Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Terminating User Sessions - Complications with PAM #50

Open
2MarkMaguire opened this issue Feb 4, 2025 · 0 comments
Open

Terminating User Sessions - Complications with PAM #50

2MarkMaguire opened this issue Feb 4, 2025 · 0 comments

Comments

@2MarkMaguire
Copy link

Background: Administrators often use shared privileged accounts instead of their personal accounts when performing sensitive operations. A typical workflow is as follows:

  1. Login to the IdP: The administrator signs into the Identity Provider (IdP).
  2. SSO to the PAM Application: From the IdP, the administrator SSO's into the PAM system (e.g., CyberArk, BeyondTrust).
  3. Password Checkout: Within the PAM application, the administrator retrieves the password for a shared privileged account.
  4. Access Critical Systems: The administrator uses the shared account credentials to access servers and systems to perform their tasks.

Problem: When the IdP issues a command to terminate all sessions associated with an administrator—perhaps due to security policy or detected anomalies—only sessions authenticated via the IdP are closed. Sessions initiated within the PAM application using a checked-out shared account remain active. This creates a security gap where an administrator’s privileged session may continue even after a termination signal is sent, potentially leaving critical systems exposed to unauthorized access.

Recommended Fix: We should introduce a dedicated “recommendations” section for PAM applications within our guidelines. Specifically, if a PAM solution acts as the Relying Party (RP) and receives a termination request for an administrator’s session, it should automatically rotate or invalidate any passwords currently checked out by that administrator. This integration would ensure that, upon session termination, any residual privileged access is promptly disabled.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant