Skip to main content

Accounts & Identities

The Accounts section provides a unified view of all discovered accounts across your target systems. The Identities section manages the real-world people and service owners those accounts belong to.

Accounts

Navigate to Accounts to see all discovered accounts.

Accounts

Account Statistics

The statistics bar at the top shows:

MetricDescription
TotalAll discovered accounts
UnlinkedAccounts not linked to any identity
HumanAccounts classified as human user accounts
Non-HumanAccounts classified as service/system accounts

Filtering Accounts

Use the filter controls to narrow the list:

FilterOptionsDescription
SystemDropdown of all systemsShow accounts from a specific system
Account TypeHuman, Non-HumanFilter by classification
Linked StatusLinked, UnlinkedFilter by identity link status
EnabledEnabled, DisabledFilter by account status

Account Details

Click an account to view its full details:

FieldDescription
UsernameThe account name on the target system
Display NameFriendly name (if available from the scan)
SystemThe target system this account belongs to
Account TypeHuman or Non-Human (set by policy rules or manual override)
Privilege LevelAssigned by policy rules or manual override
EnabledWhether the account is active on the target system
Linked IdentityThe identity this account is linked to (if any)
Groups / EntitlementsGroup memberships and permissions
Last ScannedWhen this account was last seen in a scan

Linking Accounts to Identities

Linking an account to an identity establishes ownership - it answers "who is responsible for this privileged account?"

  1. Find the account you want to link
  2. Click the Link icon (chain link)
  3. Search for an identity by name, email, or employee ID
  4. Select the identity and confirm

To unlink an account, click the Unlink icon on a linked account.

Bulk Linking

To link multiple accounts at once:

  1. Select multiple accounts using the checkboxes
  2. Click Bulk Link
  3. Search for and select the identity
  4. Confirm

Privilege Overrides

Policy rules automatically assign privilege levels during scans. If a rule incorrectly classifies an account, you can override it manually.

  1. Select an account
  2. Click Override Privilege (or Override Account Type)
  3. Select the new level and enter a reason
  4. Click Confirm

Overridden accounts show an indicator badge. To revert to the rule-based classification, click Reset to Rule-Based.

Overrides persist across scans - they will not be overwritten by the next policy rule evaluation.

Identities

Navigate to Accounts > Identities to manage the identity directory.

Creating an Identity

  1. Click Add Identity
  2. Fill in the fields:
FieldRequiredDescription
Display NameYesFull name of the person or service owner
EmailNoEmail address
Employee IDNoHR or corporate directory identifier
DepartmentNoOrganisational department
StatusYesActive or Inactive
  1. Click Save

Viewing Linked Accounts

Click an identity to see all accounts linked to it. This provides a single view of every privileged account owned by that person or team.

Identity Sources

Identities can be created manually or synced from external sources (e.g., HR systems or directory services) during a scan. The Sources tab on an identity shows where it originated from.

Entitlements

Navigate to Accounts > Entitlements to view all discovered entitlements (group memberships, roles, and permissions) across all systems.

Each entitlement shows:

FieldDescription
NameThe entitlement name (e.g., group name, role name)
SystemThe target system it belongs to
TypeGroup, Role, Permission, etc.
Privilege LevelAssigned by policy rules
MembersNumber of accounts holding this entitlement

Entitlements can also have privilege overrides and PAM risk levels, similar to accounts.

Privilege Inheritance

Entitlements can propagate privilege levels to their member accounts. Use Propagate Inheritance to recalculate account privileges based on their group memberships.

Discovered Services

Navigate to Accounts > Services to view services discovered during scans (e.g., systemd services on Linux, Windows services). Each service record shows the service name, the account it runs as, and the system it was found on.