Privileged Access Management with Identity & Access Manager (BoKS)

Identity, Account, and Privileged Access Management Platform for Linux and UNIX

Centralize your multi-vendor infrastructure into a single security domain

Identity & Access Manager (BoKS) transforms your multi-vendor Linux and UNIX server environment into one centrally managed security domain. BoKS simplifies your organization’s ability to enforce security policies, and control access to critical systems and information. With full control over accounts, access, and privilege, IT and security teams can proactively prevent internal and external attacks on critical systems before they start.

Comprehensive Account and Privileged Access Management

Account Management

Centralize management of user profiles and accounts for simplified administration and scalability.


Secure your systems by managing user privileges and access to sensitive data—without slowing down productivity.

Least Privilege Enforcement

Give users only the access they need and ensure that least privileged access is enforced across your hybrid environment.
See Identity & Access Manager (BoKS) in action

Increase Security

Gain Control. Enforce Security. Achieve Compliance.

Improve Security with Granular Privileged Access Controls

Identity & Access Manager (BoKS) offers centrally controlled privileged account delegation, enforcing which commands can be executed by role. It eliminates privileged password sharing to significantly reduce the risk of insider fraud.

 Enforce Security Controls Across Your Multi-Platform Environment

Identity & Access Manager (BoKS) provides complete control over accounts and privileged access, making sure that the principle of least privilege is applied across your entire environment. 

Extend Security to the Cloud

It is important for organizations to employ synchronized policies across on-premise and cloud environments to effectively strengthen data security, maintain operations, and prepare for regulatory audits. Centrally managing accounts and privileged access across your environments with Identity & Access Manager (BoKS) enforces consistent security controls and provides seamless management across tech stacks. 

Ensure Compliance

Meet compliance regulations like PCI-DSS, HIPAA, and SOX by incorporating security into your deployment from the start. The automated credentials management and enforcement approach in Identity & Access Manager (BoKS) enables organizations to increase the granularity of access enforcement and easily meet strict compliance regulations. 

With [Identity & Access Manager (BoKS)], we were able to automate tedious administration processes and enforce stronger security controls across our Linux environment.

– IT Director, Leading National Healthcare System

Accelerate Growth

Simplify Administration. Drive Efficiency. Enable Scalability.

Drive Efficiency with Simplified Security Administration

Identity & Access Manager (BoKS) helps organizations automate IT administration and processes to optimize current staff and reduce the cost of business operations. IT staff are able to centralize the administration of users, improve controls over how users are granted access to system resources, and enhance the auditability of Linux and UNIX servers. 

Enable Scalability

With Identity & Access Manager (BoKS), a single administrator is able to manage anywhere from 10 to tens of thousands of servers or virtual machines. Centrally manage all aspects of account provisioning, access control, and privilege escalation, so your current staff can keep pace with today’s ever-expanding server environments.

Key Features

Centralized Administration

Centralized security controls allow for instantaneous provisioning and deprovisioning of users to better secure your environment, increase incident reaction time, and help mitigate risks.

Privileged Access Control

Default to least privilege to close security gaps. Provide the necessary amount of privilege and access for users to do their jobs—without exposing administrator credentials.

Centralized Sudo

Centrally control privileged account delegation, enforce which commands can be executed by role in real time, and eliminate the distribution of sudoers' files completely.

Auditing & Reporting

Create turnkey IT security audit and compliance reports for full visibility across your server environment, so that you can make quick, informed decisions.

Keystroke Logging

Record 100 percent of keystrokes and output to gain full visibility across your entire environment, reduce risk of insider threats, and simplify auditing and compliance.

Granular Access Control 

Implement fine-grain security controls. Define and enforce who is granted elevated privilege, when, from where, and how.

Get Started

Divider text here

See how Identity & Access Manager (BoKS) can remove repetitive, low-level security
administrative tasks with a live product demo.