User Operations
This section lists users who will access Keycyte PAM's Client interface and contains operations related to the management of these users. The user management page allows system administrators to control all users with access to the PAM system from a central location.
Figure-1
MFA (Multi-Factor Authentication) is activated from the boxes shown in Figure-1 when users log into the PAM interface. Users' access to the PAM interface can be activated or blocked from the "Enabled" section.
User List
On the user management page, all users registered in the system are displayed in table format. ID, username, account status, MFA status, and description information are shown for each user. You can quickly find specific users with the search bar at the top of the table, and add new users with the "Add" button at the top of the page.
User Status
The active or inactive status of each user in the system is shown in the "Enabled" column. A green checkmark indicates that the user is active, while a red X indicates that the account is disabled. Active users can log into the system and access resources assigned to them, while inactive users are blocked from access.
The MFA (Multi-Factor Authentication) column shows the multi-factor authentication status of users. This feature, which is critically important for security, ensures that users go through an additional verification step when logging into the system. Keycyte PAM includes TOTP, Email, and SMS verification within its own structure. When MFA is activated for users, an email is sent to the user's registered email address for whichever verification option you want to activate from the opened menu. After users complete this email verification, they can log into the PAM interface using the selected verification method.
User Roles and Descriptions
The Description column (Optional) contains users' roles or job descriptions within the system. This information helps you understand what type of resources the user has access to. For example, users with "Network Devices" description have access to network device management, those with "Linux" description have access to Linux server management, and those with "Terminal Servers" description have access to terminal servers.
User Operations
You can perform various management operations with the action buttons on the right side of each user row. You can edit user information with the pencil icon, view the administrator of these users with the user icon, and delete the user from the system with the trash icon. It should be noted that these deletion operations are irreversible. All server and system access associated with the user will also be automatically deleted from the system along with the user.
Adding New User
You can access the new user addition form by clicking the "Add" button in the upper left corner of the page. Through this form, you can create a new user who will access Keycyte PAM by specifying the user type (Domain-Local) and filling in the username, password, email, phone, and other required fields.
The user management page is critically important for the secure and effective use of the PAM system. Regularly reviewing the user list, disabling unnecessary accounts, and encouraging MFA usage will enhance system security.