Skip to content
Sectona LogoSectona Logo
Menu
  • Platform
    • 1
    • Sectona Security Platform

      Security Platform Thumbnail
      Explore Platform
    • 28679
    • Products

      Privileged Access Management Icon

      Privileged Access Management
      Manage passwords, secrets & monitor sessions

      Endpoint Privilege Management Icon

      Endpoint Privilege Management
      Control and secure administrators credentials

      Privileged Access Governance Icon

      Privileged Access Governance
      Govern Privileged Entitlement

    • Platform Capabilities

      Continuous Discovery Icon

      Continuous Discovery

      Password Management Icon

      Password Management

      Secure Remote Access Icon

      Secure Remote Access

      Session Recording and Threat Analytics Icon

      Session Recording and Threat Analytics

      Multi-Factor Authentication Icon

      Multi-Factor Authentication

      Just-in-time Access Icon

      Just-in-time Access

      Privileged Task Management Icon

      Privileged Task Management

      Account Lifecycle Management Icon

      Account Lifecycle Management

  • Solutions
    • 2
    • Accelerating Privilege Management Thumbnail

      Accelerating Privilege Management Transformation

      Read Whitepaper
    • 28680
    • By Use Case Icon

      BY USE-CASES

      Secure remote privileged access

      Remove administrator rights

      Secure cloud environments

      Automate entitlement reviews

      Simplify privileged account lifecyle

      By Initiative Icon

      BY INITIATIVE

      PCI-DSS Compliance

      ISO 27002

      SWIFT Security Framework

      Documentation Downloads Try Free Edition
  • Resources
    • 3
    • Accelerating Privilege Management Header Thumbnail

      Accelerating Privilege Management Transformation

      Read Whitepaper
    • 28633
    • Resources Icon

      RESOURCES

      Datasheets

      Solution Briefs

      Whitepapers

      Case Studies

      Guides & Toolkits

      View all resources

    • Learn Icon

      LEARN

      PAM 101

      Technology Blog

      Product Updates

      Documentation

    • EXPLORE
      Documentation Learn how to implement & manage
      Downloads Find software, plugins & updates
      Try Free Edition
  • Services
    • 4
    • FROM THE BLOG

      Gartner Magic Quadrant
      Gartner Magic Quadrant 2021: Sectona PAM Gets a Notable Mention
      Read More
    • 28634
    • TRAINING & SERVICE Professional Services Get the help you need to succeed with your privileged access management project.Explore
      Training & Certification Access learning and trainings options to improve the success of Sectona platform.Explore
    • Get Support Icon

      GET SUPPORT

      Email us

      Create a case

      Customer Success

      Download Resources

    • EXPLORE
      Documentation Learn how to implement & manage
      Downloads Find software, plugins & updates
      Try Free Edition
  • Company
    • 5
    • COMPANY
      Company Thumbnail

      About us

      Leadership team

      Contact us

      Branding

    • 28635
    • PARTNER
      Partner Thumbnail

      Find a partner

      Become a partner

      Register a Deal

    • CAREERS
      Career Thumbnail

      Join the team

      Explore career opportunities

    • Become Partner Thumbnail
      Become a Partner

      The Sectona Technology Partner Program empowers you to deliver strategic value to your customers.

      Become a Partner
Free Trial Request Demo
Sectona Logo
Home / Technology / Distributed Architectures: Deploying Unified yet Multi-Site PAM

Distributed Architectures: Deploying Unified yet Multi-Site PAM

BySundeep Undi October 9, 2021December 3, 2021 Technology

Introduction

As organizations adapt to the ever changing IT environment, one important goal they seek to achieve among the way is to ensure continuous business activity with centralized governance and policy architecture.

Speaking about the former, organizations working out of multiple locations often deploy applications pertinent to their business requirements across multiple sites which is quite common, unlike the legacy architecture of a DR or primary instance. Now when the applications deployed across any of the multiple sites is faced with an outage or downtime, how does an organization ensure that users accessing their infrastructure across multiple sites access the entitled resource without any hinderance at all times?

Organizations seeking to manage policy and governance from a centralized architecture, ensuring continual business and facilitating  secure operations, require solutions that must be highly available and scalable when adapting to the evolving IT Infrastructure. These features are inherent in a capability facilitated by Sectona Security Platform, Distributed Architectures, whose key goal is to  provide user access to the organizations infrastructure across multiple sites without any disturbance.

Use Cases: Managing Multiple active sites

Sectona allows the nodes created at diverse locations to operate independently when the central node fails. Assume ABC has implemented Sectona distributed architectures at three locations: India, Qatar, and Uganda. India has a server with Central Node, and the other countries are synced with it. Due to a power cut at the location, the central node becomes inactive for the time being. Qatar and Uganda servers will take individual ownership of the architecture and operate independently in such a situation.

Deploying b/w public cloud and on-prem environment

Along with the on-prem setup, Sectona provides the privilege of deploying the public cloud environment such as Azure, AWS, Google Cloud, and Oracle Cloud. The public cloud is synced with the central node at regular intervals. In case of Central Node failure, Sectona allows the Cloud site to operate independently. Assume ABC has implemented Sectona distributed architectures at two locations: India and Qatar. They have Azure Cloud implemented in their environment. India has a server with Central Node, and the Qatar server along with Azure Cloud are synced with it. Due to a power cut at the location, the central node becomes inactive for the time being. Qatar and Azure Cloud servers will take individual ownership of the architecture and operate independently in such a situation.

How Sectona can be deployed at multiple sites:

When deploying Sectona PAM distributed architecture solution provides simple steps managed via the application interface to operate components such as gateways, proxies, and vaults. Sectona provides the fluency to either de-couple or completely replicate an instance. Now, how to decide whether to select de-coupling or replication. A simple solution to this is to check the system requirements. If the system is not entirely robust and you need to provide only specific accesses to your users, then the best solution is de-coupling. In contrast, replication is better if the system needs to be updated and entirely synced to all the nodes created.In any case, it is essential to build a more substantial infrastructure for your master nodes.

Once the central instance is created, you can now proceed with the two options:
  • De-coupling software resources: Sectona provides the privilege to add one primary node and up to 1+n fallback nodes for application. For vault, you can add one master and up to 1+n slaves. It is highly recommended to keep the applications in the system to perform their tasks independently. It allows components to remain completely autonomous and unaware of each other. A change in one service shouldn’t require a modification in the other services. It is the process of separating services so that their functionality is self-contained. For example, it is notably noticeable among teams in charge of shared infrastructure services like monitoring and logging. Logging should be able to evolve independently of application changes, according to the logging team.
  • Creating replicas: Replicating across nodes can prevent data loss when using the embedded vault option. All configuration files are automatically synced from the primary node to the secondary node at a one-minute interval in a high availability arrangement. Physical database replication allows for rapid database synchronization. On the secondary node, the database is in read-replica mode. The High Availability service in the system manages the synchronization among the replicas.
Distributed Architectures

Benefits:

A distributed network architecture is a technology that provides many benefits to your company. A distributed network architecture addresses three fundamental elements of systems with vast networks. Distributed network architecture maintains a single central control system, but the load can be divided among multiple local sites. These sites may be physically distant, but they are linked by the internet. And, even if one system fails, the others can continue to function normally. As the network grows, there is always the risk of an overload with single servers. If a single server goes down, the entire network goes down with it. The load is spread among the numerous systems in a distributed system, making networking faster and more efficient. Because the configuration is dispersed among the secondary servers, there is no loss of configuration if the central server fails. The central system, on the other hand, has the advantage of being able to monitor all operations, make security adjustments, and observe how the other locations are doing. Changes and updates done on the central server can be automatically merged with the entire dispersed network.
  • Easy administration and operation via single application interface: The central network administrator can exercise as much or as little control as desired at any one time. This administrator can focus on other tasks by delegating responsibilities to local administrators.

  • Scalability by de-coupling: Scalability is much easier with a dispersed network architecture than with a single network. Because the load is dispersed, new devices can be added to the network and set up without causing significant network disturbance.

Customer Story

An Insurance customer was looking for a lightweight and scalable solution as the Sectona’s Security Platform didn’t have too many resources at each of the sites and with Distributed Architectures requiring a minimal setup that ensures all the servers are in real time sync operating on micro services, yet providing centralized management of PAM policies, auditing and reporting in compliance with the compliance regulations.

With distributed architecture all the instances of PAM are in Active-Active mode, providing flexibility where a user in one region can connect and authenticate to a nearest PAM server and obtain authorized access to take their respective sessions on target servers and devices.
Contents
  • Introduction
  • Use Cases
    • Managing Multiple active sites
    • How Sectona can be deployed at multiple sites?
  • Benefits
  • Customer

Contents

  • 1 Introduction
  • 2 Use Cases: Managing Multiple active sites
  • 3 Deploying b/w public cloud and on-prem environment
  • 4 How Sectona can be deployed at multiple sites:
  • 5 Benefits:
  • 6 Customer Story
        • 6.0.0.1 Contents

Explore


  • About
  • Join the team
  • Careers We're Hiring
  • Contact Us
  • Security Platform
  • Partners
  • Documentation
  • Sectona Blog
  • PAM 101New

Capabilities


  • Continuous Discovery
  • Password Management
  • Secure Remote Access
  • Session Recording and Threat Analytics
  • Mutli-Factor Authentication
  • Just-in-time Access
  • Privileged Task Management
  • Account Lifecycle Management

Solutions


  • Secure remote privileged access
  • Remove administrator rights
  • Secure cloud environments
  • Automate entitlement reviews
  • Simplify privileged account lifecyle
Sectona Gartner Peer Insights Rating Sectona ISO Certification
Sectona Logo
Facebook Twitter Linkedin

© 2022 Sectona Technologies Pvt Ltd. All Rights Reserved. All Trademarks held by their respective owners.

PRIVACY POLICY | TERMS | EULA | RESPONSIBLE DISCLOSURE

Scroll to top
  • Home
  • Platform
    • Continuous Discovery
    • Password Management
    • Secure Remote Access
    • Session Recording and Threat Analytics
    • Multi-Factor Authentication
    • Just In Time Access
    • Privileged Task Management
    • Account Lifecycle Management
    • Windows Privilege Management
    • Privileged Access Governance
  • Solutions
    • Secure remote privileged access
    • Remove Administrator Rights
    • Secure Cloud Environments
    • Automate Entitlement Reviews
    • Simplify Privileged Account lifecycle
    • PCI DSS Compliance Pertaining to Privileged Access
    • ISO 27002 Standard – Best Practices for PAM
    • SWIFT Security Framework For Privileged Access
  • Resources
    • Blog
    • Key Concepts
    • Resources
    • Knowledge Base
  • Services
    • Professional Services – Personalised Industry Based Solution
    • Training & Certifications – Gain Insight into Sectona Platform
  • Company
    • About Us
    • Contact Us
    • Branding
  • Partner
    • Find a Partner
    • Become a Sectona Partner
    • Register a Deal
  • Careers
    • Join the team
    • Explore Career Opportunities
  • Explore
    • Documentation
    • Downloads
    • Free Edition – Get Your Free Trial Today
    • Explore the Sectona Security Platform