Integrate Single-Sign-On (SSO)
Single Sign-On (SSO) is an authentication method that allows users to securely authenticate with multiple applications and websites, including StrongDM. StrongDM customers often leverage SSO to make infrastructure access as simple as accessing any other business application.
How to Provision Permissions
How to Provision Permissions
Automation is a powerful way to relieve your engineering/SRE/DevOps practice from repetitive access management tasks and allow them to focus on the essential things. The following questions will guide you to the most relevant links to help you implement automation.
Where to Deploy the StrongDM Proxy
Where to Deploy the StrongDM Proxy
The ideal locations to deploy Gateway and Relay pairs in your environment will depend on the specifics of your network topology. Use your answers to the following questions to guide your network diagram template selection.