Skip to main content

Safes

A Safe is a logical container created within the Grizzle ZT-PAM Vault structure.
Each Safe functions as a dedicated “mini vault” for a specific system group, application, or department.
This design enables organizations to implement modular, secure, and manageable access control.

A Safe is one of the fundamental building blocks of Grizzle ZT-PAM in terms of both security and administration.
Each Safe maintains its own policy set, user authorizations, and audit trail.


Core Features of a Safe

  • Each Safe is governed by its own Access Control List (ACL).
  • Permissions can be assigned based on users, groups, etc.
    (e.g., View, Retrieve, Update, Add, Delete, Manage Safe Members).
  • CPM (Central Password Manager) can apply different password policies per Safe (e.g., rotation interval, complexity, aging).
  • PSM (Privileged Session Manager) can initiate secure sessions using accounts defined within a Safe.
  • Each Safe maintains its own access and audit logs for enhanced traceability.

The Safe structure allows organizations to segment access risks and control system groups in isolated environments.


Safe Permissions

The table below lists all permissions assignable at the Safe level.
These permissions determine the user’s access level and allowed operations within the Safe.

Parameter NameDescription
List AccountsPermission to list accounts.
Use AccountsPermission to use accounts for establishing remote connections.
Retrieve AccountsPermission to view or copy account passwords.
Add AccountsPermission to create new accounts.
Update Account PropertiesPermission to modify account settings (e.g., reconcile, logon account) except for renaming or password changes.
Update Account ContentPermission to change account passwords.
Initiate CPM Account Management OperationsAllows execution of Change, Verify, or Reconcile operations on accounts.
Specify Next Account ContentAllows users to manually enter a new password when performing a Change action in the Account View screen.
Rename AccountsPermission to rename accounts.
Delete AccountsPermission to delete accounts.
Unlock AccountsPermission to unlock accounts. (Requires Check-In/Out to be enabled in Master Policy.)
Manage SafePermission to edit Safe settings (opens the Safe edit screen only).
Manage Safe MemberPermission to add users to a Safe or edit existing Safe permissions.
View Audit LogPermission to view audit logs for the Safe.
View Safe MembersPermission to view users who have access to the Safe.
Confirm Request Level 1Approval permission for Level 1 access requests to accounts within the Safe.
Confirm Request Level 2Approval permission for Level 2 access requests to accounts within the Safe.
Access Safe Without ConfirmationAllows access to Safe accounts without requiring approval from authorized users.
Move Accounts Change Safe Or PlatformPermission to move accounts between Safes or change their platform association.

ZT-PAM Interface

Note: A user can only see the Safes for which they have permissions.
Safes not visible on the screen are outside the user’s access scope.


Create / Edit Safe

Safe creation or modification can only be performed by users with the appropriate permissions.

ZT-PAM Interface


Manage Safe Members

The Manage Safe Member section allows administrators to manage user and group permissions within a Safe.
Users can be added, removed, or have their permissions modified from this screen.

ZT-PAM Interface

Example: In a Safe, only certain users may have the “Retrieve Account” permission, while others are restricted to “Use Account” only.


Manage Permissions

The Manage Permissions screen displays the permission levels of all users and groups with access to a Safe.
This allows administrators to review and modify permissions from a centralized interface.

ZT-PAM Interface

ZT-PAM Interface



Summary

Safes form the foundational management layer for access control in the Grizzle ZT-PAM architecture.
Each Safe isolates system resources, managing access rights, audit records, and policies independently.

This structure enables:

  • Fine-grained permission management
  • Safe-specific audit trail retention
  • Independent enforcement of access policies
  • Simplified security and compliance administration