The PAM Workflow
At its core, Infisical PAM is designed to decouple user identity from infrastructure credentials. Instead of sharing static passwords or SSH keys, users authenticate with their SSO identity, and Infisical handles the rest. Here is how a typical access lifecycle looks:- Discovery: A user logs into Infisical and sees a catalog of resources (databases, servers) and accounts they are allowed to access.
- Connection: The user selects a resource and an account (e.g., “Production DB” as
read_only). They initiate the connection via the Infisical CLI. - Credential Injection: Infisical validates the request. If allowed, it establishes a secure tunnel and automatically injects the credentials for the target account. The user never sees the underlying password or key.
- Monitoring: The session is established. All traffic is intercepted, logged, and recorded for audit purposes.
Core Concepts
To successfully implement Infisical PAM, it is essential to understand the relationship between the following components:Gateway
A lightweight service deployed in your network that acts as a secure bridge to your private infrastructure.
Resource
The specific target you are protecting (e.g., a PostgreSQL database or an Ubuntu server).
Account
The specific identity on the Resource that the user is trying to access. One Resource can have multiple Accounts.
Relationship Model
The hierarchy is structured as follows:- Gateway: Deployed once per network/VPC. It provides connectivity to all resources in that environment.
- Resource: Configured within Infisical. It points to a specific IP/Host accessible by the Gateway.
- Account: Defined under a Resource. Users request access to a specific Account on a Resource.
Network Architecture
Infisical PAM uses a secure proxy-based architecture to connect users to resources without direct network exposure. When a user accesses a resource, their connection is routed securely through a Relay to your self-hosted Gateway, which then connects to the target resource. This ensures zero-trust access without exposing your infrastructure to the public internet. For a deep dive into the technical architecture and security model, see Architecture.Core Capabilities
- Auditing: Track and review a comprehensive log of all user actions and system events.
- Session Recording: Record and playback user sessions for security reviews, compliance, and troubleshooting.
- Automated Credential Rotation: Automatically rotate credentials for supported resources to minimize the risk of compromised credentials.