Skip to main content

Component Configuration

After completing the Keycyte PAM installation, proper configuration of system components is critically important. This section details post-installation configuration steps, component deployment strategies, and performance optimizations.

Initial Post-Installation Configuration

First Access and Installation Completion

When the virtual machine created from the OVF template is started for the first time, the automatic installation process begins. This process takes 30-60 minutes to complete and includes the following stages:

  • System Initialization: Debian 12 operating system installation
  • Dependency Installation: Docker Engine, PostgreSQL, and other required components
  • Service Configuration: Keycyte PAM services configuration
  • Initial Configuration: Basic network and security settings

Basic System Access

After installation completion, system access is available through:

# SSH access
ssh admin@<pam-server-ip>

# Web interface access
https://<pam-server-ip>

Default Credentials:

  • Username: admin
  • Password: keycyte2024!

Security Warning: Changing the default password after first login is mandatory.

Component Deployment Strategies

For optimal performance and security, it is recommended to deploy Keycyte PAM components across different servers:

Application Tier

┌─────────────────────────┐
│ Keycyte PAM Server │
│ ───────────────── │
│ • Web Interface │
│ • API Gateway │
│ • Session Manager │
│ • Connection Broker │
└─────────────────────────┘

Features:

  • User connections and session management
  • Web interface and API services
  • Connection brokering and protocol conversion
  • Real-time session recording

Database Tier

┌─────────────────────────┐
│ Database Cluster │
│ ───────────────── │
│ • PostgreSQL Master │
│ • Read Replicas │
│ • Backup Storage │
│ • WAL Archiving │
└─────────────────────────┘

Features:

  • Password vault database
  • User and authorization data
  • Audit logs and session records
  • Configuration database

Horizontal Scaling Architecture

Keycyte PAM supports unlimited horizontal scaling. The following configuration models are recommended for enterprise environments:

Active-Active Configuration

    ┌─── Load Balancer ───┐
│ │
▼ ▼
┌─────────┐ ┌─────────┐
│ PAM-01 │◄────────┤ PAM-02 │
│ Active │ │ Active │
└─────────┘ └─────────┘
│ │
└──── Shared DB ──────┘

Advantages:

  • High availability (99.9%+ uptime)
  • Automatic load distribution
  • Zero downtime maintenance
  • Real-time failover (< 30 seconds)

Configuration Requirements:

  • Shared PostgreSQL cluster
  • Redis session storage
  • NFS/GlusterFS shared storage
  • HAProxy/F5 load balancer

Active-Passive Configuration

┌─────────┐         ┌─────────┐
│ PAM-01 │◄────────┤ PAM-02 │
│ Active │ │ Standby │
└─────────┘ └─────────┘
│ │
└──── DB Replication ─┘

Advantages:

  • Low-cost HA solution
  • Simple management and monitoring
  • Suitable for planned maintenance
  • Ideal for DR scenarios

Network Configuration

Segmentation Strategy

┌─────────────────────────────────────────┐
│ DMZ Network │
│ ┌─────────────┐ ┌─────────────┐ │
│ │Load Balancer│ │ Web Proxy │ │
│ └─────────────┘ └─────────────┘ │
└─────────────┬───────────────────────────┘

┌─────────────▼───────────────────────────┐
│ PAM Network │
│ ┌─────────────┐ ┌─────────────┐ │
│ │ PAM Server │ │ Management │ │
│ └─────────────┘ └─────────────┘ │
└─────────────┬───────────────────────────┘

┌─────────────▼───────────────────────────┐
│ Database Network │
│ ┌─────────────┐ ┌─────────────┐ │
│ │PostgreSQL │ │ Backup │ │
│ │ Cluster │ │ Storage │ │
│ └─────────────┘ └─────────────┘ │
└─────────────────────────────────────────┘

Firewall Rules

DMZ to PAM Network

# HTTPS Web Traffic
tcp/443 allow

# SSH Management
tcp/22 allow (restrict to admin IPs)

PAM to Database Network

# PostgreSQL
tcp/5432 allow

# Redis (session storage)
tcp/6379 allow

PAM to Target Networks

# RDP Connections
tcp/3389 allow

# SSH Connections
tcp/22 allow

# VNC Connections
tcp/5900-5999 allow

Performance Optimization

CPU and Memory Settings

# Kernel parameters
echo 'vm.swappiness=10' >> /etc/sysctl.conf
echo 'net.core.somaxconn=4096' >> /etc/sysctl.conf
echo 'fs.file-max=100000' >> /etc/sysctl.conf

# PostgreSQL optimization
sed -i 's/#shared_buffers = 128MB/shared_buffers = 4GB/' /etc/postgresql/15/main/postgresql.conf
sed -i 's/#effective_cache_size = 4GB/effective_cache_size = 12GB/' /etc/postgresql/15/main/postgresql.conf

Disk I/O Optimization

# Scheduler optimization for SSD
echo mq-deadline > /sys/block/sda/queue/scheduler

# PostgreSQL WAL settings
echo "wal_level = replica" >> /etc/postgresql/15/main/postgresql.conf
echo "max_wal_size = 4GB" >> /etc/postgresql/15/main/postgresql.conf
echo "checkpoint_completion_target = 0.9" >> /etc/postgresql/15/main/postgresql.conf

Monitoring and Health Checks

Automated Health Checks

# PAM Service Health
curl -f https://localhost/api/health || systemctl restart keycyte-pam

# Database Connection
pg_isready -h localhost -p 5432 || alert_admin

# Disk Space Monitoring
df -h | awk '$5 > 85 {print $0}' | mail -s "Disk Warning" admin@company.com

Log Rotation Configuration

# /etc/logrotate.d/keycyte-pam
/var/log/keycyte-pam/*.log {
daily
rotate 30
compress
delaycompress
missingok
notifempty
create 0644 keycyte keycyte
postrotate
systemctl reload keycyte-pam
endscript
}

Backup and Recovery Configuration

Automated Backup Strategy

#!/bin/bash
# /usr/local/bin/backup-pam.sh

# Database Backup
pg_dump -h localhost -U keycyte -d pamdb | gzip > /backup/pamdb_$(date +%Y%m%d_%H%M%S).sql.gz

# Configuration Backup
tar -czf /backup/pam_config_$(date +%Y%m%d_%H%M%S).tar.gz /etc/keycyte-pam/

# Session Recordings Archive
rsync -av /var/lib/keycyte-pam/recordings/ /backup/recordings/

Disaster Recovery Test

# Recovery Test Script
#!/bin/bash
# Test database restore
zcat /backup/latest_pamdb.sql.gz | psql -h recovery-db -U keycyte -d pamdb_test

# Test configuration restore
tar -xzf /backup/latest_config.tar.gz -C /tmp/test-restore/

# Validate restore integrity
diff -r /etc/keycyte-pam/ /tmp/test-restore/etc/keycyte-pam/

With these configuration strategies, your Keycyte PAM system will operate at high performance, security, and availability standards. After configuration, you can detail user access controls with role management.