Skip to main content

Admin By Request Overview

Admin By Request is a security and privilege management solution designed to enhance the security of organizations by allowing users to run applications with elevated privileges without giving them full administrative rights. This helps prevent the risks associated with unrestricted administrative access, promoting the principle of least privilege.

This documentation provides IT administrators with detailed guidance on effectively using the Admin By Request platform, including managing roles and permissions, using the admin portal, and configuring security settings.

Key Features

Admin By Request offers several key features aimed at improving security, compliance, and administrative oversight:

1. Run as Admin

Admin By Request allows end-users to run specific applications with administrative privileges when necessary. However, these permissions are tightly controlled and logged, ensuring that elevated privileges are only granted when needed.

Key aspects of this feature include:

  • Temporary elevation of privileges for end-users without granting full admin rights.
  • Full audit logs of all elevated actions for compliance purposes.
  • Reduced risk of malware and unauthorized changes by limiting the scope of admin privileges.

For more details on the Run as Admin feature, refer to the official documentation: Run as Admin Overview

2. Privilege Management

Admin By Request enables administrators to control and manage which users have the ability to elevate privileges. With detailed permissions and logging, IT administrators can assign roles, approve user requests, and review activities for compliance.

3. Security and Audit Logging

Admin By Request includes comprehensive auditing and logging features, allowing administrators to track all privileged actions and monitor the usage of elevated privileges. This provides visibility into user actions and ensures compliance with internal and external security requirements.

4. Customization and Sub Settings

Administrators can configure custom sub-settings tailored to their organization’s needs. This includes creating specific workflows, security settings, and custom approval processes that ensure flexibility while maintaining security.

For more information on the product features and customization options, see: Admin By Request Documentation

Editions of Admin By Request

Admin By Request offers multiple editions designed to suit the needs of different organizations, from small businesses to large enterprises. The editions vary based on the number of users, features, and customization options available.

For more details on the different editions, visit: Admin By Request Editions

Documentation for IT Administrators

This site contains detailed IT Admin Procedures (ITAPs) and Standard Operating Procedures (SOPs) to guide administrators through using the Admin By Request platform effectively.

1. SOP: Role-Based Access Control (RBAC) in Admin By Request

This SOP provides a comprehensive guide to configuring and managing RBAC in Admin By Request. It covers:

  • The assignment of custom roles for unit-level administration.
  • The process for managing roles using security groups in Entra ID (Azure AD).
  • Best practices for auditing and maintaining role assignments.

2. ITAP: Effective Use of the Admin By Request Portal

This ITAP explains how to effectively use the Admin By Request portal, detailing:

  • Accessing and managing devices using the inventory feature.
  • Handling user requests for privilege elevation through the approvals system.
  • Reviewing the audit logs to ensure compliance and security.
  • Utilizing advanced features such as the Break Glass and PIN Code tools for emergencies.

Getting Started

To get started with Admin By Request, review the following documents:

For more detailed guides on implementing and managing the platform, explore the ITAPs and SOPs listed in this documentation.