UseCase2_ADIntegration - sandersdHES/PAMEmergingTech GitHub Wiki
Active Directory (AD) is a centralised directory service that manages user identities and their access rights to network resources. However, it does not natively provide advanced management of privileged accounts—such as admin accounts, critical service accounts, or root accounts on Linux servers.
This is where Privileged Access Management (PAM) comes in. PAM adds layers of control, monitoring, and protection specifically for privileged accounts on top of AD.
- PAM secures privileged accounts by replacing static passwords with temporary, controlled access.
- It segregates standard and administrative accounts using a secure credential vault.
- It enables Just-in-Time (JIT) access for specific tasks only when needed.
- It logs and records all admin activities for full auditing and accountability.
Active Directory is a prime target for attackers, as it controls access across the entire organisation. If a privileged AD account is compromised, an attacker could gain full control over your network.
Threats Mitigated by PAM:
- Pass-the-Hash Attacks: Exploiting NTLM hashes of AD credentials.
- Golden Ticket Attacks: Using forged Kerberos tickets (TGTs) to impersonate users.
- Credential Dumping: Extracting passwords from memory (e.g., via Mimikatz).
- Shadow Admins: Hidden high-privilege accounts not easily visible in AD.
PAM reduces these risks by eliminating permanent privileged access and applying strict controls.
This use case demonstrates how to integrate Active Directory (AD) with PAM360 in order to centralize the management of domain users, groups, and organizational units (OUs). This enables secure onboarding of AD accounts into PAM360 for privileged access control, session recording, and password governance.
While AD manages user authentication and access across an enterprise, it lacks granular privilege management and auditing capabilities. Integrating it with PAM360 allows organizations to:
-
Import AD users and assign PAM roles
-
Monitor and control access to AD-linked resources
-
Apply Just-In-Time (JIT) access and credential rotation
-
Protect against credential theft and lateral movement
In this proof of concept (PoC), we built a local AD environment (domain: pampoc.ch), added test users, and connected a Windows 10 VM to the domain to simulate real enterprise conditions.
-
A Windows Server VM
-
A Windows 10 client VM joined to the domain
-
PAM360 installed and accessible via web interface
Go to your Windows Server and create a new Active Directory. You can follow the official Microsoft documentation for this.
Be sure to create a new domain and a new forest. You can name it as you want, but for the sake of this PoC we will use pampoc.ch.

Also promote your server to a domain controller.

You can create users in Active Directory using the GUI or PowerShell. For this PoC, we will use PowerShell to create a few test users.
# Import du module Active Directory
Import-Module ActiveDirectory
# Chemin cible dans l'AD (Users est un conteneur, donc "CN=" et non "OU=")
$ou = "CN=Users,DC=pampoc,DC=ch"
# Nom du groupe de domaine par défaut
$defaultGroup = "Domain Users"
# Liste des utilisateurs à créer
$users = @(
@{Prenom="Alice"; Nom="Durand"; SamAccountName="adurand"; Password="P@ssw0rd123!"},
@{Prenom="Bob"; Nom="Martin"; SamAccountName="bmartin"; Password="P@ssw0rd123!"},
@{Prenom="Clara"; Nom="Lopez"; SamAccountName="clopez"; Password="P@ssw0rd123!"},
@{Prenom="David"; Nom="Nguyen"; SamAccountName="dnguyen"; Password="P@ssw0rd123!"},
@{Prenom="Emma"; Nom="Schmidt"; SamAccountName="eschmidt"; Password="P@ssw0rd123!"}
)
# Création des comptes
foreach ($user in $users) {
$nomComplet = "$($user.Prenom) $($user.Nom)"
$securePass = ConvertTo-SecureString $user.Password -AsPlainText -Force
# Création de l'utilisateur
New-ADUser `
-Name $nomComplet `
-GivenName $user.Prenom `
-Surname $user.Nom `
-SamAccountName $user.SamAccountName `
-UserPrincipalName "$($user.SamAccountName)@pampoc.ch" `
-AccountPassword $securePass `
-Path $ou `
-Enabled $true `
-ChangePasswordAtLogon $true
# Ajout explicite au groupe "Domain Users"
Add-ADGroupMember -Identity $defaultGroup -Members $user.SamAccountName
Write-Host "✅ Utilisateur créé et ajouté à '$defaultGroup' : $nomComplet"
}You will need to adapt the hosts file of your Windows 10 VM to be able to resolve the domain name. You can do this by adding the following line to the hosts file:
127.0.0.1 ADPAM.pampoc.ch ADPAM

- Go to your Windows 10 VM and join it to the domain you just created.
- Right-click on This PC and select Properties.
- Click on Change settings under Computer name, domain, and workgroup settings.
- Click on Change and select Domain.
- Enter the domain name (e.g.,
pampoc.ch) and click OK.

- Enter the credentials of a domain admin account when prompted.
- Change the DNS settings of the Windows 10 VM to point to the IP address of the Active Directory server.

- Restart the VM to apply the changes.
-
Go to Admin → Active Directory → Active Directory Configuration
-
Click on Import from Active Directory and fill in the required fields:
- Create a new Domain and call it PAMPOC
- Primary Domain Controller: ADPAM
- Enter the credentials of a domain admin account
-
Domain Name:
pampoc.ch - Click on Fetch Groups & OUs to import the groups and OUs from the Active Directory.

- Select the groups and OUs you want to import into PAM360. You can also select the users you want to import.

You will see that all the users from the AD have been imported into Users in PAM360.

- Repeat the process in Resources => Discover Accounts.
After this you will be able to connect to your Windows 10 VM using the credentials of the users you just created in the Active Directory.
Go to Connections and select the Windows 10 VM. You will see local and domain accounts.


Integrating Active Directory (AD) with PAM360 brings centralized identity management and privileged access security into a single cohesive platform. Through this integration, you gain complete visibility and control over privileged AD accounts, while leveraging existing domain structures.
By importing users, groups, and OUs from AD, PAM360 enables:
-
Seamless onboarding of existing domain users into PAM workflows
-
Enforced access control for critical domain resources
-
Secure remote access to Windows endpoints via domain credentials
-
Support for password rotation, JIT access, and full audit logging
This integration not only enhances security posture but also simplifies identity governance—bridging the gap between traditional directory services and modern privilege management requirements.