Infisical’s Privileged Access Management (PAM) solution enables you to provide developers with secure, just-in-time access to your critical infrastructure, such as databases, servers, and web applications. Instead of sharing static credentials, your team can request temporary access through Infisical, which is then brokered through a secure gateway with full auditing and session recording. Getting started involves a few key components:Documentation Index
Fetch the complete documentation index at: https://infisical.com/docs/llms.txt
Use this file to discover all available pages before exploring further.
- Gateways: A lightweight service you deploy in your own infrastructure to act as a secure entry point to your private resources.
- Resources: The specific systems you want to manage access to (e.g., a PostgreSQL database or an SSH server).
- Accounts: The privileged credentials (e.g., a database user or an SSH user) that Infisical uses to connect to a resource on behalf of a user.
Deploy a Gateway
Before you can manage any resources, you must deploy an Infisical Gateway within your infrastructure. This component is responsible for brokering connections to your private resources.Read the Gateway Deployment Guide
Create a Resource
Once the Gateway is active, define a Resource in Infisical (e.g., “Production Database”). You will link this resource to your deployed Gateway so Infisical knows how to reach it.Learn about Resources
Add Accounts
Add Accounts to your Resource (e.g.,
postgres or read-only-user). These represent the actual PAM users or privileged identities that are utilized when a user connects.Learn about Accounts