Skip to main content

Assign PSM-Enabled Computers to Access Request Policies

EmpowerID provides pre-configured Access Request policies tailored for Privileged Session Management (PSM). These policies can be used as-is or customized to suit your organization's privileged access control strategy.

The default PSM policies include:

  • Computer Creds – Allow Multi-Check-Out – No Password Reset
  • Computer Creds – No Multi-Check-Out – Password Reset
  • MFA – Computer Creds – Allow Multi-Check-Out – No Password Reset

For detailed descriptions of these policies, see Access Request Policies and Privileged Session Management.

This article explains how to:

Step 1 – Configure the Access Request Policy for PSM

  1. On the navbar, expand Low Code/No Code Workflow and select Access Request Policies.

  2. Search for the Access Request Policy you want to configure and click the Edit button. Edit Policy This opens the policy in edit mode. Policy Edit Mode

  3. Configure the following PSM-specific settings as needed:

    General Access and Workflow

    • Approval Policy – Defines the approval workflow. The default is Owner Approval, where the resource owner must approve each request.

    • Fulfillment Delay (HRS) – Time in hours to delay fulfillment after approval (default is 0).

    • Allow Activation (Skip Business Request) – If true, approved users can activate access without initiating a Business Request workflow.

    • Enable Just-in-Time Account Provisioning – Automatically creates a temporary user account during privileged session login using the format: EmpowerIDLogin_RandomNumber (e.g., jane.doe_846392).

      💡Windows Server Requirements

      This setting applies only to Windows servers that have been inventoried as Local Windows Server account stores.
      See: Local Windows Servers Connector

      ⚙️Just-in-Time Access Configuration

      To enable JIT provisioning, the target computer must also have its Just-in-Time Access settings properly configured.
      See: Enable Computers for Privileged Session Management


    Session Duration Controls

    • Time Restrictions – Limits the duration of each session if enabled:
      • Default Access Duration (Min) – Default time for each session
      • Max Duration (Min) – Maximum allowed session length before automatic termination

    MFA Enforcement

    • MFA Required for Access Request:
      • Min Login LOA if Local – Level of Assurance points required for users on local network
      • Min Login LOA if Remote – LOA points for remote users

    PSM Computer Settings

    These govern session concurrency, auditing, and administrator visibility.

    • Max Allowed Concurrent Sessions – Limits how many active sessions can exist simultaneously
    • Record Sessions – If enabled, sessions are captured for audit
    • Allow Live Session Snooping – Allows real-time viewing of sessions by administrators
  4. Click Save to apply your policy configuration.

Step 2 – Assign PSM-Enabled Computers to the Policy

  1. On the Access Request Policies page, click the Access Request Policy link for the policy you just configured. Access Request Policy Link This opens the View One page for the policy, allowing you to manage resource assignments. View One Page

  2. Expand the Resources Managed by Policy accordion.

  3. Click the Add button. Add Button

  4. In the Assignment Information pane:

    • Select Computer as the Resource Type.
    • Search for the PSM-enabled computer(s) to assign.
    • Select each computer from the grid. Select Computer
  5. Once you've selected all applicable computers, click Save to assign them to the policy.

With these steps completed, the assigned computers are now governed by the configured PSM Access Request Policy, ensuring secure, auditable, and policy-compliant access to privileged sessions.