Security > EAM


EAM allows users to temporarily inherit increased authority, which can be limited to predefined commands, periods of time, and/or days and times. 
With EAM you will know the precise actions performed by the user during the period they have been granted the additional authority. 
EAM includes not only an effective and flexible authority management mechanism but also a comprehensive monitoring and reporting tool. The user activity is fully audited and logged from different sources (joblog, system and database journals, exit points).
For more information, click here.