Directory › Overview

Overview

Welcome to the official CyberKey documentation.

This document provides technical and operational guidance for installing, configuring, and administering the CyberKey environment. It serves as a central reference for infrastructure teams, system administrators, and certified partners.

The goal of this documentation is to ensure a secure, standardized, and consistent deployment, while also supporting the day-to-day administration of the platform.

Here you will find guidance on:

  • Infrastructure and requirements
  • Connections
  • Integrations
  • Operational and administrative procedures

This documentation follows CyberVision's security and operational best practices to guarantee stability, performance, and control across all environments.

Important:

All installations and administrative changes should follow the guidelines described here. If there are specific environmental requirements, consult the CyberVision support team before implementing modifications.

Scope

This document describes the purpose and functional boundaries of all core modules in the CyberVision PAM platform.

It does not include procedural creation steps.

1. Home

The Home module provides an operational snapshot of the platform, including high-level usage indicators and navigation shortcuts.

It is the main landing area for authenticated users.

2. Connections

Connections is the privileged access catalog for remote targets.

It centralizes connection entries across supported protocols (such as SSH, RDP, Telnet, VNC, and Kubernetes), with protocol-specific behavior, status visibility, and controlled launch/edit actions.

Core function:

  • Define and govern remote access endpoints.

3. Web

Web manages privileged access to web-based systems.

It stores URL + credential-based access records and provides controlled launch and administration actions.

Core function:

  • Govern privileged web application access.

Important platform note:

  • Web connection operation may depend on the CyberKey browser extension.

4. Vault

Vault is the platform’s secure access grouping model.

It binds users to authorized resources (Connections and Web entries) inside a controlled scope.

Core function:

  • Enforce segmented access by business/team/environment boundaries.

Security concept:

  • Vault acts as an access boundary (“who can access which privileged resources”).

5. Credentials

Credentials manages local platform identities and user records.

It is the reference layer for user metadata, lifecycle, and administrative controls.

Core function:

  • Maintain user identities and account governance.

Critical identity rule:

  • Even with SAML/SSO authentication, users must exist locally in CyberVision for authorization scope, policy enforcement, and audit attribution.

6. Sessions

Sessions provides runtime visibility over active privileged sessions and administrative control over live session state.

Core function:

  • Monitor and control active privileged sessions.

7. Audit

Audit is the compliance and traceability module for session history and operational evidence.

It provides searchable records and export/report capabilities.

Core function:

  • Deliver accountability, investigation support, and compliance evidence.

8. Web Audit

Web Audit provides traceability specific to Web module activity, complementing the main audit domain with web-oriented event visibility.

Core function:

  • Track and review privileged web-access activity.

9. Report (external link)

The Report entry links to the incident/error reporting flow used for operational feedback and issue registration.

Core function:

  • Capture technical incident reports for triage and follow-up workflows.

10. Cross-Module Security Model

Authentication and Authorization

  • Authenticated access is required for internal modules.
  • Role-based authorization governs module visibility and actions.

Access Segmentation

  • Vault-centered segmentation defines practical resource scope.
  • Users receive access to resources by explicit assignment.

Operational Controls

  • Connections/Web records can be governed, edited, and reviewed.
  • Active sessions can be observed and controlled in Sessions.

Auditability

  • Activity across modules is intended to be traceable via Audit/Web Audit domains.

11. Governance Principles

1. Least privilege by default.

2. Explicit assignment over implicit access.

3. Segmentation by Vault and role.

4. Continuous auditability of privileged operations.

5. Periodic review of users, resources, and inactive access paths.

12. Outcome

Together, these modules provide a complete privileged access management operating model:

  • Identity governance (Credentials),
  • Resource governance (Connections/Web),
  • Access segmentation (Vault),
  • Runtime control (Sessions),
  • Accountability and evidence (Audit/Web Audit).

CyberVision

Enterprise Security. Zero Complexity.

Was this helpful?
Yes: 2 · No: 0