--> In Privileged Access Management (PAM), Credential Check-In and Credential Check-Out refer to the lifecycle management of privileged credentials to enhance security and control.
--> These concepts are commonly used in solutions like BeyondTrust, Delinea, CyberArk, and FortiPAM to manage access to sensitive accounts.
Credential Check-Out
- When a user needs to access a privileged account (such as an admin or root account), they "check out" the credentials from the PAM system.
- The PAM system provides the user a temporary password or direct access without revealing credentials.
- The checkout process can include approval workflows, multi-factor authentication (MFA), and session recording for auditing.
- The checked-out credentials are typically time-limited and can be revoked if necessary.
Credential Check-In
- When the user is done using the privileged account, they "check-in" the credentials back into the PAM system.
- The PAM system then automatically rotates (changes) the password to prevent reuse, ensuring security.
- This ensures that even if a user memorizes or saves the old password, they cannot use it again.
- Check-in might also trigger logging and compliance reporting to track access history.