{"id":3744,"date":"2020-07-06T21:59:00","date_gmt":"2020-07-06T21:59:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3744"},"modified":"2026-01-25T08:00:47","modified_gmt":"2026-01-25T08:00:47","slug":"easy-peasy-lemon-squeezy-privileged-access-management-made-simple","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple","title":{"rendered":"Privileged Access Management Made Simple"},"content":{"rendered":"\n<p>Local admin rights leave a sour taste in one\u2019s mouth.<\/p>\n\n\n\n<p>They give your end users complete flexibility over their machines, which may sound like a good idea: it means your users can do things like download and run programs, install drivers and manage their account settings, all without needing to ask for assistance from an IT admin.<\/p>\n\n\n\n<p>But \u2018complete flexibility\u2019 translates into \u2018too much power\u2019.<\/p>\n\n\n\n<p>With local admin rights, your users have the power to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Download and execute malicious software, leading to infections that could sweep across your entire network from a single device.<\/li>\n\n\n\n<li>Make changes to the operating system, resulting in potential unfavourable system and security modifications that can have far-reaching ill effects.<\/li>\n\n\n\n<li>Access the data of other users on the network, with the ability to create, delete and modify other user accounts. This can lead to data breaches, privacy issues and potential privilege escalation.<\/li>\n<\/ul>\n\n\n\n<p>It is the end user who often paves the way for attackers and malware within the network \u2013 and it\u2019s usually because they have local admin permissions on their computers.<\/p>\n\n\n\n<p>The more end users you have with local admin rights, the larger your attack surface.<\/p>\n\n\n\n<p>To decrease the size of your attack surface, you need to decrease the number of users with local administrator rights in your network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Zesting Up your Defences<\/h2>\n\n\n\n<p>Using a&nbsp;<strong>Privileged Access Management<\/strong>&nbsp;(<strong>PAM<\/strong>) tool is the ideal way to do this.<\/p>\n\n\n\n<p><strong>PAM<\/strong>&nbsp;manages user access by incorporating the&nbsp;<strong>Principle of Least Privilege<\/strong>&nbsp;(<strong>POLP<\/strong>) and&nbsp;<strong>Just-In-Time<\/strong>&nbsp;Elevation (H), meaning users have only bare minimum privileges required to successfully do their jobs, and privileges are only elevated when and where the situation deems it absolutely necessary.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Not So Easy Peasy<\/h2>\n\n\n\n<p>So if we all agree that revoking local admin rights is necessary and should have been done from day one, why then, do most organisations still have the majority of their end users as local admins?<\/p>\n\n\n\n<p>Because the task of revoking admin rights is a rather large, daunting and difficult one \u2013 and most&nbsp;<strong>PAM<\/strong>&nbsp;tools don\u2019t offer many solutions to make this task much easier.<\/p>\n\n\n\n<p>However, Admin By Request is a&nbsp;<strong>PAM<\/strong>&nbsp;solution that takes all of the problems involved with removing local administrator privileges from your end users, and solves them.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">It\u2019s as Easy as (Lemon) Pie<\/h2>\n\n\n\n<p>Here is a list of the major concerns you may have with revoking end user privileges, and how Admin By Request can help:<\/p>\n\n\n\n<p><strong>1. Loss of productivity for your end users<\/strong><\/p>\n\n\n\n<p>Your end users argue that they cannot be efficient and productive without local admin rights. If they can\u2019t install and run programs when they need to, how will they get their jobs done?<\/p>\n\n\n\n<p>Admin By Request revokes admin rights so smoothly that your end users will barely notice the change. The power is still in your user\u2019s hands: with Admin By Request\u2019s Run as Administrator method, users can request to use an application with elevated privileges. With the Elevated Session option, users can request a timed session during which they can operate with admin privileges for a certain amount of time. All of these requests are made from the end users device: from the comfort of their office chair. With Admin By Request\u2019s whitelisting option, applications recognised as \u2018safe\u2019 are marked as such, and users are free to use them as they please without making a request at all.<\/p>\n\n\n\n<p><strong>2. Re-education and extra training required<\/strong><\/p>\n\n\n\n<p>Changing how the end user works often results in a need for re-education and extra training for your end users, taking up resources and valuable productivity time. However, re-education and training is only necessary when there is change in how the end user needs to operate.<\/p>\n\n\n\n<p>With Admin By Request, the user continues to work the same way they always have, often simply adding the simple step of requesting to Run as Administrator or have an Elevated Session where necessary. This means no re-education or training is needed and the average end user workday continues as normal.<\/p>\n\n\n\n<p><strong>3. More resources required<\/strong><\/p>\n\n\n\n<p>Revoking local admin rights usually means your IT department will have to pick up the slack. This is likely to result in a need for more resources in IT to manage the extra work IT admins will need to do once the end user loses their local admin rights and can\u2019t do certain things by themselves that they could before.<\/p>\n\n\n\n<p>With Admin By Request\u2019s elevation methods, your IT admins simply need to approve end user requests for elevated privileges as they come in; or not:<\/p>\n\n\n\n<p>The Require approval option in Admin By Request\u2019s user portal settings can be set to \u2018on\u2019 or \u2018off\u2019.<\/p>\n\n\n\n<p>This means your IT admins don\u2019t have to approve requests in order for the user to do what they need to do \u2013 and your users don\u2019t have to wait for approval from IT admins. Win-win!<\/p>\n\n\n\n<p><strong>4. More support required<\/strong><\/p>\n\n\n\n<p>Similarly, changes in how the end user operates calls for extra support from support personnel, so you would expect an increase in support demand after local admin rights are revoked \u2013 most likely with no extra resources available for the Help Desk to cope with this increased demand.<\/p>\n\n\n\n<p>With Admin By Request, when the change is so miniscule it\u2019s barely noticeable, the need for more support from Help Desk simply isn\u2019t there.<\/p>\n\n\n\n<p><strong>5. Lack of visibility<\/strong><\/p>\n\n\n\n<p>You may be concerned about a lack of visibility into what a&nbsp;<strong>PAM<\/strong>&nbsp;software solution would actually be doing: what are end users using their local admin rights for? System tools? App updates? Legacy applications? If you\u2019re going to manage user access, you at least want to know what, exactly, your users are accessing and why.<\/p>\n\n\n\n<p>Admin By Request recognises that transparency is important. That\u2019s why this solution gives you full visibility of what your end users are using their local admin rights for. With the software\u2019s Learning Mode, you get a full breakdown of what your users are doing before admin rights are revoked. You can see the patterns, trends and outliers, and you can use this data to decide which applications should be whitelisted when the time for revoking comes around. Once admin rights have been revoked, you\u2019ll know who\u2019s doing what because requests for elevation, along for a reason for the request, will appear in real time within the Admin By Request user portal and in the mobile application. On top of that, everything your users do while they are running an application as administrator or having an elevated session is recorded in the auditlog. Visibility = check.<\/p>\n\n\n\n<p><strong>6. Solutions being too complicated<\/strong><\/p>\n\n\n\n<p>Many&nbsp;<strong>PAM<\/strong>&nbsp;solutions take over 9 months to deploy. They involve lots of new back end servers, expensive licenses, IT training and project managers. This means lengthy set up times, costly changes, extra people needing to be involved, and valuable time being spent on re-education rather than work.<\/p>\n\n\n\n<p>Admin By Request is somewhat a rarity: with 90% of customers having the software fully implemented within 3 months, meaning you get a very positive return of investment and a secure IT environment in a short span of time. The reason for this lightning-fast setup is because there is no infrastructure needed and no AD Sync or ADFS required. The installer MSI file itself is a tiny 2.58 megabytes which takes seconds to install, and basic setup within the Admin By Request user portal can be done in minutes.<\/p>\n\n\n\n<p><strong>7. Why make the change when nothing has gone wrong?<\/strong><\/p>\n\n\n\n<p>You\u2019ve gotten this far without your company burning to the ground, so why stop now? Ambition: In this case, the preference to gamble that nothing goes wrong rather than settle for a&nbsp;<strong>PAM<\/strong>&nbsp;solution that doesn\u2019t cover absolutely everything.<\/p>\n\n\n\n<p>Admin By Request is a solution that is both simple and covers everything. It takes one unchecked end user with local admin rights to potentially compromise your entire network \u2013 don\u2019t take the risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Although it\u2019s easy to be put off by the many&nbsp;<strong>PAM<\/strong>&nbsp;solutions out there that are tiresome, expensive and difficult to implement and work with \u2013 the right solution really can be easy peasy (as cheesy as that sounds).<\/p>\n\n\n\n<p><a href=\"\/en\/contact?requestademo\">Request a free demo<\/a> of Admin By Request right here, right now, and you\u2019ll be set up and ready to go in the time it takes to\u2026 squeeze the lemon.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here&#8217;s how.<\/p>\n","protected":false},"author":2,"featured_media":7837,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[231,148,106,67,68,201],"ppma_author":[10],"class_list":["post-3744","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-configuration","tag-cybersecurity","tag-features","tag-pam","tag-privileged-access-management","tag-settings","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here&#039;s how.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"configuration,cybersecurity,features,pam,privileged access management,settings\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Privileged Access Management Made Simple \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here&#039;s how.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-07-06T21:59:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T08:00:47+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Privileged Access Management Made Simple \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here&#039;s how.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#blogposting\",\"name\":\"Privileged Access Management Made Simple \\u00bb Admin By Request\",\"headline\":\"Privileged Access Management Made Simple\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/1-16-09.png\",\"width\":1500,\"height\":784,\"caption\":\"A woman who is sitting at her computer desk smiling to the right side.\"},\"datePublished\":\"2020-07-06T21:59:00+00:00\",\"dateModified\":\"2026-01-25T08:00:47+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#webpage\"},\"articleSection\":\"Blogs, Configuration, Cybersecurity, Features, PAM, Privileged Access Management, Settings, Steve Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#listItem\",\"name\":\"Privileged Access Management Made Simple\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#listItem\",\"position\":3,\"name\":\"Privileged Access Management Made Simple\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\",\"name\":\"Privileged Access Management Made Simple \\u00bb Admin By Request\",\"description\":\"Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here's how.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/1-16-09.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\\\/#mainImage\",\"width\":1500,\"height\":784,\"caption\":\"A woman who is sitting at her computer desk smiling to the right side.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#mainImage\"},\"datePublished\":\"2020-07-06T21:59:00+00:00\",\"dateModified\":\"2026-01-25T08:00:47+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Privileged Access Management Made Simple \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Privileged Access Management Made Simple \u00bb Admin By Request","description":"Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here's how.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"configuration,cybersecurity,features,pam,privileged access management,settings","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#blogposting","name":"Privileged Access Management Made Simple \u00bb Admin By Request","headline":"Privileged Access Management Made Simple","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/1-16-09.png","width":1500,"height":784,"caption":"A woman who is sitting at her computer desk smiling to the right side."},"datePublished":"2020-07-06T21:59:00+00:00","dateModified":"2026-01-25T08:00:47+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#webpage"},"articleSection":"Blogs, Configuration, Cybersecurity, Features, PAM, Privileged Access Management, Settings, Steve Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#listItem","name":"Privileged Access Management Made Simple"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#listItem","position":3,"name":"Privileged Access Management Made Simple","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple","name":"Privileged Access Management Made Simple \u00bb Admin By Request","description":"Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here's how.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/02\/1-16-09.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\/#mainImage","width":1500,"height":784,"caption":"A woman who is sitting at her computer desk smiling to the right side."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple#mainImage"},"datePublished":"2020-07-06T21:59:00+00:00","dateModified":"2026-01-25T08:00:47+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Privileged Access Management Made Simple \u00bb Admin By Request","og:description":"Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here's how.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2020-07-06T21:59:00+00:00","article:modified_time":"2026-01-25T08:00:47+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Privileged Access Management Made Simple \u00bb Admin By Request","twitter:description":"Admin By Request takes the burden out of implementing a PAM solution and makes the task a quick and easy one. Here's how.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3744","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":null,"og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":null,"robots_max_videopreview":null,"robots_max_imagepreview":"large","priority":null,"frequency":null,"local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:23:05","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2023-05-22 21:56:16","updated":"2026-01-25 08:23:05"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tPrivileged Access Management Made Simple\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"Privileged Access Management Made Simple","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple"}],"authors":[{"term_id":10,"user_id":0,"is_guest":1,"slug":"steve-dodson","display_name":"Steve Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"Steve","job_title":"","description":"Steve provides research, analysis, insight and commentary on topical issues and events. He lives in New Zealand and has been working at FastTrack Software for 12 years as a cyber security analyst and technical writer."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3744"}],"version-history":[{"count":1,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3744\/revisions"}],"predecessor-version":[{"id":10708,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3744\/revisions\/10708"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/7837"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3744"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}